Powered by Deep Web Technologies
Note: This page contains sample records for the topic "quicktime multiple flaws" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

20: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code November 9, 2012 - 6:00am...

2

V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code May 27, 2013 - 12:23am...

3

V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

20: Apple QuickTime Multiple Flaws Let Remote Users Execute 20: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code November 9, 2012 - 6:00am Addthis PROBLEM: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Versions prior to QuickTime 7.7.3 are vulnerable on Windows 7, Vista and XP. ABSTRACT: Multiple vulnerabilities were reported in Apple QuickTime. REFERENCE LINKS: Apple Security Article: HT5581 SecurityTracker Alert ID: 1027737 Bugtraq ID: 56438 Secunia Advisory SA51226 CVE-2011-1374 CVE-2012-3751 CVE-2012-3752 CVE-2012-3753 CVE-2012-3754 CVE-2012-3755 CVE-2012-3756 CVE-2012-3757 CVE-2012-3758 IMPACT ASSESSMENT: High DISCUSSION: Multiple vulnerabilities have been reported in Apple QuickTime, which can

4

U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

70: Apple QuickTime Multiple Flaws Let Remote Users Execute 70: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code May 16, 2012 - 7:00am Addthis PROBLEM: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: prior to 7.7.2 ABSTRACT: Multiple vulnerabilities were reported in Apple QuickTime. A remote user can cause arbitrary code to be executed on the target user's system. Reference LINKS: SecurityTracker Alert ID: 1027065 CVE-2012-0265 CVE-2012-0663 CVE-2012-0664 CVE-2012-0665 CVE-2012-0666 IMPACT ASSESSMENT: High Discussion: A remote user can create a specially crafted file that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. Only Windows-based systems

5

V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Apple QuickTime Multiple Flaws Let Remote Users Execute 4: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code May 27, 2013 - 12:23am Addthis PROBLEM: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Apple QuickTime prior to 7.7.4. ABSTRACT: Apple QuickTime Multiple Vulnerabilities REFERENCE LINKS: Apple Article: HT5770 SecurityTracker Alert ID: 1028589 Secunia Advisory SA53520 CVE-2013-0986, CVE-2013-0987, CVE-2013-0988 CVE-2013-0989, CVE-2013-1015, CVE-2013-1016 CVE-2013-1017, CVE-2013-1018, CVE-2013-1019 CVE-2013-1020, CVE-2013-1021, CVE-2013-1022 IMPACT ASSESSMENT: High DISCUSSION: Multiple vulnerabilities have been reported in Apple QuickTime, which can be exploited by malicious people to compromise a user's system.

6

U-022: Apple QuickTime Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Apple QuickTime Multiple Vulnerabilities 2: Apple QuickTime Multiple Vulnerabilities U-022: Apple QuickTime Multiple Vulnerabilities October 28, 2011 - 8:15am Addthis PROBLEM: Apple QuickTime Multiple Vulnerabilities. PLATFORM: Apple QuickTime prior to 7.7.1 ABSTRACT: A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system. reference LINKS: Apple Product Security Article: HT5016 Secunia Advisory SA46618 SecurityTracker Alert ID: 1026251 CVE-2011-3218, CVE-2011-3219, CVE-2011-3220 CVE-2011-3221, CVE-2011-3222, CVE-2011-3223 CVE-2011-3228, CVE-2011-3247, CVE-2011-3248 CVE-2011-3249, CVE-2011-3250, CVE-2011-3251 IMPACT ASSESSMENT: High Discussion: Multiple vulnerabilities have been reported in Apple Quicktime, which can be exploited by malicious people to compromise a user's system.

7

T-654: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Apple QuickTime Multiple Bugs Let Remote Users Execute 4: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary T-654: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary June 24, 2011 - 4:39am Addthis PROBLEM: A vulnerability was reported in QuickTime. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Version(s): prior to QuickTime 7.6.8 ABSTRACT: A remote user can create a specially crafted file that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. reference LINKS: SecurityTracker Alert ID: 1025705 Apple Security Article: HT4339 Apple Security Article: HT4723 Apple Security Article: HT1222 CVE-2011-0213 Secunia Advisory: SA45054 IMPACT ASSESSMENT High Discussion:

8

U-202: Apple QuickTime Multiple Stack Overflow Vulnerabilities | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

202: Apple QuickTime Multiple Stack Overflow Vulnerabilities 202: Apple QuickTime Multiple Stack Overflow Vulnerabilities U-202: Apple QuickTime Multiple Stack Overflow Vulnerabilities June 29, 2012 - 7:00am Addthis PROBLEM: Apple QuickTime is prone to multiple stack-based buffer-overflow vulnerabilities. PLATFORM: Version(s): prior to 7.7.2 ABSTRACT: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. Reference links: Vendor Advisory Security Focus ID 53571 CVE-2012-0663 IMPACT ASSESSMENT: Medium Discussion: These issues arise when the application handles specially crafted files. Successful exploits may allow attackers to execute arbitrary code in the context of the currently logged-in user; failed exploit attempts will cause denial-of-service conditions.Versions prior to

9

U-202: Apple QuickTime Multiple Stack Overflow Vulnerabilities | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Apple QuickTime Multiple Stack Overflow Vulnerabilities 2: Apple QuickTime Multiple Stack Overflow Vulnerabilities U-202: Apple QuickTime Multiple Stack Overflow Vulnerabilities June 29, 2012 - 7:00am Addthis PROBLEM: Apple QuickTime is prone to multiple stack-based buffer-overflow vulnerabilities. PLATFORM: Version(s): prior to 7.7.2 ABSTRACT: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. Reference links: Vendor Advisory Security Focus ID 53571 CVE-2012-0663 IMPACT ASSESSMENT: Medium Discussion: These issues arise when the application handles specially crafted files. Successful exploits may allow attackers to execute arbitrary code in the context of the currently logged-in user; failed exploit attempts will cause denial-of-service conditions.Versions prior to

10

U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote Users Execute Arbitrary Code and Deny Service U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let...

11

T-574: Google Chrome Multiple Flaws Let Remote Users Execute...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code T-574: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code March 10, 2011 - 3:05pm Addthis...

12

QuickTime VR  

Science Conference Proceedings (OSTI)

QuickTime VR. Christine Piatko and Sandy Ressler. ... Sandy Ressler's Office. Plant Floor of Black & Decker in Fayetteville NC. ...

13

U-093: Mozilla Firefox Multiple Flaws Permit Remote Code Execution,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, 3: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting Attacks U-093: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting Attacks February 1, 2012 - 5:51am Addthis PROBLEM: Multiple vulnerabilities were reported in Mozilla Firefox. PLATFORM: Linux (Any), UNIX (Any), Windows (Any) Version(s): prior to 3.2.26; prior to 10.0 ABSTRACT: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting. reference LINKS: SecurityTracker Alert ID: 1026605 CVE-2011-3659, CVE-2012-0442 CVE-2012-0443, CVE-2012-0444 CVE-2012-0445, CVE-2012-0446 CVE-2012-0447, CVE-2012-0449 CVE-2012-0450 Vendor Site IMPACT ASSESSMENT:

14

U-106: Citrix XenServer Multiple Flaws in Web Self Service Have...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Citrix XenServer Multiple Flaws in Web Self Service Have Unspecified Impact U-106: Citrix XenServer Multiple Flaws in Web Self Service Have Unspecified Impact February 17, 2012...

15

T-715: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

15: Microsoft SharePoint Multiple Flaws Permit Cross-Site 15: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting Attacks T-715: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting Attacks September 13, 2011 - 12:35pm Addthis PROBLEM: Multiple vulnerabilities were reported in Microsoft SharePoint. A remote user can conduct cross-site scripting attacks. PLATFORM: Version(s): SharePoint software ABSTRACT: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting Attacks. reference LINKS: MS11-074: Article ID: 2552998 SecurityTracker Alert ID: 1026040 CVE-2011-1893 CVE-2011-1892 CVE-2011-1891 CVE-2011-1890 CVE-2011-0653 IMPACT ASSESSMENT: High Discussion: A remote user can create a specially crafted URL or web site that, when loaded by a target user, will cause arbitrary scripting code to be executed

16

T-691: Adobe Flash Player Multiple Flaws Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Adobe Flash Player Multiple Flaws Let Remote Users Execute 1: Adobe Flash Player Multiple Flaws Let Remote Users Execute Arbitrary Code T-691: Adobe Flash Player Multiple Flaws Let Remote Users Execute Arbitrary Code August 11, 2011 - 3:00pm Addthis PROBLEM: Multiple vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Version(s): 10.3.181.36 and prior; 10.3.185.25 and prior for Android. ABSTRACT: Adobe Flash Player Multiple Flaws Let Remote Users Execute Arbitrary Code. reference LINKS: Security Bulletin: APSB11-21 SecurityTracker Alert ID: 1025907 CVE-2011-2425 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted Flash content that, when loaded by the target user, will execute arbitrary code on the target system. The

17

T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Apple Safari Multiple Flaws Let Remote Users Execute 3: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks July 21, 2011 - 1:27am Addthis PROBLEM: Multiple vulnerabilities were reported in Apple Safari. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can conduct cross-site scripting attacks. A remote user can obtain potentially sensitive information. A remote user can bypass a certificate validation control. PLATFORM: Safari 5.1 and Safari 5.0.6 Products Affected: Safari 5 (Mac OS X 10.6), Safari 5 (Mac OS X 10.5), Product Security, Safari 5.1 (OS X Lion) ABSTRACT: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code,

18

T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass  

NLE Websites -- All DOE Office Websites (Extended Search)

36: Cisco ASA Multiple Flaws Let Remote Users Deny Service and 36: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls January 18, 2011 - 2:30pm Addthis PROBLEM: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls. PLATFORM: Cisco 5500 Series Adaptive Security Appliances (ASA) ABSTRACT: Cisco ASA 5500 Series Adaptive Security Appliances are affected by multiple vulnerabilities. Affected versions of Cisco ASA Software vary depending on the specific vulnerability. Cisco ASA 5500 Series Adaptive Security Appliances may experience a TCP connection exhaustion condition (no new TCP connections are accepted) that can be triggered through the receipt of specific TCP segments during the

19

U-133: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

33: Google Chrome Multiple Flaws Let Remote Users Execute 33: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-133: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code March 26, 2012 - 3:35am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Google Chrome prior to 17.0.963.83 ABSTRACT: Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026841 CVE-2011-3049 Secunia Advisory SA48512 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. A use-after-free may occur

20

U-143: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Google Chrome Multiple Flaws Let Remote Users Execute 3: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-143: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code April 9, 2012 - 7:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 18.0.1025.151 ABSTRACT: Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026892 CVE-2011-3066 Secunia Advisory SA48732 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. An out-of-bounds memory

Note: This page contains sample records for the topic "quicktime multiple flaws" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

T-683:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

83:Google Chrome Multiple Flaws Let Remote Users Execute 83:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code T-683:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code August 3, 2011 - 3:45pm Addthis PROBLEM: Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Google Chrome prior to 13.0.782.107 ABSTRACT: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code. reference LINKS: Google Chrome advisory Update Chromium Security SecurityTracker Alert ID: 1025882 CVE-2011-2819 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a specially crafted HTML that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user.

22

T-715: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Microsoft SharePoint Multiple Flaws Permit Cross-Site 5: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting Attacks T-715: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting Attacks September 13, 2011 - 12:35pm Addthis PROBLEM: Multiple vulnerabilities were reported in Microsoft SharePoint. A remote user can conduct cross-site scripting attacks. PLATFORM: Version(s): SharePoint software ABSTRACT: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting Attacks. reference LINKS: MS11-074: Article ID: 2552998 SecurityTracker Alert ID: 1026040 CVE-2011-1893 CVE-2011-1892 CVE-2011-1891 CVE-2011-1890 CVE-2011-0653 IMPACT ASSESSMENT: High Discussion: A remote user can create a specially crafted URL or web site that, when loaded by a target user, will cause arbitrary scripting code to be executed

23

U-213: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Google Chrome Multiple Flaws Let Remote Users Execute 3: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-213: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code July 16, 2012 - 7:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 20.0.1132.57 ABSTRACT: Several vulnerabilities were reported in Google Chrome. reference LINKS: Stable Channel Update SecurityTracker Alert ID: 1027249 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user.

24

U-277: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Google Chrome Multiple Flaws Let Remote Users Execute 7: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-277: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code October 9, 2012 - 6:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 22.0.1229.92 ABSTRACT: Several vulnerabilities were reported in Google Chrome. reference LINKS: SecurityTracker Alert ID: 1027617 Stable Channel Update CVE-2012-2900 CVE-2012-5108 CVE-2012-5109 CVE-2012-5110 CVE-2012-5111 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. A crash may occur in Skia text rendering [CVE-2012-2900].

25

U-160: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

60: Google Chrome Multiple Flaws Let Remote Users Execute 60: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-160: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code May 2, 2012 - 7:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Prior to 18.0.1025.168 ABSTRACT: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system reference LINKS: SecurityTracker Alert ID: 1027001 CVE-2011-3078 CVE-2011-3079 CVE-2011-3080 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will trigger a use-after-free, validation error, or race condition and execute arbitrary code on the target system. The code will

26

U-160: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Google Chrome Multiple Flaws Let Remote Users Execute 0: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-160: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code May 2, 2012 - 7:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Prior to 18.0.1025.168 ABSTRACT: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system reference LINKS: SecurityTracker Alert ID: 1027001 CVE-2011-3078 CVE-2011-3079 CVE-2011-3080 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will trigger a use-after-free, validation error, or race condition and execute arbitrary code on the target system. The code will

27

U-213: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-213: Google Chrome Multiple Flaws Let Remote Users Execute U-213: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-213: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code July 16, 2012 - 7:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 20.0.1132.57 ABSTRACT: Several vulnerabilities were reported in Google Chrome. reference LINKS: Stable Channel Update SecurityTracker Alert ID: 1027249 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user.

28

V-035: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Google Chrome Multiple Flaws Let Remote Users Execute 5: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code V-035: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code November 28, 2012 - 1:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 23.0.1271.91 ABSTRACT: Several vulnerabilities were reported in Google Chrome. REFERENCE LINKS: Release updates from the Chrome team SecurityTracker Alert ID: 1027815 Secunia Advisory SA51437 CVE-2012-5130 CVE-2012-5131 CVE-2012-5132 CVE-2012-5133 CVE-2012-5134 CVE-2012-5135 CVE-2012-5136 IMPACT ASSESSMENT: High DISCUSSION: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create specially crafted content that, when loaded by the

29

V-066: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users 6: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges V-066: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges January 10, 2013 - 2:00am Addthis PROBLEM: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges PLATFORM: *Adobe Reader XI (11.0.0) for Windows and Macintosh *Adobe Reader X (10.1.4) and earlier 10.x versions for Windows and Macintosh *Adobe Reader 9.5.2 and earlier 9.x versions for Windows and Macintosh *Adobe Reader 9.5.1 and earlier 9.x versions for Linux *Adobe Acrobat XI (11.0.0) for Windows and Macintosh *Adobe Acrobat X (10.1.4) and earlier 10.x versions for Windows and

30

U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

14: Oracle Java Runtime Environment (JRE) Multiple Flaws Let 14: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote Users Execute Arbitrary Code and Deny Service U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote Users Execute Arbitrary Code and Deny Service October 19, 2011 - 6:00pm Addthis PROBLEM: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote Users Execute Arbitrary Code and Deny Service. PLATFORM: Oracle JDK and JRE 7; JDK and JRE 6 Update 27 and prior; JDK and JRE 5.0 Update 31 and prior; SDK and JRE 1.4.2_33 and prior ABSTRACT: A remote user can create a Java applet or Java Web Start application that, when loaded by the target user, will access or modify data or execute arbitrary code on the target user's system. reference LINKS: Oracle Critical Patch Updates and Security Alerts

31

V-035: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Google Chrome Multiple Flaws Let Remote Users Execute 5: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code V-035: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code November 28, 2012 - 1:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 23.0.1271.91 ABSTRACT: Several vulnerabilities were reported in Google Chrome. REFERENCE LINKS: Release updates from the Chrome team SecurityTracker Alert ID: 1027815 Secunia Advisory SA51437 CVE-2012-5130 CVE-2012-5131 CVE-2012-5132 CVE-2012-5133 CVE-2012-5134 CVE-2012-5135 CVE-2012-5136 IMPACT ASSESSMENT: High DISCUSSION: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create specially crafted content that, when loaded by the

32

U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Oracle Java Runtime Environment (JRE) Multiple Flaws Let 4: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote Users Execute Arbitrary Code and Deny Service U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote Users Execute Arbitrary Code and Deny Service October 19, 2011 - 6:00pm Addthis PROBLEM: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote Users Execute Arbitrary Code and Deny Service. PLATFORM: Oracle JDK and JRE 7; JDK and JRE 6 Update 27 and prior; JDK and JRE 5.0 Update 31 and prior; SDK and JRE 1.4.2_33 and prior ABSTRACT: A remote user can create a Java applet or Java Web Start application that, when loaded by the target user, will access or modify data or execute arbitrary code on the target user's system. reference LINKS: Oracle Critical Patch Updates and Security Alerts

33

U-077: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Google Chrome Multiple Flaws Let Remote Users Execute 7: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-077: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code January 9, 2012 - 9:15am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 16.0.912.75 ABSTRACT: A remote user may be able to execute arbitrary code on the target system. reference LINKS: Google Chrome Releases Chromium Security SecurityTracker Alert ID:1026487 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. Specially crafted animation frames can trigger a use-after-free memory

34

V-066: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

66: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users 66: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges V-066: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges January 10, 2013 - 2:00am Addthis PROBLEM: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges PLATFORM: *Adobe Reader XI (11.0.0) for Windows and Macintosh *Adobe Reader X (10.1.4) and earlier 10.x versions for Windows and Macintosh *Adobe Reader 9.5.2 and earlier 9.x versions for Windows and Macintosh *Adobe Reader 9.5.1 and earlier 9.x versions for Linux *Adobe Acrobat XI (11.0.0) for Windows and Macintosh *Adobe Acrobat X (10.1.4) and earlier 10.x versions for Windows and

35

T-684: Apple QuickTime Buffer Overflows Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Apple QuickTime Buffer Overflows Let Remote Users Execute 4: Apple QuickTime Buffer Overflows Let Remote Users Execute Arbitrary Code T-684: Apple QuickTime Buffer Overflows Let Remote Users Execute Arbitrary Code August 4, 2011 - 3:33pm Addthis PROBLEM: Multiple vulnerabilities were reported in QuickTime. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Apple Quick Time prior to 7.7 ABSTRACT: Apple QuickTime Buffer Overflows Let Remote Users Execute Arbitrary Code. reference LINKS: Apple security updates SecurityTracker Alert ID: 1025884 Mac OS X: Updating your software Support Downloads QuickTime 7.7 IMPACT ASSESSMENT: High Discussion: A specially crafted PICT file can trigger a buffer overflow [CVE-2011-0245]. Mac OS X version 10.7 is not affected. A specially crafted GIF image can trigger a heap overflow [CVE-2011-0246].

36

T-574: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

74: Google Chrome Multiple Flaws Let Remote Users Execute 74: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code T-574: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code March 10, 2011 - 3:05pm Addthis PROBLEM: Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can bypass the pop-up blocker. PLATFORM: Google Chrome prior to 10.0.648.127 ABSTRACT: Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact while others can be exploited by malicious people bypass certain security restrictions, disclose system information, and compromise a user's system. reference LINKS: Secunia Advisory: SA43683 Google Chrome Support Chrome Stable Release SecurityTracker Alert ID:1025181

37

U-106: Citrix XenServer Multiple Flaws in Web Self Service Have Unspecified  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Citrix XenServer Multiple Flaws in Web Self Service Have 6: Citrix XenServer Multiple Flaws in Web Self Service Have Unspecified Impact U-106: Citrix XenServer Multiple Flaws in Web Self Service Have Unspecified Impact February 17, 2012 - 8:30am Addthis PROBLEM: Multiple vulnerabilities were reported in Citrix XenServer Web Self Service. PLATFORM: Version(s): 5.5, 5.6 SP2, 6.0; Web Self Service prior to 1.1.1 ABSTRACT: A number of security vulnerabilities have been identified in the management web interface of Citrix XenServer Web Self Service. reference LINKS: Citrix Support Center SecurityTracker Alert ID:1026695 IMPACT ASSESSMENT: Medium Discussion: Customers who have installed XenServer but have not additionally downloaded and installed the optional Web Self Service component are not affected by these vulnerabilities. These vulnerabilities affect all currently supported

38

T-636: Wireshark Multiple Flaws Let Remote Users Deny Service | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

T-636: Wireshark Multiple Flaws Let Remote Users Deny Service T-636: Wireshark Multiple Flaws Let Remote Users Deny Service T-636: Wireshark Multiple Flaws Let Remote Users Deny Service June 3, 2011 - 3:35pm Addthis PROBLEM: Wireshark Multiple Flaws Let Remote Users Deny Service PLATFORM: Wireshark Version(s): 1.2.0 to 1.2.16, 1.4.0 to 1.4.6 ABSTRACT: Multiple vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions. reference LINKS: wnpa-sec-2011-07 SecurityTracker Alert ID: 1025597 wnpa-sec-2011-08 IMPACT ASSESSMENT: High Discussion: A remote user can send specially crafted DICOM data, Visual Networks file, compressed capture data, snoop file, or Diameter dictionary file to cause the target service to crash or enter an infinite loop. Versions affected: 1.2.0 to 1.2.16 and 1.4.0 to 1.4.6.

39

Computer model of a kidney being cooled by ice slurry (Quicktime...  

NLE Websites -- All DOE Office Websites (Extended Search)

> Videos Detection & Diagnostic Systems: Computer model of a kidney being cooled by ice slurry Quicktime format Quicktime Format - Mid Bandwidth | Size: 1.12 MB | Bit Rate:...

40

U-004:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

ASSESSMENT: High Discussion: Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. The code...

Note: This page contains sample records for the topic "quicktime multiple flaws" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

U-254: Webmin Flaws Let Remote Authenticated Users Execute Arbitrary...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

System Multiple Vulnerabilities U-255: Apache Wicket Input Validation Flaw Permits Cross-Site Scripting Attacks V-104: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code...

42

Protected Loss of Flow Transient Simulation (Quicktime format, High  

NLE Websites -- All DOE Office Websites (Extended Search)

Engineering Analysis > Videos Engineering Analysis > Videos Engineering Analysis: Protected Loss of Flow Transient Simulation Quicktime format Quicktime Format - High Bandwidth | Size: 25.94 MB | Bit Rate: 1148 kbps Keywords: flow transient, plot, EBR-II, SAS4A, SASSYS-1, passive safety, protected loss of flow, PLOF, shutdown heat removal test, SHRT-17, SHRT17 Elevation plot showing detailed top of core temperatures in experimental assembly XX09 during a protected loss of flow transient in EBR-II. Surrounding assemblies are depicted using fuel average temperatures. Results show excellent decay heat removal capability of sodium through natural circulation and exceptionally low transient temperatures with metallic fuel. :: Please wait until video loads completely :: Closed Captioning Transcript

43

Flaw detection and evaluation  

DOE Patents (OSTI)

The invention provides a method of and apparatus for optically inspecting nuclear fuel pellets for surface flaws. The inspection system includes a prism and lens arrangement for scanning the surface of each pellet as the same is rotated. The resulting scan produces data indicative of the extent and shape of each flaw which is employed to generate a flaw quality index for each detected flaw. The flaw quality indexes from all flaws are summed and compared with an acceptable surface quality index. The result of the comparison is utilized to control the acceptance or rejection of the pellet.

Wilks, Robert S. (Plum, PA); Sturges, Jr., Robert H. (Plum, PA)

1983-01-01T23:59:59.000Z

44

Apparatus and method for detecting flaws in conductive material  

Science Conference Proceedings (OSTI)

The present invention is an improved sensing unit for detecting flaws in conductive material wherein the sensing coil is positioned away from a datum of either the datum point, the datum orientation, or a combination thereof. Position of the sensing coil away from a datum increases sensitivity for detecting flaws having a characteristic volume less than about 1 mm{sup 3}, and further permits detection of subsurface flaws. Use of multiple sensing coils permits quantification of flaw area or volume.

Hockey, R.L.; Riechers, D.M.

1999-11-16T23:59:59.000Z

45

Apparatus and method for detecting flaws in conductive material  

DOE Patents (OSTI)

The present invention is an improved sensing unit for detecting flaws in conductive material wherein the sensing coil is positioned away from a datum of either the datum point, the datum orientation, or a combination thereof. Position of the sensing coil away from a datum increases sensitivity for detecting flaws having a characteristic volume less than about 1 mm.sup.3, and further permits detection of subsurface flaws. Use of multiple sensing coils permits quantification of flaw area or volume.

Hockey, Ronald L. (Richland, WA); Riechers, Douglas M. (Richland, WA)

1999-01-01T23:59:59.000Z

46

Preventing the Worst - MMW Group featured in CNN video (Quicktime format-  

NLE Websites -- All DOE Office Websites (Extended Search)

Quicktime) Quicktime) Multimedia Nuclear Systems Analysis Engineering Analysis Nonproliferation and National Security Detection & Diagnostic Systems Compressive Passive Millimeter-Wave Imager VIDEO TRANSCRIPT Remote Vital Sign Monitoring System Preventing the Worst (by CNN) Engineering Development & Applications Argonne's Nuclear Science & Technology Legacy Other Multimedia Work with Argonne Contact us For Employees Site Map Help Join us on Facebook Follow us on Twitter NE on Flickr Detection & Diagnostic Systems Multimedia Bookmark and Share Preventing the Worst "Preventing the Worst" is a segment of the CNN program "Situation Room", focused on Argonne technologies with anti-terrorism applications. Passive millimeter-wave spectroscopy is one of the technologies featured in the

47

Flaw Detection and Evaluation  

Science Conference Proceedings (OSTI)

Table 2   Planar flaw classification and NDE detection methods...Lack of bonding Forging or rolling lap Casting cold shut Heat treatment cracks Grinding cracks Plating cracks Fatigue cracks Stress-corrosion cracks Welding cracks Lack of fusion Incomplete penetration Brazing debond NDE detection methods Visual Replication microscopy Magnetic particle Magnetic...

48

NIST Engineers Discover Fundamental Flaw in Transistor ...  

Science Conference Proceedings (OSTI)

NIST Engineers Discover Fundamental Flaw in Transistor Noise Theory. For Immediate Release: May 20, 2009. ...

2012-11-02T23:59:59.000Z

49

V-192: Symantec Security Information Manager Input Validation Flaws Permit  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

92: Symantec Security Information Manager Input Validation Flaws 92: Symantec Security Information Manager Input Validation Flaws Permit Cross-Site Scripting, SQL Injection, and Information Disclosure Attacks V-192: Symantec Security Information Manager Input Validation Flaws Permit Cross-Site Scripting, SQL Injection, and Information Disclosure Attacks July 4, 2013 - 6:00am Addthis PROBLEM: Several vulnerabilities were reported in Symantec Security Information Manager PLATFORM: Symantec Security Information Manager Appliance Version 4.7.x and 4.8.0 ABSTRACT: Symantec was notified of multiple security issues impacting the SSIM management console REFERENCE LINKS: SecurityTracker Alert ID: 1028727 Symantec Security Advisory SYM13-006 CVE-2013-1613 CVE-2013-1614 CVE-2013-1615 IMPACT ASSESSMENT: Medium DISCUSSION: The console does not properly filter HTML code from user-supplied input

50

The HMDS Coating Flaw Removal Tool  

Science Conference Proceedings (OSTI)

In many high energy laser systems, optics with HMDS sol gel antireflective coatings are placed in close proximity to each other making them particularly susceptible to certain types of strong optical interactions. During the coating process, halo shaped coating flaws develop around surface digs and particles. Depending on the shape and size of the flaw, the extent of laser light intensity modulation and consequent probability of damaging downstream optics may increase significantly. To prevent these defects from causing damage, a coating flaw removal tool was developed that deploys a spot of decane with a syringe and dissolves away the coating flaw. The residual liquid is evacuated leaving an uncoated circular spot approximately 1mm in diameter. The resulting uncoated region causes little light intensity modulation and thus has a low probability of causing damage in optics downstream from the mitigated flaw site.

Monticelli, M V; Nostrand, M C; Mehta, N; Kegelmeyer, L; Johnson, M A; Fair, J; Widmayer, C

2008-10-24T23:59:59.000Z

51

U-252: Barracuda Web Filter Input Validation Flaws Permit Cross...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Barracuda Web Filter Input Validation Flaws Permit Cross-Site Scripting Attacks U-252: Barracuda Web Filter Input Validation Flaws Permit Cross-Site Scripting Attacks September...

52

U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code September 18, 2012 -...

53

U-010:HP Onboard Administrator Unspecified Flaw Lets Remote Users...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Manager Unspecified Flaw Lets Remote Users Gain Unauthorized Access V-120: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control...

54

U-252: Barracuda Web Filter Input Validation Flaws Permit Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Barracuda Web Filter Input Validation Flaws Permit 2: Barracuda Web Filter Input Validation Flaws Permit Cross-Site Scripting Attacks U-252: Barracuda Web Filter Input Validation Flaws Permit Cross-Site Scripting Attacks September 6, 2012 - 6:00am Addthis PROBLEM: Barracuda Web Filter Input Validation Flaws Permit Cross-Site Scripting Attacks PLATFORM: Barracuda Web Filter 5.0.015 is vulnerable; other versions may also be affected. ABSTRACT: Barracuda Web Filter Authentication Module Multiple HTML Injection Vulnerabilities reference LINKS: Barracuda Networks Barracuda Networks Security ID: BNSEC-279/BNYF-5533 SecurityTracker Alert ID: 1027500 Bugtraq ID: 55394 seclists.org IMPACT ASSESSMENT: Medium Discussion: Two scripts not properly filter HTML code from user-supplied input before displaying the input. A remote user can cause arbitrary scripting code to

55

U-212: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: RSA Authentication Manager Flaws Permit Cross-Site and 2: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks U-212: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks July 13, 2012 - 7:00am Addthis PROBLEM: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks PLATFORM: RSA Authentication Manager 7.1 is vulnerable; other versions may also be affected. ABSTRACT: RSA Authentication Manager is prone to multiple security vulnerabilities because it fails to properly sanitize user-supplied input. Attackers can exploit these issues to execute arbitrary script or HTML code, steal cookie-based authentication credentials, and conduct phishing attacks. Other attacks may also be possible.

56

U-166: Adobe Shockwave Player Memory Corruption Flaws Let Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Adobe Shockwave Player Memory Corruption Flaws Let Remote 6: Adobe Shockwave Player Memory Corruption Flaws Let Remote Users Execute Arbitrary Code U-166: Adobe Shockwave Player Memory Corruption Flaws Let Remote Users Execute Arbitrary Code May 10, 2012 - 7:00am Addthis PROBLEM: Adobe Shockwave Player Memory Corruption Flaws Let Remote Users Execute Arbitrary Code PLATFORM: 11.6.4.634 and prior ABSTRACT: Multiple vulnerabilities were reported in Adobe Shockwave Player. A remote user can cause arbitrary code to be executed on the target user's system. reference LINKS: SecurityTracker Alert ID: 1027037 CVE-2012-2029 CVE-2012-2030 CVE-2012-2031 CVE-2012-2032 CVE-2012-2033 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted Shockwave content that, when loaded by the target user, will trigger a memory corruption error and

57

NON-DESTRUCTIVE FLAW DETECTION APPARATUS  

DOE Patents (OSTI)

An apparatus is described for the non-destructive detection of flaws in electrical conducting articles. The particular feature of the detection apparatus is that a flaw in the front or back of the test article will not be masked by signals caused by the passage of the end and front of the article through the detection apparatus. The present invention alleviates the above problem by mounting detection coils on directly opposite sides of the test passageway so that the axes of the pickup coils are perpendicular to the axis of an energizing coil through which the article is passed. A flaw in the article will cause a change in the voltage induced in one pickup coil, but passage of the end or front of the article will not produce unequal signals. The signals are compared in appropriate electrical circuitry to actuate a recorder only when unequal signals are present, indicating the presence of a flaw.

Stateman, M.J.; Holloway, H.R.

1957-12-17T23:59:59.000Z

58

Steam Generator Management Program: Flaw Handbook Calculator  

Science Conference Proceedings (OSTI)

The EPRI Steam Generator Management Program: Steam Generator Degradation Specific Flaw Handbook v1.0 defines burst pressure equations for steam generator tubes with various degradation morphologies, and the EPRI Steam Generator Management Program: Steam Generator Integrity Assessment Guidelines (1019038) describes a probabilistic evaluation process which can be used to account for key input parameter uncertainties. The Flaw Handbook Calculator software is an automated Microsoft Excelspreadsheet which cal...

2010-04-20T23:59:59.000Z

59

U-254: Webmin Flaws Let Remote Authenticated Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

54: Webmin Flaws Let Remote Authenticated Users Execute 54: Webmin Flaws Let Remote Authenticated Users Execute Arbitrary Code and View Arbitrary Files U-254: Webmin Flaws Let Remote Authenticated Users Execute Arbitrary Code and View Arbitrary Files September 10, 2012 - 6:00am Addthis PROBLEM: Webmin Multiple Input Validation Vulnerabilities PLATFORM: The vulnerabilities are reported in version 1.580. Other versions may also be affected. ABSTRACT: An authenticated attacker may be able to execute arbitrary commands. reference LINKS: Webmin Security Alerts Bugtraq ID: 55446 Secunia Advisory SA50512 SecurityTracker Alert ID: 1027507 US CERT Vulnerability Note VU#788478 CVE-2012-2981 CVE-2012-2982 CVE-2012-2983 IMPACT ASSESSMENT: Medium Discussion: Multiple vulnerabilities have been reported in Webmin, which can be exploited by malicious users to compromise a vulnerable system and by

60

A web-based approach to image-based lighting using high dynamic range images and QuickTime object virtual reality  

E-Print Network (OSTI)

This thesis presents a web-based approach to lighting three-dimensional geometry in a virtual scene. The use of High Dynamic Range (HDR) images for the lighting model makes it possible to convey a greater sense of photorealism than can be provided with a conventional computer generated three-point lighting setup. The use of QuickTime Object Virtual Reality to display the three-dimensional geometry offers a sophisticated user experience and a convenient method for viewing virtual objects over the web. With this work, I generate original High Dynamic Range images for the purpose of image-based lighting and use the QuickTime Object Virtual Reality framework to creatively alter the paradigm of object VR for use in object lighting. The result is two scenarios: one that allows for the virtual manipulation of an object within a lit scene, and another with the virtual manipulation of light around a static object. Future work might include the animation of High Dynamic Range image-based lighting, with emphasis on such features as depth of field and glare generation.

Cuellar, Tamara Melissa

2008-05-01T23:59:59.000Z

Note: This page contains sample records for the topic "quicktime multiple flaws" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

U-143: Google Chrome Multiple Flaws Let Remote Users Execute...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

user. An out-of-bounds memory read error may occur in Skia clipping CVE-2011-3066. A remote user can replace an iframe in a different domain CVE-2011-3067. A use-after-free...

62

V-035: Google Chrome Multiple Flaws Let Remote Users Execute...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

may occur when printing CVE-2012-5135. A bad cast may occur in input element handling CVE-2012-5136. Impact: A remote user can create content that, when loaded by...

63

U-133: Google Chrome Multiple Flaws Let Remote Users Execute...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

ID: 1026841 CVE-2011-3049 Secunia Advisory SA48512 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user,...

64

U-077: Google Chrome Multiple Flaws Let Remote Users Execute...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

overflow in libxml. CVE-2011-3919. A remote user can trigger a stack overflow in glyph handling.CVE-2011-3922. Impact: A remote user can create HTML that, when loaded by the...

65

U-160: Google Chrome Multiple Flaws Let Remote Users Execute...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

occur. A race condition may occur in sandbox IPC. A use-after-free may occur in floats handling CVE-2011-3081. A use-after-free may occur in the xml parser CVE-2012-1521....

66

U-277: Google Chrome Multiple Flaws Let Remote Users Execute...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

CVE-2012-5109 CVE-2012-5110 CVE-2012-5111 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user,...

67

U-219: Symantec Web Gateway Input Validation Flaws Lets Remote...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Symantec Web Gateway Input Validation Flaws Lets Remote Users Inject SQL Commands, Execute Arbitrary Commands, and Change User Passwords U-219: Symantec Web Gateway Input...

68

Procedure for flaw detection in cast stainless steel  

DOE Patents (OSTI)

This paper describes a method of ultrasonic flaw detection in cast stainless steel components incorporating the steps of determining the nature of the microstructure of the cast stainless steel at the site of the flaw detection measurements by ultrasonic means independent of the component thickness at the site. Then, choosing from a plurality of flaw detection techniques, one such technique appropriate to the nature of the microstructure as determined is discussed. The detection of flaws by means of the chosen technique is then detailed.

Kupperman, D.S.

1986-08-29T23:59:59.000Z

69

U-031: Microsoft Active Directory CRL Validation Flaw Lets Remote...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Directory CRL Validation Flaw Lets Remote Users Bypass Authentication. PLATFORM: Windows XP Service Pack 3 Windows XP Professional x64 Edition Service Pack 2 Windows Server...

70

Detection of Subsurface Flaws in Metals with GMR Sensors  

Science Conference Proceedings (OSTI)

Cracks and flaws in multilayered nonferrous metal structure may be quantified by using Giant Magnetoresistive (GMR) sensor based eddy current technique. This noncontact method includes a lift-off distance as great as 3 mm. Aluminum and titanium alloy plates greater than 3 mm thick are successfully inspected. Hidden flaws in second plate down are clearly detected.

Na, J.K.; Franklin, M.A. [Advanced Nondestructive Inspection, General Dynamics, 2700 Indian Ripple Road, Dayton, Ohio 45440 (United States)

2005-04-09T23:59:59.000Z

71

U-161: Citrix Provisioning Services Unspecified Flaw Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Citrix Provisioning Services Unspecified Flaw Lets Remote 1: Citrix Provisioning Services Unspecified Flaw Lets Remote Users Execute Arbitrary Code U-161: Citrix Provisioning Services Unspecified Flaw Lets Remote Users Execute Arbitrary Code May 3, 2012 - 7:00am Addthis PROBLEM: Citrix Provisioning Services Unspecified Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: 6.1 and prior ABSTRACT: A vulnerability was reported in Citrix Provisioning Services. A remote user can execute arbitrary code on the target system. reference LINKS: SecurityTracker Alert ID: 1027004 Secunia Advisory SA48971 Citrix advisory IMPACT ASSESSMENT: Medium Discussion: A remote user can send a specially crafted packet to trigger an unspecified flaw and execute arbitrary code on the target system. The code will run with the privileges of the target service.

72

T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7:Microsoft Windows SSLTLS Protocol Flaw Lets Remote Users Decryption Sessions T-727:Microsoft Windows SSLTLS Protocol Flaw Lets Remote Users Decryption Sessions September 27,...

73

T-541: Citrix Provisioning Services Unspecified Flaw Let's Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

41: Citrix Provisioning Services Unspecified Flaw Let's Remote 41: Citrix Provisioning Services Unspecified Flaw Let's Remote Users Execute Arbitrary Code T-541: Citrix Provisioning Services Unspecified Flaw Let's Remote Users Execute Arbitrary Code January 24, 2011 - 5:34pm Addthis PROBLEM: Citrix Provisioning Services Unspecified Flaw Let's Remote Users Execute Arbitrary Code PLATFORM: * Provisioning Services 5.1 * Provisioning Services 5.6 ABSTRACT: A vulnerability has been identified in Citrix Provisioning Services that could result in arbitrary code execution. This vulnerability can be triggered by an attacker sending a specially crafted packet to the Provisioning Services server. This vulnerability is present in all supported versions of Citrix Provisioning Services up to and including version 5.6. reference LINKS:

74

U-220: Google Android DNS Resolver Randomization Flaw Lets Remote...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Off-by-one Bug Lets Remote Users Deny Service U-271: Google Android Dialer TEL URL Handling Flaw Lets Remote Users Deny Service V-065: Adobe Flash Player Buffer Overflow...

75

V-139: Cisco Network Admission Control Input Validation Flaw...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Sensitive Information U-270:Trend Micro Control Manager Input Validation Flaw in Ad Hoc Query Module Lets Remote Users Inject SQL Commands U-015: CiscoWorks Common Services Home...

76

V-073: IBM Tivoli Federated Identity Manager Signature Verification Flaw  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: IBM Tivoli Federated Identity Manager Signature Verification 3: IBM Tivoli Federated Identity Manager Signature Verification Flaw Lets Remote Users Modify Attributes V-073: IBM Tivoli Federated Identity Manager Signature Verification Flaw Lets Remote Users Modify Attributes January 21, 2013 - 12:15am Addthis PROBLEM: IBM Tivoli Federated Identity Manager Signature Verification Flaw Lets Remote Users Modify Attributes PLATFORM: Tivoli Federated Identity Manager versions 6.2.0, 6.2.1, 6.2.2 ABSTRACT: A vulnerability was reported in IBM Tivoli Federated Identity Manager. REFERENCE LINKS: IBM Security Bulletin: 1615744 SecurityTracker Alert ID: 1028011 CVE-2012-6359 IMPACT ASSESSMENT: Medium DISCUSSION: The system does not check that all attributes have been signed. A remote user with the ability to conduct a man-in-the-middle attack can modify

77

U-021: Cisco Unified Communications Manager Directory Traversal Flaw Lets  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Cisco Unified Communications Manager Directory Traversal 1: Cisco Unified Communications Manager Directory Traversal Flaw Lets Remote Users Obtain Files U-021: Cisco Unified Communications Manager Directory Traversal Flaw Lets Remote Users Obtain Files October 27, 2011 - 7:45am Addthis PROBLEM: Cisco Unified Communications Manager Directory Traversal Flaw Lets Remote Users Obtain Files. PLATFORM: Cisco Unified Communications Manager 6.x, 7.x and 8.x ABSTRACT: A vulnerability was reported in Cisco Unified Communications Manager. reference LINKS: Cisco Advisory ID: cisco-sa-20111026-cucm Cisco Security Advisories and Response SecurityTracker Alert ID: 1026243 CVE-2011-3315 IMPACT ASSESSMENT: Medium Discussion: A remote user can view files on the target system. The software does not properly validate user-supplied input. A remote user can supply a specially

78

V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code April 25, 2013 - 12:14am...

79

V-168: Splunk Web Input Validation Flaw Permits Cross-Site Scripting...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks V-168: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks May 31, 2013 - 6:00am Addthis...

80

V-124: Splunk Web Input Validation Flaw Permits Cross-Site Scripting...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks V-124: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks April 2, 2013 - 1:13am Addthis...

Note: This page contains sample records for the topic "quicktime multiple flaws" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

U-271: Google Android Dialer TEL URL Handling Flaw Lets Remote...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Google Android Dialer TEL URL Handling Flaw Lets Remote Users Deny Service U-271: Google Android Dialer TEL URL Handling Flaw Lets Remote Users Deny Service October 1, 2012 -...

82

V-075: EMC AlphaStor Command Injection and Format String Flaws...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: EMC AlphaStor Command Injection and Format String Flaws Let Remote Users Execute Arbitrary Code V-075: EMC AlphaStor Command Injection and Format String Flaws Let Remote Users...

83

V-104: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code V-104: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code March 5, 2013 - 12:53am Addthis PROBLEM: Oracle Java...

84

U-270:Trend Micro Control Manager Input Validation Flaw in Ad...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0:Trend Micro Control Manager Input Validation Flaw in Ad Hoc Query Module Lets Remote Users Inject SQL Commands U-270:Trend Micro Control Manager Input Validation Flaw in Ad Hoc...

85

U-239: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source Addresses U-239: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source Addresses August 20,...

86

Non-destructive evaluation means and method of flaw reconstruction utilizing an ultrasonic multi-viewing transducer data acquistion system  

DOE Patents (OSTI)

A multi-viewing ultrasound transducer acquisition system for non-destructive evaluation, flaw detection and flaw reconstruction in materials. A multiple transducer assembly includes a central transducer surrounded by a plurality of perimeter transducers, each perimeter transducer having an axis of transmission which can be angularly oriented with respect to the axis of transmission of the central transducer to intersect the axis of transmission of the central transducer. A control apparatus automatically and remotely positions the transducer assembly with respect to the material by a positioning apparatus and adjusts the pe GRANT REFERENCE This invention was conceived and reduced to practice at least in part under a grant from the Department of Energy under Contract No. W-7407-ENG-82.

Thompson, Donald O. (Ames, IA); Wormley, Samuel J. (Ames, IA)

1989-03-28T23:59:59.000Z

87

Fabrication Flaw Density and Distribution In Repairs to Reactor Pressure Vessel and Piping Welds  

Science Conference Proceedings (OSTI)

The Pacific Northwest National Laboratory is developing a generalized fabrication flaw distribution for the population of nuclear reactor pressure vessels and for piping welds in U.S. operating reactors. The purpose of the generalized flaw distribution is to predict component-specific flaw densities. The estimates of fabrication flaws are intended for use in fracture mechanics structural integrity assessments. Structural integrity assessments, such as estimating the frequency of loss-of-coolant accidents, are performed by computer codes that require, as input, accurate estimates of flaw densities. Welds from four different reactor pressure vessels and a collection of archived pipes have been studied to develop empirical estimates of fabrication flaw densities. This report describes the fabrication flaw distribution and characterization in the repair weld metal of vessels and piping. This work indicates that large flaws occur in these repairs. These results show that repair flaws are complex in composition and sometimes include cracks on the ends of the repair cavities. Parametric analysis using an exponential fit is performed on the data. The relevance of construction records is established for describing fabrication processes and product forms. An analysis of these records shows there was a significant change in repair frequency over the years when these components were fabricated. A description of repair flaw morphology is provided with a discussion of fracture mechanics significance. Fabrication flaws in repairs are characterized using optimized-access, high-sensitivity nondestructive ultrasonic testing. Flaw characterizations are then validated by other nondestructive evaluation techniques and complemented by destructive testing.

GJ Schuster, FA Simonen, SR Doctor

2008-04-01T23:59:59.000Z

88

NON-DESTRUCTIVE METHOD AND MEANS FOR FLAW DETECTION  

DOE Patents (OSTI)

BS>An improved method is presented for the nondestructive detection of flaws in olectrictilly conductivc articles using magnetic field. According to thc method a homogoneous mignetic field is established in the test article;it right angle" to the artyicle. A probe is aligned with its axis transverse to the translates so hat th4 probe scans the surface of the test article while the axis of the robe is transverse to the direction of translation of the article. In this manner any output current obtained in thc probe is an indication of the size and location of a flaw in the article under test, with a miiiimum of signal pick- up in the probe from the established magnetic field.

Hochschild, R.

1959-03-10T23:59:59.000Z

89

Acoustic emission: flaw relationship for inservice monitoring of nuclear reactor pressure boundaries. [PWR; BWR  

Science Conference Proceedings (OSTI)

The objective of the acoustic emission (AE)/flaw characterization program is to provide an experimental feasibility evaluation of using the AE method on a continuous basis (during operation and during hydrotest) to detect and analyze flaw growth in reactor pressure vessels and primary piping. This effort is based on the philosophy that AE shows demonstrated capability for being a valuable addition to current nondestructive inspection (NDI) methods with unique capability for continuous monitoring, high sensitivity and remote flaw location.

Not Available

1981-10-01T23:59:59.000Z

90

U-193: NetBSD System Call Return Value Validation Flaw Lets Local...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Technology Centers Field Sites Power Marketing Administration Other Agencies You are here Home U-193: NetBSD System Call Return Value Validation Flaw Lets Local Users Gain...

91

U-247: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Configuration Manager Database Authentication Bypass Vulnerability V-120: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control...

92

Alpha-helical Protein Networks Are Self-protective and Flaw-tolerant  

Science Conference Proceedings (OSTI)

Presentation Title, Alpha-helical Protein Networks Are Self-protective and Flaw- ... Bulk Metallic Glass Composites: A New High-Performance Structural Material.

93

Method for fabricating prescribed flaws in the interior of metals  

SciTech Connect

The method for fabricating a metal body having a flaw of predetermined size and shape located therein comprises placing half of the metal powder required to make the metal body in the die of a press and pressing it to create a flat upper surface thereon. A piece of copper foil is cut to the size and shape of the desired interior crack and placed on the upper surface of the powder and centered in position. The remaining powder is then placed in the die to cover the copper foil. The powder is first cold pressed and removed from the press. The powder metal piece is then sintered in a furnace at a temperature above the melting point of the copper and below the melting point of the metal. It is then removed from the furnace, cooled to room temperature, and placed back in the die and pressed further. This procedure results in an interior flaw or crack. Modified forms of the method involve using a press-sinter-press-sinter cycle with the first sinter being below the melting point of the copper and the second sinter being above the melting point of the copper and below the melting point of the metal.

Hsu, David K. (Ames, IA); Thompson, Donald O. (Ames, IA)

1989-03-07T23:59:59.000Z

94

Steam Generator Management Program: Production of Steam Generator Tubing Flaws by Laboratory Autoclave Exposures  

Science Conference Proceedings (OSTI)

Qualification of a technique for the examination of steam generator tubing requires realistic flaws that are either pulled from service or produced in the laboratory. Due to the scarcity of pulled tube specimens, an effort was undertaken to produce realistic flaws in a laboratory environment. The ability to produce cracks in the laboratory was explored in doped steam, acidic, and caustic environments. These ...

2013-09-24T23:59:59.000Z

95

U-001:Symantec IM Manager Input Validation Flaws | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-001:Symantec IM Manager Input Validation Flaws U-001:Symantec IM Manager Input Validation Flaws U-001:Symantec IM Manager Input Validation Flaws October 3, 2011 - 12:45pm Addthis PROBLEM: Symantec IM Manager Input Validation Flaws Permit Cross-Site Scripting, SQL Injection, and Code Execution Attacks. PLATFORM: Version(s): prior to 8.4.18 ABSTRACT: Symantec IM Manager Input Validation Flaws Permit Cross-Site Scripting, SQL Injection, and Code Execution Attacks. reference LINKS: Security Advisory: SYM11-012 SecurityTracker Alert ID: 1026130 IMPACT ASSESSMENT: Medium Discussion: Several vulnerabilities were reported in Symantec IM Manager. A remote user can conduct cross-site scripting attacks. A remote user can inject SQL commands. Several scripts do not properly filter HTML code from user-supplied input before displaying the input [CVE-2011-0552]. A remote user can create a

96

U-230: Sudo on Red Hat Enterprise Linux %postun Symlink Flaw Lets Local  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Sudo on Red Hat Enterprise Linux %postun Symlink Flaw Lets 0: Sudo on Red Hat Enterprise Linux %postun Symlink Flaw Lets Local Users Gain Elevated Privileges U-230: Sudo on Red Hat Enterprise Linux %postun Symlink Flaw Lets Local Users Gain Elevated Privileges August 8, 2012 - 7:00am Addthis PROBLEM: Sudo on Red Hat Enterprise Linux %postun Symlink Flaw Lets Local Users Gain Elevated Privileges PLATFORM: Red Hat Enterprise Linux (v. 5 server) Red Hat Enterprise Linux Desktop (v. 5 client) ABSTRACT: An updated sudo package that fixes one security issue and several bugs is now available for Red Hat Enterprise Linux 5. reference LINKS: Advisory: RHSA-2012:1149-1 SecurityTracker Alert ID: 1027356 Sudo Main Page Bugzilla 844442 CVE-2012-3440 IMPACT ASSESSMENT: Medium Discussion: A local user can exploit a temporary file symbolic link flaw in the %postun

97

V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Oracle Java Reflection API Flaw Lets Remote Users Execute 2: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code April 25, 2013 - 12:14am Addthis PROBLEM: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Version(s): 7 Update 21; possibly other versions (1.7.0_21-b11) Java Server JRE is also affected. ABSTRACT: A vulnerability was reported in Oracle Java. REFERENCE LINKS: SecurityTracker Alert ID: 1028466 Oracle IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create a specially crafted Java application that, when loaded and approved by the target user, will trigger a flaw in the Reflection API to bypass the security sandbox. IMPACT: A remote user can create a Java file that, when loaded by the target user,

98

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8, 2011 8, 2011 T-686: IBM Tivoli Integrated Portal Java Double Literal Denial of Service Vulnerability IBM Tivoli Integrated Portal Java Double Literal Denial of Service Vulnerability. August 5, 2011 T-685: Cisco Warranty CD May Load Malware From a Remote Site Cisco Warranty CD May Load Malware From a Remote Site. August 4, 2011 T-684: Apple QuickTime Buffer Overflows Let Remote Users Execute Arbitrary Code Apple QuickTime Buffer Overflows Let Remote Users Execute Arbitrary Code. August 3, 2011 T-683:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code. August 2, 2011 T-682:Double free vulnerability in MapServer MapServer developers have discovered flaws in the OGC filter support in

99

U-255: Apache Wicket Input Validation Flaw Permits Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apache Wicket Input Validation Flaw Permits Cross-Site 5: Apache Wicket Input Validation Flaw Permits Cross-Site Scripting Attacks U-255: Apache Wicket Input Validation Flaw Permits Cross-Site Scripting Attacks September 11, 2012 - 6:00am Addthis PROBLEM: Apache Wicket Input Validation Flaw Permits Cross-Site Scripting Attacks PLATFORM: Apache Software Foundation Apache Wicket 1.5.5 Apache Software Foundation Apache Wicket 1.5-RC5.1 Apache Software Foundation Apache Wicket 1.4.20 Apache Software Foundation Apache Wicket 1.4.18 Apache Software Foundation Apache Wicket 1.4.17 Apache Software Foundation Apache Wicket 1.4.16 ABSTRACT: A vulnerability was reported in Apache Wicket reference LINKS: Apache Wicket SecurityTracker Alert ID: 1027508 Bugtraq ID: 55445 CVE-2012-3373 IMPACT ASSESSMENT: Medium Discussion: The software does not properly filter HTML code from user-supplied input in

100

U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Microsoft Internet Explorer Flaw Lets Remote Users Execute 2: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code September 18, 2012 - 6:00am Addthis PROBLEM: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Internet Explorer 6, 7, 8, 9 ABSTRACT: A vulnerability was reported in Microsoft Internet Explorer. reference LINKS: Bugtraq ID: 55562 Security Database KB2757760 Microsoft Security Advisory (2757760) SecurityTracker Alert ID: 1027538 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system. The code will run with the privileges of the

Note: This page contains sample records for the topic "quicktime multiple flaws" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

V-067: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code 7: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code V-067: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code January 11, 2013 - 12:01am Addthis PROBLEM: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Oracle Java Runtime Environment (JRE) 1.7 in Java 7 Update 10 and earlier ABSTRACT: A vulnerability was reported in Oracle Java. REFERENCE LINKS: Seclist.org Vulnerability Note VU#625617 SecurityTracker Alert ID: 1027972 Malware.dontneedcoffee.com CVE-2013-0422 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted Java content that, when loaded by the target user, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user. This vulnerability is being actively exploited.

102

V-156: Linux Kernel Array Bounds Checking Flaw Lets Local Users Gain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Linux Kernel Array Bounds Checking Flaw Lets Local Users 6: Linux Kernel Array Bounds Checking Flaw Lets Local Users Gain Elevated Privileges V-156: Linux Kernel Array Bounds Checking Flaw Lets Local Users Gain Elevated Privileges May 15, 2013 - 12:19am Addthis PROBLEM: Linux Kernel Array Bounds Checking Flaw Lets Local Users Gain Elevated Privileges PLATFORM: Version(s): 2.6.37 to 3.8.9 ABSTRACT: A vulnerability was reported in the Linux Kernel. REFERENCE LINKS: Linux Kernel SecurityTracker Alert ID: 1028565 CVE-2013-2094 IMPACT ASSESSMENT: Medium DISCUSSION: On systems compiled with PERF_EVENTS support, a local user can supply a specially crafted perf_event_open() call to execute arbitrary code on the target system with root privileges. The vulnerability resides in the perf_swevent_init() function in 'kernel/events/core.c'.

103

V-006: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary 6: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service V-006: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service October 19, 2012 - 6:00am Addthis PROBLEM: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service PLATFORM: CA ARCserve Backup for Windows r12.5, r15, r16 ABSTRACT: Two vulnerabilities were reported in CA ARCserve Backup. A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions. REFERENCE LINKS: SecurityTracker Alert ID: 1027683 CA Technologies Support CVE-2012-2971 CVE-2012-2972 IMPACT ASSESSMENT: High DISCUSSION: A remote user can send specially crafted RPC requests to execute arbitrary code on the target system [CVE-2012-2971]. The code will run with the

104

U-015: CiscoWorks Common Services Home Page Input Validation Flaw Lets  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

15: CiscoWorks Common Services Home Page Input Validation Flaw 15: CiscoWorks Common Services Home Page Input Validation Flaw Lets Remote Users Execute Arbitrary Commands U-015: CiscoWorks Common Services Home Page Input Validation Flaw Lets Remote Users Execute Arbitrary Commands October 20, 2011 - 7:30am Addthis PROBLEM: CiscoWorks Common Services Home Page Input Validation Flaw Lets Remote Users Execute Arbitrary Commands. PLATFORM: CiscoWorks Common Services-based products prior to version 4.1 running on Microsoft Windows ABSTRACT: Successful exploitation of this vulnerability may allow an authenticated, remote attacker to execute arbitrary commands on the affected system with the privileges of a system administrator. reference LINKS: Cisco Security Advisory ID: cisco-sa-20111019-cs Cisco Security Advisories and Responses

105

V-095: Oracle Java Flaws Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Oracle Java Flaws Let Remote Users Execute Arbitrary Code 5: Oracle Java Flaws Let Remote Users Execute Arbitrary Code V-095: Oracle Java Flaws Let Remote Users Execute Arbitrary Code February 20, 2013 - 12:38am Addthis PROBLEM: Oracle Java Flaws Let Remote Users Execute Arbitrary Code PLATFORM: JDK and JRE 7 Update 13 and earlier JDK and JRE 6 Update 39 and earlier JDK and JRE 5.0 Update 39 and earlier SDK and JRE 1.4.2_41 and earlier ABSTRACT: Several vulnerabilities were reported in Oracle Java. REFERENCE LINKS: Updated Release of the February 2013 Oracle Java SE Critical Patch Update SecurityTracker Alert ID: 1028155 CVE-2013-1484 CVE-2013-1485 CVE-2013-1486 CVE-2013-1487 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create a specially crafted Java Web Start application or Java applet that, when loaded by the target user, will execute arbitrary

106

T-698: Adobe ColdFusion Input Validation Flaw in 'probe.cfm' Permits  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Adobe ColdFusion Input Validation Flaw in 'probe.cfm' 8: Adobe ColdFusion Input Validation Flaw in 'probe.cfm' Permits Cross-Site Scripting Attacks T-698: Adobe ColdFusion Input Validation Flaw in 'probe.cfm' Permits Cross-Site Scripting Attacks August 22, 2011 - 3:54pm Addthis PROBLEM: A vulnerability was reported in Adobe ColdFusion. A remote user can conduct cross-site scripting attacks. PLATFORM: Adobe ColdFusion 9.x ABSTRACT: Adobe ColdFusion Input Validation Flaw in 'probe.cfm' Permits Cross-Site Scripting Attacks. reference LINKS: Adobe Vulnerability Report Adobe Security Bulletin ColdFusion Support SecurityTracker Alert ID: 1025957 IMPACT ASSESSMENT: Medium Discussion: The 'probe.cfm' script does not properly filter HTML code from user-supplied input in the 'name' parameter before displaying the input. A remote user can create a specially crafted URL that, when loaded by a

107

U-132: Apache Wicket Input Validation Flaw in 'wicket:pageMapName'  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Apache Wicket Input Validation Flaw in 'wicket:pageMapName' 2: Apache Wicket Input Validation Flaw in 'wicket:pageMapName' Parameter Permits Cross-Site Scripting Attacks U-132: Apache Wicket Input Validation Flaw in 'wicket:pageMapName' Parameter Permits Cross-Site Scripting Attacks March 23, 2012 - 7:42am Addthis PROBLEM: Apache Wicket Input Validation Flaw in 'wicket:pageMapName' Parameter Permits Cross-Site Scripting Attacks PLATFORM: Apache Wicket 1.4.x ABSTRACT: A remote user can conduct cross-site scripting attacks. reference LINKS: Apache Wicket CVE-2012-0047 SecurityTracker Alert ID: 1026839 IMPACT ASSESSMENT: High Discussion: The software does not properly filter HTML code from user-supplied input in the 'wicket:pageMapName' request parameter before displaying the input. A remote user can cause arbitrary scripting code to be executed by the target

108

V-075: EMC AlphaStor Command Injection and Format String Flaws Let Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: EMC AlphaStor Command Injection and Format String Flaws Let 5: EMC AlphaStor Command Injection and Format String Flaws Let Remote Users Execute Arbitrary Code V-075: EMC AlphaStor Command Injection and Format String Flaws Let Remote Users Execute Arbitrary Code January 23, 2013 - 12:26am Addthis PROBLEM: EMC AlphaStor Command Injection and Format String Flaws Let Remote Users Execute Arbitrary Code PLATFORM: EMC AlphaStor 4.0 prior to build 800 (All platforms) ABSTRACT: Two vulnerabilities were reported in EMC AlphaStor. REFERENCE LINKS: ESA-2013-008: SecurityTracker Alert ID: 1028020 Secunia Advisory SA51930 CVE-2013-0928 CVE-2013-0929 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can send a specially crafted DCP run command to inject commands and cause the Device Manager (rrobotd.exe) to execute arbitrary code on the target system [CVE-2013-0928].

109

U-089:Apache Struts ParameterInterceptor() Flaw Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9:Apache Struts ParameterInterceptor() Flaw Lets Remote Users 9:Apache Struts ParameterInterceptor() Flaw Lets Remote Users Execute Arbitrary Commands U-089:Apache Struts ParameterInterceptor() Flaw Lets Remote Users Execute Arbitrary Commands January 26, 2012 - 6:45am Addthis PROBLEM: Apache Struts ParameterInterceptor() Flaw Lets Remote Users Execute Arbitrary Commands PLATFORM: Struts 2.0.0 - Struts 2.3.1.1 ABSTRACT: A remote user can execute arbitrary code on the target system. reference LINKS: CVE-2011-3923 SecurityTracker Alert ID: 1026575 Apache Struts 2 Documentation S2-009 blog.o0o.nu IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Apache Struts. The vulnerability allows a malicious user to bypass all the protections (regex pattern, deny method invocation) built into the ParametersInterceptor, thus being able to inject

110

V-179: Blackberry Z10 Flaw Lets Physically Local Users Access the Device |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Blackberry Z10 Flaw Lets Physically Local Users Access the 9: Blackberry Z10 Flaw Lets Physically Local Users Access the Device V-179: Blackberry Z10 Flaw Lets Physically Local Users Access the Device June 17, 2013 - 1:09am Addthis PROBLEM: Blackberry Z10 Flaw Lets Physically Local Users Access the Device PLATFORM: BlackBerry 10 OS version 10.0.10.261 and earlier, except version 10.0.9.2743 ABSTRACT: A vulnerability was reported in Blackberry Z10 Smartphones. REFERENCE LINKS: BlackBerry Security Advisory KB34458 SecurityTracker Alert ID: 1028669 CVE-2013-3692 IMPACT ASSESSMENT: Medium DISCUSSION: On systems with BlackBerry Protect enabled, if the user resets the device password via BlackBerry Protect and downloads a specifically crafted applications, then a physically local user can access or modify data on the device. The vulnerability is due to unsafe permissions on a BlackBerry Protect

111

U-247: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass 7: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass Authentication and Gain Administrative Access U-247: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass Authentication and Gain Administrative Access August 29, 2012 - 6:00am Addthis PROBLEM: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass Authentication and Gain Administrative Access PLATFORM: EMC Cloud Tiering Appliance (CTA) 7.4 and prior EMC Cloud Tiering Appliance Virtual Edition (CTA/VE) 7.4 and prior EMC Cloud Tiering Appliance (CTA) 9.0 and prior EMC Cloud Tiering Appliance Virtual Edition (CTA/VE) 9.0 and prior ABSTRACT: A vulnerability was reported in EMC Cloud Tiering Appliance. reference LINKS: SecurityTracker Alert ID: 1027448 Bugtraq ID: 55250 EMC.com CVE-2012-2285 IMPACT ASSESSMENT:

112

U-219: Symantec Web Gateway Input Validation Flaws Lets Remote Users Inject  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

19: Symantec Web Gateway Input Validation Flaws Lets Remote 19: Symantec Web Gateway Input Validation Flaws Lets Remote Users Inject SQL Commands, Execute Arbitrary Commands, and Change User Passwords U-219: Symantec Web Gateway Input Validation Flaws Lets Remote Users Inject SQL Commands, Execute Arbitrary Commands, and Change User Passwords July 24, 2012 - 7:00am Addthis PROBLEM: Symantec Web Gateway Input Validation Flaws Lets Remote Users Inject SQL Commands, Execute Arbitrary Commands, and Change User Passwords PLATFORM: Symantec Web Gateway 5.0.x.x ABSTRACT: Several vulnerabilities were reported in Symantec Web Gateway. REFERENCE LINKS: Security Advisories Relating to Symantec Products SecurityTracker Alert ID: 1027289 Bugtraq ID: 54424 Bugtraq ID: 54425 Bugtraq ID: 54426 Bugtraq ID: 54427 Bugtraq ID: 54429 Bugtraq ID: 54430

113

T-650: Microsoft Word Unspecified Flaw Lets Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

650: Microsoft Word Unspecified Flaw Lets Remote Users Execute 650: Microsoft Word Unspecified Flaw Lets Remote Users Execute Arbitrary Code T-650: Microsoft Word Unspecified Flaw Lets Remote Users Execute Arbitrary Code June 20, 2011 - 3:35pm Addthis PROBLEM: A vulnerability was reported in Microsoft Word. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Office XP; possibly other versions ABSTRACT: Microsoft Word Unspecified Flaw Lets Remote Users Execute Arbitrary Code. reference LINKS: Secunia Advisory: SA44923 SecurityTracker Alert ID: 1025675 Bugtraq ID: 48261 TSL ID: TSL20110614-02 PRL: 2011-07 IMPACT ASSESSMENT: High Discussion: A code execution vulnerability has been reported in Microsoft Office Word. The vulnerability is due to memory corruption when parsing a specially crafted Word file.

114

T-720: Blue Coat Director HTTP Trace Processing Flaw Permits Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Blue Coat Director HTTP Trace Processing Flaw Permits 0: Blue Coat Director HTTP Trace Processing Flaw Permits Cross-Site Scripting Attacks T-720: Blue Coat Director HTTP Trace Processing Flaw Permits Cross-Site Scripting Attacks September 19, 2011 - 8:45am Addthis PROBLEM Blue Coat Director HTTP Trace Processing Flaw Permits Cross-Site Scripting Attacks. PLATFORM: All versions of Director prior to 5.5.2.3 are vulnerable. ABSTRACT: A vulnerability was reported in Blue Coat Director. A remote user can conduct cross-site scripting attacks. reference LINKS: Blue Coat Advisories ID: SA62 SecurityTracker Alert ID: 1026061 Blue Coat Director 510 Blue Coat SGME 5 IMPACT ASSESSMENT: Medium Discussion: An attacker can use the HTTP TRACE method to echo malicious script back to the client as part of a Cross Site Scripting (XSS) attack. No

115

V-124: Splunk Web Input Validation Flaw Permits Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Splunk Web Input Validation Flaw Permits Cross-Site 4: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks V-124: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks April 2, 2013 - 1:13am Addthis PROBLEM: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks PLATFORM: Version(s): 4.3.0 through 4.3.5 ABSTRACT: A vulnerability was reported in Splunk Web. REFERENCE LINKS: SecurityTracker Alert ID: 1028371 Splunk IMPACT ASSESSMENT: High DISCUSSION: Splunk Web does not properly filter HTML code from user-supplied input before displaying the input. A remote user can cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the site running the Splunk Web software and will run in the security context of that site. As a result, the code will be able to access the

116

V-058: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw 8: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code V-058: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code December 31, 2012 - 6:58am Addthis PROBLEM: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Version(s): 6, 7, 8 ABSTRACT: A vulnerability was reported in Microsoft Internet Explorer. A remote user can cause arbitrary code to be executed on the target user's system. REFERENCE LINKS: SecurityTracker Alert ID: 1027930 Secunia Advisory SA51695 CVE-2012-4792 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary

117

V-067: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code 7: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code V-067: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code January 11, 2013 - 12:01am Addthis PROBLEM: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Oracle Java Runtime Environment (JRE) 1.7 in Java 7 Update 10 and earlier ABSTRACT: A vulnerability was reported in Oracle Java. REFERENCE LINKS: Seclist.org Vulnerability Note VU#625617 SecurityTracker Alert ID: 1027972 Malware.dontneedcoffee.com CVE-2013-0422 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted Java content that, when loaded by the target user, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user. This vulnerability is being actively exploited.

118

U-048: HP LaserJet Printers Unspecified Flaw Lets Remote Users Update  

NLE Websites -- All DOE Office Websites (Extended Search)

8: HP LaserJet Printers Unspecified Flaw Lets Remote Users 8: HP LaserJet Printers Unspecified Flaw Lets Remote Users Update Firmware with Arbitrary Code U-048: HP LaserJet Printers Unspecified Flaw Lets Remote Users Update Firmware with Arbitrary Code November 30, 2011 - 8:15am Addthis PROBLEM: HP LaserJet Printers Unspecified Flaw Lets Remote Users Update Firmware with Arbitrary Code . PLATFORM: HP LaserJet Printers manufactured prior to 2009 ABSTRACT A remote user can upgrade the printer's firmware with arbitrary code. reference LINKS: SecurityTracker Alert ID:1026357 HP Security for Imaging and Printing HP Clarifies on Printer Security IMPACT ASSESSMENT: Low Discussion: A vulnerability was reported in some HP LaserJet Printers. A remote user can update the firmware with arbitrary code. A remote user can send a specially crafted print job or specially crafted data to the

119

T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users 7:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions September 27, 2011 - 8:00am Addthis PROBLEM: Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions. PLATFORM: Windows XP Service Pack 3 Windows XP Professional x64 Edition Service Pack 2 Windows Server 2003 Service Pack 2 Windows Server 2003 x64 Edition Service Pack 2 Windows Server 2003 with SP2 for Itanium-based Systems Windows Vista Service Pack 2 Windows Vista x64 Edition Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 Windows Server 2008 for x64-based Systems Service Pack 2 Windows Server 2008 for Itanium-based Systems Service Pack 2 Windows 7 for 32-bit Systems and Windows 7 for 32-bit Systems Service Pack

120

T-713: Blue Coat Reporter Directory Traversal Flaw | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Blue Coat Reporter Directory Traversal Flaw 3: Blue Coat Reporter Directory Traversal Flaw T-713: Blue Coat Reporter Directory Traversal Flaw September 9, 2011 - 10:47am Addthis PROBLEM: A vulnerability was reported in Blue Coat Reporter. A remote user can view files on the target system and gain full control of the target application. PLATFORM: All pre-9.3 versions of Reporter installed on a Windows server are vulnerable. ABSTRACT: Blue Coat Reporter Directory Traversal Flaw Lets Remote Users Gain Full Control. reference LINKS: Blue Coat Security Advisory ID: SA60 SecurityTracker Alert ID: 1026023 About Path Traversal IMPACT ASSESSMENT: High Discussion: Reporter installed on a Windows server is vulnerable to an HTTP directory traversal attack. An unauthenticated user can browse the file system and read any file. Data from these files can be used by an attacker to gain

Note: This page contains sample records for the topic "quicktime multiple flaws" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users 7:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions September 27, 2011 - 8:00am Addthis PROBLEM: Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions. PLATFORM: Windows XP Service Pack 3 Windows XP Professional x64 Edition Service Pack 2 Windows Server 2003 Service Pack 2 Windows Server 2003 x64 Edition Service Pack 2 Windows Server 2003 with SP2 for Itanium-based Systems Windows Vista Service Pack 2 Windows Vista x64 Edition Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 Windows Server 2008 for x64-based Systems Service Pack 2 Windows Server 2008 for Itanium-based Systems Service Pack 2 Windows 7 for 32-bit Systems and Windows 7 for 32-bit Systems Service Pack

122

U-263: Trend Micro InterScan Messaging Security Flaws Permit Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Trend Micro InterScan Messaging Security Flaws Permit 3: Trend Micro InterScan Messaging Security Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks U-263: Trend Micro InterScan Messaging Security Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks September 19, 2012 - 6:00am Addthis PROBLEM: Trend Micro InterScan Messaging Security Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks PLATFORM: 7.1-Build_Win32_1394; possibly other versions ABSTRACT: A vulnerability was reported in Trend Micro InterScan Messaging Security. reference LINKS: US CERT Vulnerability Note VU#471364 SecurityTracker Alert ID: 1027544 CVE-2012-2995 CVE-2012-2996 Micro Trend IMPACT ASSESSMENT: Medium Discussion: Several scripts do not properly filter HTML code from user-supplied input

123

V-139: Cisco Network Admission Control Input Validation Flaw Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Cisco Network Admission Control Input Validation Flaw Lets 9: Cisco Network Admission Control Input Validation Flaw Lets Remote Users Inject SQL Commands V-139: Cisco Network Admission Control Input Validation Flaw Lets Remote Users Inject SQL Commands April 21, 2013 - 11:50pm Addthis PROBLEM: Cisco Network Admission Control Input Validation Flaw Lets Remote Users Inject SQL Commands PLATFORM: Cisco NAC Manager versions prior to 4.8.3.1 and 4.9.2 ABSTRACT: A vulnerability was reported in Cisco Network Admission Control. REFERENCE LINKS: SecurityTracker Alert ID: 1028451 Cisco Advisory ID: cisco-sa-20130417-nac CVE-2013-1177 IMPACT ASSESSMENT: High DISCUSSION: The Cisco Network Admission Control (NAC) Manager does not properly validate user-supplied input. A remote user can supply a specially crafted parameter value to execute SQL commands on the underlying database.

124

U-180: Cisco IOS XR Packet Processing Flaw | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

80: Cisco IOS XR Packet Processing Flaw 80: Cisco IOS XR Packet Processing Flaw U-180: Cisco IOS XR Packet Processing Flaw May 31, 2012 - 7:00am Addthis PROBLEM: A vulnerability was reported in Cisco IOS XR. PLATFORM: Version(s): XR 4.0.3, 4.0.4, 4.1.0, 4.1.1, 4.1.2, and 4.2.0 ABSTRACT: A remote user can cause denial of service conditions. Reference Links: Security Tracker ID 1027104 CVE-2012-2488 Vendor Advisory IMPACT ASSESSMENT: High Discussion: A remote user can send a specially crafted packet to the target device to cause the route processor to be unable to transmit route processor-based protocol packets to the fabric. IP traffic transiting the device cannot trigger the flaw. Cisco IOS XR is affected on the Cisco 9000 Series Aggregation Services Routers (ASR) Route Switch Processor (RSP440) and the Cisco Carrier Routing

125

U-134: Apache Traffic Server Host Header Processing Flaw Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Apache Traffic Server Host Header Processing Flaw Lets 4: Apache Traffic Server Host Header Processing Flaw Lets Remote Users Deny Service U-134: Apache Traffic Server Host Header Processing Flaw Lets Remote Users Deny Service March 27, 2012 - 7:00am Addthis PROBLEM: Apache Traffic Server Host Header Processing Flaw Lets Remote Users Deny Service PLATFORM: Versions prior to 3.0.4 and 3.1.3 ABSTRACT: A vulnerability was reported in Apache Traffic Server. A remote user can cause denial of service conditions. reference LINKS: SecurityTracker Alert ID: 1026847 CVE-2012-0256 Secunia Advisory SA48509 IMPACT ASSESSMENT: High Discussion: A remote user can send a request with a specially crafted 'Host' header value to trigger a heap allocation error and cause the target service to crash. Impact: A remote user can cause the target service to crash.

126

V-075: EMC AlphaStor Command Injection and Format String Flaws Let Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: EMC AlphaStor Command Injection and Format String Flaws Let 5: EMC AlphaStor Command Injection and Format String Flaws Let Remote Users Execute Arbitrary Code V-075: EMC AlphaStor Command Injection and Format String Flaws Let Remote Users Execute Arbitrary Code January 23, 2013 - 12:26am Addthis PROBLEM: EMC AlphaStor Command Injection and Format String Flaws Let Remote Users Execute Arbitrary Code PLATFORM: EMC AlphaStor 4.0 prior to build 800 (All platforms) ABSTRACT: Two vulnerabilities were reported in EMC AlphaStor. REFERENCE LINKS: ESA-2013-008: SecurityTracker Alert ID: 1028020 Secunia Advisory SA51930 CVE-2013-0928 CVE-2013-0929 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can send a specially crafted DCP run command to inject commands and cause the Device Manager (rrobotd.exe) to execute arbitrary code on the target system [CVE-2013-0928].

127

U-238: HP Service Manager Input Validation Flaw Permits Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: HP Service Manager Input Validation Flaw Permits Cross-Site 8: HP Service Manager Input Validation Flaw Permits Cross-Site Scripting Attacks U-238: HP Service Manager Input Validation Flaw Permits Cross-Site Scripting Attacks August 17, 2012 - 7:00am Addthis PROBLEM: HP Service Manager Input Validation Flaw Permits Cross-Site Scripting Attacks PLATFORM: Version(s): 7.11, 9.21, 9.30 ABSTRACT: Cross-site scripting (XSS) vulnerability in HP Service Manager Web Tier 7.11, 9.21, and 9.30, and HP Service Center Web Tier 6.28, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. REFERENCE LINKS: www2.hp.com http://www.securitytracker.com/id/1027399 CVE-2012-3251 IMPACT ASSESSMENT: Moderate Discussion: A vulnerability was reported in HP Service Manager. A remote user can conduct cross-site scripting attacks. The software does not properly filter

128

U-010:HP Onboard Administrator Unspecified Flaw Lets Remote Users Gain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0:HP Onboard Administrator Unspecified Flaw Lets Remote Users 0:HP Onboard Administrator Unspecified Flaw Lets Remote Users Gain Access U-010:HP Onboard Administrator Unspecified Flaw Lets Remote Users Gain Access October 13, 2011 - 8:15am Addthis PROBLEM: HP Onboard Administrator Unspecified Flaw Lets Remote Users Gain Access PLATFORM: Onboard Administrator (OA) 3.21 through 3.31 ABSTRACT: A remote user can gain access to the target system reference LINKS: HP Support document ID: c03048779 SecurityTracker Alert ID: 1026158 CVE-2011-3155 IMPACT ASSESSMENT: Medium Discussion: A potential security vulnerability has been identified with HP Onboard Administrator (OA). The vulnerability could be exploited remotely to gain unauthorized access. Impact: A remote user can gain access to the target system. Solution: Onboard Administrator (OA) v3.32 is available.

129

U-134: Apache Traffic Server Host Header Processing Flaw Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

34: Apache Traffic Server Host Header Processing Flaw Lets 34: Apache Traffic Server Host Header Processing Flaw Lets Remote Users Deny Service U-134: Apache Traffic Server Host Header Processing Flaw Lets Remote Users Deny Service March 27, 2012 - 7:00am Addthis PROBLEM: Apache Traffic Server Host Header Processing Flaw Lets Remote Users Deny Service PLATFORM: Versions prior to 3.0.4 and 3.1.3 ABSTRACT: A vulnerability was reported in Apache Traffic Server. A remote user can cause denial of service conditions. reference LINKS: SecurityTracker Alert ID: 1026847 CVE-2012-0256 Secunia Advisory SA48509 IMPACT ASSESSMENT: High Discussion: A remote user can send a request with a specially crafted 'Host' header value to trigger a heap allocation error and cause the target service to crash. Impact: A remote user can cause the target service to crash.

130

V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Apache VCL Input Validation Flaw Lets Remote Authenticated 0: Apache VCL Input Validation Flaw Lets Remote Authenticated Users Gain Elevated Privileges V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated Users Gain Elevated Privileges May 7, 2013 - 12:01am Addthis PROBLEM: Apache VCL Input Validation Flaw Lets Remote Authenticated Users Gain Elevated Privileges PLATFORM: Apache VCL Versions: 2.1, 2.2, 2.2.1, 2.3, 2.3.1 ABSTRACT: A vulnerability was reported in Apache VCL. REFERENCE LINKS: Apache Securelist SecurityTracker Alert ID: 1028515 CVE-2013-0267 IMPACT ASSESSMENT: Medium DISCUSSION: A remote authenticated administrative user with minimal administrative privileges (i.e., nodeAdmin, manageGroup, resourceGrant, or userGrant) can send specially crafted data via the web interface or XMLRPC API to gain additional administrative privileges.

131

U-206: WordPress Flaws Permit Cross-Site Scripting, Cross-Site Request  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: WordPress Flaws Permit Cross-Site Scripting, Cross-Site 6: WordPress Flaws Permit Cross-Site Scripting, Cross-Site Request Forgery, and Information Disclosure Attacks U-206: WordPress Flaws Permit Cross-Site Scripting, Cross-Site Request Forgery, and Information Disclosure Attacks July 6, 2012 - 7:00am Addthis PROBLEM: WordPress Flaws Permit Cross-Site Scripting, Cross-Site Request Forgery, and Information Disclosure Attacks PLATFORM: Version(s): prior to 3.4.1 ABSTRACT: Several vulnerabilities were reported in WordPress. A remote authenticated user can conduct cross-site scripting attacks. A remote user can conduct cross-site request forgery attacks. A remote authenticated user can obtain potentially sensitive information. reference LINKS: The Vendor's Advisory WordPress 3.4.1 Maintenance and Security Release SecurityTracker Alert ID: 1027219

132

U-219: Symantec Web Gateway Input Validation Flaws Lets Remote Users Inject  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

19: Symantec Web Gateway Input Validation Flaws Lets Remote 19: Symantec Web Gateway Input Validation Flaws Lets Remote Users Inject SQL Commands, Execute Arbitrary Commands, and Change User Passwords U-219: Symantec Web Gateway Input Validation Flaws Lets Remote Users Inject SQL Commands, Execute Arbitrary Commands, and Change User Passwords July 24, 2012 - 7:00am Addthis PROBLEM: Symantec Web Gateway Input Validation Flaws Lets Remote Users Inject SQL Commands, Execute Arbitrary Commands, and Change User Passwords PLATFORM: Symantec Web Gateway 5.0.x.x ABSTRACT: Several vulnerabilities were reported in Symantec Web Gateway. REFERENCE LINKS: Security Advisories Relating to Symantec Products SecurityTracker Alert ID: 1027289 Bugtraq ID: 54424 Bugtraq ID: 54425 Bugtraq ID: 54426 Bugtraq ID: 54427 Bugtraq ID: 54429 Bugtraq ID: 54430

133

U-229: HP Network Node Manager i Input Validation Flaw Permits Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: HP Network Node Manager i Input Validation Flaw Permits 9: HP Network Node Manager i Input Validation Flaw Permits Cross-Site Scripting Attacks U-229: HP Network Node Manager i Input Validation Flaw Permits Cross-Site Scripting Attacks August 7, 2012 - 7:00am Addthis PROBLEM: HP Network Node Manager i Input Validation Flaw Permits Cross-Site Scripting Attacks PLATFORM: HP Network Node Manager I (NNMi) v8.x, v9.0x, v9.1x, v9.20 for HP-UX, Linux, Solaris, and Windows ABSTRACT: Potential security vulnerabilities have been identified with HP Network Node Manager i (NNMi) for HP-UX, Linux, Solaris, and Windows. The vulnerabilities could be remotely exploited resulting in cross site scripting (XSS). Reference LINKS: HP Document ID: c03405705 SecurityTracker Alert ID: 1027345 Bugtraq ID: 54815 CVE-2012-2022 IMPACT ASSESSMENT:

134

V-006: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary 6: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service V-006: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service October 19, 2012 - 6:00am Addthis PROBLEM: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service PLATFORM: CA ARCserve Backup for Windows r12.5, r15, r16 ABSTRACT: Two vulnerabilities were reported in CA ARCserve Backup. A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions. REFERENCE LINKS: SecurityTracker Alert ID: 1027683 CA Technologies Support CVE-2012-2971 CVE-2012-2972 IMPACT ASSESSMENT: High DISCUSSION: A remote user can send specially crafted RPC requests to execute arbitrary code on the target system [CVE-2012-2971]. The code will run with the

135

V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Adobe Flash Player Memory Corruption Flaw Lets Remote Users 6: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code June 12, 2013 - 12:15am Addthis PROBLEM: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Adobe Flash Player 11.7.700.202 and earlier versions for Windows Adobe Flash Player 11.7.700.203 and earlier versions for Macintosh Adobe Flash Player 11.2.202.285 and earlier versions for Linux Adobe Flash Player 11.1.115.58 and earlier versions for Android 4.x Adobe Flash Player 11.1.111.54 and earlier versions for Android 3.x and 2.x Adobe AIR 3.7.0.1860 and earlier versions for Windows and Macintosh Adobe AIR 3.7.0.1860 and earlier versions for Android

136

U-258: Adobe Flash Player Flaw Lets Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Adobe Flash Player Flaw Lets Remote Users Execute Arbitrary 8: Adobe Flash Player Flaw Lets Remote Users Execute Arbitrary Code U-258: Adobe Flash Player Flaw Lets Remote Users Execute Arbitrary Code September 12, 2012 - 1:07pm Addthis PROBLEM: Adobe Flash Player Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: 11.3.300.270 and prior (Windows, OS X); 11.2.202.236 and prior (Linux); 11.3.300.270 and prior (Chrome) ABSTRACT: A remote user can cause arbitrary code to be executed on the target user's system. Reference LINKS: CVE-2012-1535 AdobeSecurity/bulletins SecurityTracker IMPACT ASSESSMENT: High Discussion: Vulnerability was reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a specially crafted file that, when loaded by the target user,

137

U-050: Adobe Flex SDK Input Validation Flaw Permits Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Adobe Flex SDK Input Validation Flaw Permits Cross-Site 0: Adobe Flex SDK Input Validation Flaw Permits Cross-Site Scripting Attacks U-050: Adobe Flex SDK Input Validation Flaw Permits Cross-Site Scripting Attacks December 2, 2011 - 5:24am Addthis PROBLEM: Adobe Flex SDK Input Validation Flaw Permits Cross-Site Scripting Attacks. PLATFORM: Adobe Flex SDK 4.5.1 and earlier 4.x versions for Windows, Macintosh and Linux Adobe Flex SDK 3.6 and earlier 3.x versions for Windows, Macintosh and Linux ABSTRACT: Flex applications created using the Flex SDK may not properly filter HTML code from user-supplied input before displaying the input. reference LINKS: Adobe Security Bulletin CVE-2011-2461 SecurityTracker Alert ID: 1026361 IMPACT ASSESSMENT: High Discussion: A remote user may be able to cause arbitrary scripting code to be executed

138

U-239: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

39: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS 39: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source Addresses U-239: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source Addresses August 20, 2012 - 7:00am Addthis PROBLEM: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source Addresses PLATFORM: Version(s): 6 beta 4 and prior versions ABSTRACT: A remote user can spoof SMS source addresses. Reference LINKS: SecurityTracker Alert ID: 1027410 Apple.com PCMag.com The original advisory IMPACT ASSESSMENT: Medum Discussion: A vulnerability was reported in Apple iPhone. A remote user can send an SMS message with a specially crafted User Data Header (UDH) value that specifies an alternate reply address. The recipient's iPhone will display the reply address as the source of the SMS.

139

U-238: HP Service Manager Input Validation Flaw Permits Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

38: HP Service Manager Input Validation Flaw Permits Cross-Site 38: HP Service Manager Input Validation Flaw Permits Cross-Site Scripting Attacks U-238: HP Service Manager Input Validation Flaw Permits Cross-Site Scripting Attacks August 17, 2012 - 7:00am Addthis PROBLEM: HP Service Manager Input Validation Flaw Permits Cross-Site Scripting Attacks PLATFORM: Version(s): 7.11, 9.21, 9.30 ABSTRACT: Cross-site scripting (XSS) vulnerability in HP Service Manager Web Tier 7.11, 9.21, and 9.30, and HP Service Center Web Tier 6.28, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. REFERENCE LINKS: www2.hp.com http://www.securitytracker.com/id/1027399 CVE-2012-3251 IMPACT ASSESSMENT: Moderate Discussion: A vulnerability was reported in HP Service Manager. A remote user can conduct cross-site scripting attacks. The software does not properly filter

140

U-220: Google Android DNS Resolver Randomization Flaw Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Google Android DNS Resolver Randomization Flaw Lets Remote 0: Google Android DNS Resolver Randomization Flaw Lets Remote Users Poison the DNS Cache U-220: Google Android DNS Resolver Randomization Flaw Lets Remote Users Poison the DNS Cache July 25, 2012 - 7:00am Addthis PROBLEM: Google Android DNS Resolver Randomization Flaw Lets Remote Users Poison the DNS Cache PLATFORM: Version(s): 4.0.4 and prior versions ABSTRACT: A remote user can poison the DNS cache. reference LINKS: IBM Application Security Research Group SecurityTracker Alert ID: 1027291 Bugtraq ID: 523624 CVE-2012-2808 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Google Android. The res_randomid() function, which bases a return value on the process ID and the current time, is called twice in quick succession. As a result, the effective

Note: This page contains sample records for the topic "quicktime multiple flaws" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

T-602: BlackBerry Enterprise Server Input Validation Flaw in...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

02: BlackBerry Enterprise Server Input Validation Flaw in BlackBerry Web Desktop Manager Permits Cross-Site Scripting Attacks T-602: BlackBerry Enterprise Server Input Validation...

142

T-698: Adobe ColdFusion Input Validation Flaw in 'probe.cfm' Permits  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Adobe ColdFusion Input Validation Flaw in 'probe.cfm' 8: Adobe ColdFusion Input Validation Flaw in 'probe.cfm' Permits Cross-Site Scripting Attacks T-698: Adobe ColdFusion Input Validation Flaw in 'probe.cfm' Permits Cross-Site Scripting Attacks August 22, 2011 - 3:54pm Addthis PROBLEM: A vulnerability was reported in Adobe ColdFusion. A remote user can conduct cross-site scripting attacks. PLATFORM: Adobe ColdFusion 9.x ABSTRACT: Adobe ColdFusion Input Validation Flaw in 'probe.cfm' Permits Cross-Site Scripting Attacks. reference LINKS: Adobe Vulnerability Report Adobe Security Bulletin ColdFusion Support SecurityTracker Alert ID: 1025957 IMPACT ASSESSMENT: Medium Discussion: The 'probe.cfm' script does not properly filter HTML code from user-supplied input in the 'name' parameter before displaying the input. A remote user can create a specially crafted URL that, when loaded by a

143

U-031: Microsoft Active Directory CRL Validation Flaw Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Microsoft Active Directory CRL Validation Flaw Lets Remote 1: Microsoft Active Directory CRL Validation Flaw Lets Remote Users Bypass Authentication U-031: Microsoft Active Directory CRL Validation Flaw Lets Remote Users Bypass Authentication November 9, 2011 - 8:30am Addthis PROBLEM: Microsoft Active Directory CRL Validation Flaw Lets Remote Users Bypass Authentication. PLATFORM: Windows XP Service Pack 3 Windows XP Professional x64 Edition Service Pack 2 Windows Server 2003 Service Pack 2 Windows Server 2003 x64 Edition Service Pack 2 Active Directory Windows Server 2003 with SP2 for Itanium-based Systems Windows Vista Service Pack 2 Windows Vista x64 Edition Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 Windows Server 2008 for x64-based Systems Service Pack 2 Windows 7 for 32-bit Systems Windows 7 for 32-bit Systems Service Pack 1

144

U-270:Trend Micro Control Manager Input Validation Flaw in Ad Hoc Query  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0:Trend Micro Control Manager Input Validation Flaw in Ad Hoc 0:Trend Micro Control Manager Input Validation Flaw in Ad Hoc Query Module Lets Remote Users Inject SQL Commands U-270:Trend Micro Control Manager Input Validation Flaw in Ad Hoc Query Module Lets Remote Users Inject SQL Commands September 28, 2012 - 6:00am Addthis PROBLEM: Trend Micro Control Manager Input Validation Flaw in Ad Hoc Query Module Lets Remote Users Inject SQL Commands PLATFORM: Control Manager - 3.0, 3.5, 5.0, 5.5, 6.0 ABSTRACT: Trend Micro has been notified of a potential product vulnerability in Control Manager. reference LINKS: Trend Micro Technical Support ID 1061043 SecurityTracker Alert ID: 1027584 Secunia Advisory SA50760 CVE-2012-2998 IMPACT ASSESSMENT: Medium Discussion: A vulnerability has been reported in Trend Micro Control Manager, which can

145

V-049: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users  

NLE Websites -- All DOE Office Websites (Extended Search)

9: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let 9: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users Execute Arbitrary Code V-049: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users Execute Arbitrary Code December 18, 2012 - 1:30am Addthis PROBLEM: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users Execute Arbitrary Code PLATFORM: Windows RealPlayer 15.0.6.14 and prior. ABSTRACT: Two vulnerabilities were reported in RealPlayer. REFERENCE LINKS: RealPlayer Security Vulnerabilities Secunia Advisory SA51589 SecurityTracker Alert ID: 1027893 CVE-2012-5690 CVE-2012-5691 IMPACT ASSESSMENT: Medium DISCUSSION: Two vulnerabilities have been reported in RealPlayer, which can be exploited by malicious people to compromise a user's system. A remote user can create a specially crafted RealAudio file that, when

146

U-015: CiscoWorks Common Services Home Page Input Validation Flaw Lets  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: CiscoWorks Common Services Home Page Input Validation Flaw 5: CiscoWorks Common Services Home Page Input Validation Flaw Lets Remote Users Execute Arbitrary Commands U-015: CiscoWorks Common Services Home Page Input Validation Flaw Lets Remote Users Execute Arbitrary Commands October 20, 2011 - 7:30am Addthis PROBLEM: CiscoWorks Common Services Home Page Input Validation Flaw Lets Remote Users Execute Arbitrary Commands. PLATFORM: CiscoWorks Common Services-based products prior to version 4.1 running on Microsoft Windows ABSTRACT: Successful exploitation of this vulnerability may allow an authenticated, remote attacker to execute arbitrary commands on the affected system with the privileges of a system administrator. reference LINKS: Cisco Security Advisory ID: cisco-sa-20111019-cs Cisco Security Advisories and Responses

147

U-242: Linux Kernel Netlink SCM_CREDENTIALS Processing Flaw Lets Local  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Linux Kernel Netlink SCM_CREDENTIALS Processing Flaw Lets 2: Linux Kernel Netlink SCM_CREDENTIALS Processing Flaw Lets Local Users Gain Elevated Privileges U-242: Linux Kernel Netlink SCM_CREDENTIALS Processing Flaw Lets Local Users Gain Elevated Privileges August 23, 2012 - 7:00am Addthis PROBLEM: Linux Kernel Netlink SCM_CREDENTIALS Processing Flaw Lets Local Users Gain Elevated Privileges PLATFORM: Linux Kernel 3.2.x Linux Kernel 3.4.x Linux Kernel 3.5.x ABSTRACT: A vulnerability was reported in the Linux Kernel. reference LINKS: The Linux Kernel Archives SecurityTracker Alert ID: 1027434 Secunia Advisory SA50323 CVE-2012-3520 IMPACT ASSESSMENT: Medium Discussion: A local user can obtain elevated privileges on the target system. A local user may be able to send specially crafted Netlink messages to spoof SCM_CREDENTIALS and perform actions with elevated privileges.

148

Plant Engineering: Evaluation of Indirect Assessment Techniques for Coating Flaw Detection  

Science Conference Proceedings (OSTI)

This report is a description of the work performed and conclusions resulting from an investigation of indirect assessment techniques for coating flaw detection on buried piping in nuclear generating power plant environments. Indirect assessment techniques have been developed and successfully used in the oil and gas industry to identify coating flaws on buried transmission and distribution pipelines. These techniques involve the use of electrochemical measurements taken at the soil surface (grade) to dete...

2011-12-23T23:59:59.000Z

149

Stress Intensity Factor Plasticity Correction for Flaws in Stress Concentration Regions  

DOE Green Energy (OSTI)

Plasticity corrections to elastically computed stress intensity factors are often included in brittle fracture evaluation procedures. These corrections are based on the existence of a plastic zone in the vicinity of the crack tip. Such a plastic zone correction is included in the flaw evaluation procedure of Appendix A to Section XI of the ASME Boiler and Pressure Vessel Code. Plasticity effects from the results of elastic and elastic-plastic explicit flaw finite element analyses are examined for various size cracks emanating from the root of a notch in a panel and for cracks located at fillet fadii. The results of these caluclations provide conditions under which the crack-tip plastic zone correction based on the Irwin plastic zone size overestimates the plasticity effect for crack-like flaws embedded in stress concentration regions in which the elastically computed stress exceeds the yield strength of the material. A failure assessment diagram (FAD) curve is employed to graphically c haracterize the effect of plasticity on the crack driving force. The Option 1 FAD curve of the Level 3 advanced fracture assessment procedure of British Standard PD 6493:1991, adjusted for stress concentration effects by a term that is a function of the applied load and the ratio of the local radius of curvature at the flaw location to the flaw depth, provides a satisfactory bound to all the FAD curves derived from the explicit flaw finite element calculations. The adjusted FAD curve is a less restrictive plasticity correction than the plastic zone correction of Section XI for flaws embedded in plastic zones at geometric stress concentrators. This enables unnecessary conservatism to be removed from flaw evaluation procedures that utilize plasticity corrections.

Friedman, E.; Wilson, W.K.

2000-02-01T23:59:59.000Z

150

T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

validate remote certificates and may ignore that a system root certificate has been disabled and incorrectly accept certificates signed by that root server CVE-2011-0214. On...

151

T-683:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

schemes CVE-2011-2798. A remote user can trigger a use-after-free in HTML range handling CVE-2011-2799. A remote user can obtain the client-side redirect target...

152

Flaw detection on Inconel600 R using separation of single and multiple scattering contributions  

E-Print Network (OSTI)

grain steels commonly found in nuclear power plants is disturbed by a high backscattered noise destructive inspections in nuclear power plants are performed during monitoring operations in order to detect grain structure. Indeed, when the wavelength is comparable to the grain size, the wave is scattered

Paris-Sud XI, Université de

153

T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

hidden, auto-filled forms on the target user's browser CVE-2011-0217. With a certain Java configuration, a remote user can create a specially crafted web site that, when loaded...

154

U-004:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE))

A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

155

T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service...  

NLE Websites -- All DOE Office Websites (Extended Search)

Service and Bypass Security Controls. PLATFORM: Cisco 5500 Series Adaptive Security Appliances (ASA) ABSTRACT: Cisco ASA 5500 Series Adaptive Security Appliances are affected by...

156

U-139: IBM Tivoli Directory Server Input Validation Flaw | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

39: IBM Tivoli Directory Server Input Validation Flaw 39: IBM Tivoli Directory Server Input Validation Flaw U-139: IBM Tivoli Directory Server Input Validation Flaw April 3, 2012 - 7:00am Addthis PROBLEM: A vulnerability was reported in IBM Tivoli Directory Server. A remote user can conduct cross-site scripting attacks PLATFORM: Version(s): 6.2, 6.3 ABSTRACT: The Web Admin Tool does not properly filter HTML code from user-supplied input before displaying the input. Reference LINKS: Vendor Advisory Security Tracker ID 1026880 CVE-2012-0740 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a specially crafted URL that, when loaded by a target user, will cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the site running the IBM Tivoli Directory Server software and will run in the security context

157

V-229: IBM Lotus iNotes Input Validation Flaws Permit Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

V-229: IBM Lotus iNotes Input Validation Flaws Permit Cross-Site V-229: IBM Lotus iNotes Input Validation Flaws Permit Cross-Site Scripting Attacks V-229: IBM Lotus iNotes Input Validation Flaws Permit Cross-Site Scripting Attacks August 28, 2013 - 6:00am Addthis PROBLEM: Several vulnerabilities were reported in IBM Lotus iNotes PLATFORM: IBM Lotus iNotes 8.5.x ABSTRACT: IBM Lotus iNotes 8.5.x contains four cross-site scripting vulnerabilities REFERENCE LINKS: Security Tracker Alert ID 1028954 IBM Security Bulletin 1647740 Seclist.org CVE-2013-0590 CVE-2013-0591 CVE-2013-0595 IMPACT ASSESSMENT: Medium DISCUSSION: The software does not properly filter HTML code from user-supplied input before displaying the input. A remote user can cause arbitrary scripting code to be executed by the target user's browser. The code will originate

158

U-193: NetBSD System Call Return Value Validation Flaw Lets Local Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: NetBSD System Call Return Value Validation Flaw Lets Local 3: NetBSD System Call Return Value Validation Flaw Lets Local Users Gain Elevated Privileges U-193: NetBSD System Call Return Value Validation Flaw Lets Local Users Gain Elevated Privileges June 18, 2012 - 8:00am Addthis PROBLEM: A vulnerability was reported in NetBSD. A local user can obtain elevated privileges on the target system. PLATFORM: Version(s): 4.0.*, 5.0.*, 5.1, 6.0 Beta ABSTRACT: On Intel CPUs, the sysret instruction can be manipulated into returning to specific non-canonical addresses, which may yield a CPU reset. We cannot currently rule out with utter confidence that this vulnerability could not also be used to execute code with kernel privilege instead of crashing the system. reference LINKS: Vendor Advisory Security Tracker ID 1027178 CVE-2012-0217

159

T-670: Skype Input Validation Flaw in 'mobile phone' Profile Entry Permits  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Skype Input Validation Flaw in 'mobile phone' Profile Entry 0: Skype Input Validation Flaw in 'mobile phone' Profile Entry Permits Cross-Site Scripting Attacks T-670: Skype Input Validation Flaw in 'mobile phone' Profile Entry Permits Cross-Site Scripting Attacks July 18, 2011 - 7:09am Addthis PROBLEM: A vulnerability was reported in Skype. A remote user can conduct cross-site scripting attacks. PLATFORM: 5.3.0.120 and prior versions ABSTRACT: The software does not properly filter HTML code from user-supplied input in the The "mobile phone" profile entry before displaying the input. reference LINKS: SecurityTracker Alert ID: 1025789 Skype Security Advisory KoreSecure News H Security ID: 1279864 IMPACT ASSESSMENT: High Discussion: Skype suffers from a persistent Cross-Site Scripting vulnerability due to a lack of input validation and output sanitization of the "mobile phone"

160

V-112: Microsoft SharePoint Input Validation Flaws Permit Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Microsoft SharePoint Input Validation Flaws Permit 2: Microsoft SharePoint Input Validation Flaws Permit Cross-Site Scripting and Denial of Service Attacks V-112: Microsoft SharePoint Input Validation Flaws Permit Cross-Site Scripting and Denial of Service Attacks March 15, 2013 - 6:00am Addthis PROBLEM: Several vulnerabilities were reported in Microsoft SharePoint PLATFORM: Microsoft SharePoint 2010 SP1 ABSTRACT: This security update resolves four reported vulnerabilities in Microsoft SharePoint and Microsoft SharePoint Foundation. REFERENCE LINKS: Security Tracker Alert ID 1028278 MS Security Bulletin MS13-024 CVE-2013-0080 CVE-2013-0083 CVE-2013-0084 CVE-2013-0085 IMPACT ASSESSMENT: High DISCUSSION: The security update addresses the vulnerabilities correcting the way that Microsoft SharePoint Server validates URLs and user input.

Note: This page contains sample records for the topic "quicktime multiple flaws" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

U-102: Cisco IronPort Encryption Appliance Input Validation Flaw Permits  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Cisco IronPort Encryption Appliance Input Validation Flaw 2: Cisco IronPort Encryption Appliance Input Validation Flaw Permits Cross-Site Scripting Attacks U-102: Cisco IronPort Encryption Appliance Input Validation Flaw Permits Cross-Site Scripting Attacks February 14, 2012 - 8:00am Addthis PROBLEM: A vulnerability was reported in Cisco IronPort Encryption Appliance. PLATFORM: Version(s): prior to 6.5.3 ABSTRACT: A remote user can conduct cross-site scripting reference LINKS: Vendor URL CVE-2012-0340 Security Tracker ID:1026669 IMPACT ASSESSMENT: Medium Discussion: The interface does not properly filter HTML code from user-supplied input before displaying the input. A remote user can create a specially crafted URL that, when loaded by a target user, will cause arbitrary scripting code to be executed by the target user's browser. The code will originate from

162

U-107: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny Service  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

07: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny 07: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny Service U-107: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny Service February 21, 2012 - 6:00am Addthis PROBLEM: A vulnerability was reported in Cisco NX-OS. A remote user can cause denial of service conditions. PLATFORM: Nexus 1000v, 5000, and 7000 Series Switches ABSTRACT: A remote user can send a specially crafted IP packet to cause the target device to reload. reference LINKS: Cisco Advisory SecurityTracker Alert ID:1026692 CVE-2012-0352 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Cisco NX-OS. A remote user can cause denial of service conditions. A remote user can send a specially crafted IP packet to cause the target device to reload. The vulnerability occurs when the device attepts to obtain Layer 4 (e.g.,

163

V-168: Splunk Web Input Validation Flaw Permits Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Splunk Web Input Validation Flaw Permits Cross-Site 8: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks V-168: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks May 31, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Splunk Web PLATFORM: Version(s) prior to 5.0.3 ABSTRACT: A reflected cross-site scripting vulnerability was identified in Splunk Web REFERENCE LINKS: SecurityTracker Alert ID: 1028605 Splunk Security Advisory SPL-59895 CVE-2012-6447 IMPACT ASSESSMENT: Medium DISCUSSION: The web interface does not properly filter HTML code from user-supplied input before displaying the input. A remote user can create a specially crafted URL that, when loaded by a target user, will cause arbitrary scripting code to be executed by the target user's browser. The code will

164

U-140: HP-UX Unspecified Flaw in DCE Lets Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-140: HP-UX Unspecified Flaw in DCE Lets Remote Users Execute U-140: HP-UX Unspecified Flaw in DCE Lets Remote Users Execute Arbitrary Code U-140: HP-UX Unspecified Flaw in DCE Lets Remote Users Execute Arbitrary Code April 4, 2012 - 7:15am Addthis PROBLEM: A vulnerability was reported in HP-UX PLATFORM: Version(s): 11.11, 11.23; running DCE ABSTRACT: A remote user can execute arbitrary code on the target system. A remote user can send specially crafted data to execute arbitrary code on the target system. The code will run with the privileges of the target service. Reference LINKS: Vendor Advisory Security Tracker ID 1026885 CVE-2012-0131 IMPACT ASSESSMENT: High Discussion: A potential security vulnerability has been identified in HP-UX running DCE. The vulnerability could be exploited remotely to create a Denial of Service (DoS).

165

U-245: Critical Java 0-day flaw exploited | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

45: Critical Java 0-day flaw exploited 45: Critical Java 0-day flaw exploited U-245: Critical Java 0-day flaw exploited August 27, 2012 - 4:41pm Addthis PROBLEM: Attackers are exploiting a new and unpatched vulnerability that affects the latest version of Java -- Java 7 Update 6, and it works against a fully patched Windows 7 SP1 with Java 7 Update 6, Mozilla Firefox on Ubuntu Linux 10.04, Internet Explorer / Mozilla Firefox / Chrome on Windows XP, Internet Explorer / Mozilla Firefox on Windows Vista and Windows 7, and Safari on OS X 10.7.4. PLATFORM: Version(s): Java 7 Update 6 ABSTRACT: Targeted attacks exploiting a zero-day Java vulnerability to deliver the Poison Ivy RAT onto the unsuspecting victims' machines REFERENCE LINKS: http://www.net-security.org/secworld.php?id=13484 zero-day CVE-2012-4681

166

U-144:Juniper Secure Access Input Validation Flaw Permits Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4:Juniper Secure Access Input Validation Flaw Permits 4:Juniper Secure Access Input Validation Flaw Permits Cross-Site Scripting Attacks U-144:Juniper Secure Access Input Validation Flaw Permits Cross-Site Scripting Attacks April 10, 2012 - 7:30am Addthis PROBLEM: A vulnerability was reported in Juniper Secure Access/Instant Virtual Extranet (IVE). A remote user can conduct cross-site scripting attacks. PLATFORM: Version(s): prior to 7.0R9 and 7.1R ABSTRACT: The VPN management interface does not properly filter HTML code from user-supplied input before displaying the input. A remote user can cause arbitrary scripting code to be executed by the target user's browser. reference LINKS: Vendor URL SecurityTracker Alert ID: 1026893 IMPACT ASSESSMENT: High Discussion: The code will originate from the interface and will run in the security

167

T-701: Citrix Access Gateway Enterprise Edition Input Validation Flaw in  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Citrix Access Gateway Enterprise Edition Input Validation 1: Citrix Access Gateway Enterprise Edition Input Validation Flaw in Logon Portal Permits Cross-Site Scripting Attacks T-701: Citrix Access Gateway Enterprise Edition Input Validation Flaw in Logon Portal Permits Cross-Site Scripting Attacks August 25, 2011 - 3:33pm Addthis PROBLEM: A vulnerability was reported in Citrix Access Gateway Enterprise Edition. A remote user can conduct cross-site scripting attacks. PLATFORM: Citrix Access Gateway Enterprise Edition 9.2-49.8 and prior. Citrix Access Gateway Enterprise Edition version 9.3 is not affected by this vulnerability. ABSTRACT: Citrix Access Gateway Enterprise Edition Input Validation Flaw in Logon Portal Permits Cross-Site Scripting Attacks. reference LINKS: SecurityTracker Alert ID: 1025973 Citrix Document ID: CTX129971

168

T-670: Skype Input Validation Flaw in 'mobile phone' Profile Entry Permits  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

70: Skype Input Validation Flaw in 'mobile phone' Profile Entry 70: Skype Input Validation Flaw in 'mobile phone' Profile Entry Permits Cross-Site Scripting Attacks T-670: Skype Input Validation Flaw in 'mobile phone' Profile Entry Permits Cross-Site Scripting Attacks July 18, 2011 - 7:09am Addthis PROBLEM: A vulnerability was reported in Skype. A remote user can conduct cross-site scripting attacks. PLATFORM: 5.3.0.120 and prior versions ABSTRACT: The software does not properly filter HTML code from user-supplied input in the The "mobile phone" profile entry before displaying the input. reference LINKS: SecurityTracker Alert ID: 1025789 Skype Security Advisory KoreSecure News H Security ID: 1279864 IMPACT ASSESSMENT: High Discussion: Skype suffers from a persistent Cross-Site Scripting vulnerability due to a lack of input validation and output sanitization of the "mobile phone"

169

V-218: HP Service Manager Unspecified Flaw Lets Remote Users Gain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: HP Service Manager Unspecified Flaw Lets Remote Users Gain 8: HP Service Manager Unspecified Flaw Lets Remote Users Gain Unauthorized Access V-218: HP Service Manager Unspecified Flaw Lets Remote Users Gain Unauthorized Access August 15, 2013 - 1:30am Addthis PROBLEM: A potential security vulnerability has been identified with HP Service Manager. The vulnerability could be exploited to allow remote unauthenticated access and elevation of privilege. PLATFORM: HP Service Manager v9.31, v9.30, v9.21, v7.11, v6.2.8 ABSTRACT: The vulnerabilities are reported in versions 9.31 and prior. REFERENCE LINKS: SecurityTracker Alert ID: 1028912 CVE-2013-4808 IMPACT ASSESSMENT: High DISCUSSION: A vulnerability was reported in HP Service Manager. A remote user can gain unauthorized access on the target system. IMPACT: User access via network

170

U-195: PHPlist Input Validation Flaws Permit Cross-Site Scripting and SQL  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: PHPlist Input Validation Flaws Permit Cross-Site Scripting 5: PHPlist Input Validation Flaws Permit Cross-Site Scripting and SQL Injection Attacks U-195: PHPlist Input Validation Flaws Permit Cross-Site Scripting and SQL Injection Attacks June 20, 2012 - 7:00am Addthis PROBLEM: Two vulnerabilities were reported in PHPlist. A remote user can conduct cross-site scripting attacks. A remote authenticated user can inject SQL commands. PLATFORM: Version(s): prior to 2.10.18 ABSTRACT: The 'public_html/lists/admin' pages do not properly validate user-supplied input in the 'sortby' parameter [CVE-2012-2740]. A remote authenticated administrative user can supply a specially crafted parameter value to execute SQL commands on the underlying database. REFERENCE LINKS: Vendor Advisory Security Tracker ID 1027181 CVE-2012-2740, CVE-2012-2741

171

V-218: HP Service Manager Unspecified Flaw Lets Remote Users Gain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: HP Service Manager Unspecified Flaw Lets Remote Users Gain 8: HP Service Manager Unspecified Flaw Lets Remote Users Gain Unauthorized Access V-218: HP Service Manager Unspecified Flaw Lets Remote Users Gain Unauthorized Access August 15, 2013 - 1:30am Addthis PROBLEM: A potential security vulnerability has been identified with HP Service Manager. The vulnerability could be exploited to allow remote unauthenticated access and elevation of privilege. PLATFORM: HP Service Manager v9.31, v9.30, v9.21, v7.11, v6.2.8 ABSTRACT: The vulnerabilities are reported in versions 9.31 and prior. REFERENCE LINKS: SecurityTracker Alert ID: 1028912 CVE-2013-4808 IMPACT ASSESSMENT: High DISCUSSION: A vulnerability was reported in HP Service Manager. A remote user can gain unauthorized access on the target system. IMPACT: User access via network

172

T-617: BIND RPZ Processing Flaw Lets Remote Users Deny Service | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: BIND RPZ Processing Flaw Lets Remote Users Deny Service 7: BIND RPZ Processing Flaw Lets Remote Users Deny Service T-617: BIND RPZ Processing Flaw Lets Remote Users Deny Service May 6, 2011 - 7:00am Addthis PROBLEM: A vulnerability has been reported in BIND, which can be exploited by malicious people to cause a DoS (Denial of Service). PLATFORM: ISC BIND version 9.8.0. ABSTRACT: When a name server is configured with a response policy zone (RPZ), queries for type RRSIG can trigger a server crash. REFERENCE LINKS: ISC Advisory: CVE-2011-1907 Secunia Advisory: SA44416 Vulnerability Report: ISC BIND CVE-2011-1907 SecurityTracker Alert ID: 1025503 IMPACT ASSESSMENT: High Discussion: This advisory only affects BIND users who are using the RPZ feature configured for RRset replacement. BIND 9.8.0 introduced Response Policy Zones (RPZ), a mechanism for modifying DNS responses returned by a

173

V-225: McAfee Email Gateway SMTP Processing Flaw Lets Remote Users Deny  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: McAfee Email Gateway SMTP Processing Flaw Lets Remote Users 5: McAfee Email Gateway SMTP Processing Flaw Lets Remote Users Deny Service V-225: McAfee Email Gateway SMTP Processing Flaw Lets Remote Users Deny Service August 23, 2013 - 1:26am Addthis PROBLEM: A vulnerability was reported in McAfee Email Gateway. A remote user can cause denial of service conditions. PLATFORM: McAfee Email Gateway (MEG) 7.5 ABSTRACT: A remote user can cause the SMTP proxy to stop responding. REFERENCE LINKS: SecurityTracker Alert ID: 1028941 GENERIC-MAP-NOMATCH IMPACT ASSESSMENT: High DISCUSSION: A vulnerability was reported in McAfee Email Gateway. A remote user can cause denial of service conditions.A remote user can send a specially crafted e-mail to cause the ws_inv-smtp process to enter an infinite loop and cause the target SMTP proxy to stop responding.

174

V-153: Symantec Brightmail Gateway Input Validation Flaw Permits Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Symantec Brightmail Gateway Input Validation Flaw Permits 3: Symantec Brightmail Gateway Input Validation Flaw Permits Cross-Site Scripting Attacks V-153: Symantec Brightmail Gateway Input Validation Flaw Permits Cross-Site Scripting Attacks May 10, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Symantec Brightmail Gateway PLATFORM: The vulnerabilities are reported in versions prior to 9.5.x ABSTRACT: Symantec's Brightmail Gateway management console is susceptible to stored cross-site scripting (XSS) issues found in some of the administrative interface pages. REFERENCE LINKS: Security Tracker Alert ID: 1028530 Symantec Security Advisory CVE-2013-1611 IMPACT ASSESSMENT: Medium DISCUSSION: The administrative interface does not properly filter HTML code from user-supplied input before displaying the input. A remote user can cause

175

T-663: Cisco Content Services Gateway ICMP Processing Flaw Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Cisco Content Services Gateway ICMP Processing Flaw Lets 3: Cisco Content Services Gateway ICMP Processing Flaw Lets Remote Users Deny Service T-663: Cisco Content Services Gateway ICMP Processing Flaw Lets Remote Users Deny Service July 7, 2011 - 12:41pm Addthis PROBLEM: A denial of service (DoS) vulnerability exists in the Cisco Content Services Gateway - Second Generation, that runs on the Cisco Service and Application Module for IP (SAMI). An unauthenticated, remote attacker could exploit this vulnerability by sending a series of crafted ICMP packets to an affected device. Exploitation could cause the device to reload. There are no workarounds available to mitigate exploitation of this vulnerability other than blocking ICMP traffic destined to the affected device. PLATFORM: Second Generation only Cisco IOS 12.4(24)MDA3,Cisco IOS 12.4(24)MDA3,Cisco

176

T-649: Red Hat Network Satellite Server Request Validation Flaw Permits  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Red Hat Network Satellite Server Request Validation Flaw 9: Red Hat Network Satellite Server Request Validation Flaw Permits Cross-Site Request Forgery Attacks T-649: Red Hat Network Satellite Server Request Validation Flaw Permits Cross-Site Request Forgery Attacks June 17, 2011 - 3:43pm Addthis PROBLEM: A vulnerability was reported in Red Hat Network Satellite Server. A remote user can conduct cross-site request forgery attacks. PLATFORM: Versions 5.4.x ABSTRACT: The Red Hat Network (RHN) Satellite and Spacewalk services do not properly validate user-supplied. A remote user can create specially crafted HTML that, when loaded by a target authenticated user, will take actions on the target site acting as the target user. reference LINKS: SecurityTracker Alert ID: 1025674 RHSA-2011:0879-1 RHN Support CVE-2009-4139 IMPACT ASSESSMENT:

177

V-227: VMware Workstation and Player vmware-mount Command Flaw Lets Local  

NLE Websites -- All DOE Office Websites (Extended Search)

7: VMware Workstation and Player vmware-mount Command Flaw Lets 7: VMware Workstation and Player vmware-mount Command Flaw Lets Local Users Gain Root Privileges V-227: VMware Workstation and Player vmware-mount Command Flaw Lets Local Users Gain Root Privileges August 26, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in VMware Workstation and Player on Debian-based systems PLATFORM: VMware Workstation 8.x, 9.x and Player 4.x, 5.x ABSTRACT: VMware Workstation and Player contain a vulnerability in the handling of the vmware-mount command REFERENCE LINKS: Security Tracker Alert ID 1028948 VMware Security Advisory VMSA-2013-0010 CVE-2013-1662 IMPACT ASSESSMENT: Medium DISCUSSION: A local malicious user may exploit this vulnerability to escalate their privileges to root on the host OS. The issue is present when Workstation or

178

V-034: RSA Adaptive Authentication (On-Premise) Input Validation Flaws  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: RSA Adaptive Authentication (On-Premise) Input Validation 4: RSA Adaptive Authentication (On-Premise) Input Validation Flaws Permit Cross-Site Scripting Attacks V-034: RSA Adaptive Authentication (On-Premise) Input Validation Flaws Permit Cross-Site Scripting Attacks November 27, 2012 - 2:00am Addthis PROBLEM: RSA Adaptive Authentication (On-Premise) Input Validation Flaws Permit Cross-Site Scripting Attacks PLATFORM: RSA Adaptive Authentication (On-Premise) 6.x ABSTRACT: A vulnerability was reported in RSA Adaptive Authentication (On-Premise). REFERENCE LINKS: SecurityTracker Alert ID: 1027811 SecurityFocus Security Alert RSA Customer Support CVE-2012-4611 IMPACT ASSESSMENT: Medium DISCUSSION: A vulnerability was reported in RSA Adaptive Authentication (On-Premise). A remote user can conduct cross-site scripting attacks. The software does not

179

V-112: Microsoft SharePoint Input Validation Flaws Permit Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Microsoft SharePoint Input Validation Flaws Permit 2: Microsoft SharePoint Input Validation Flaws Permit Cross-Site Scripting and Denial of Service Attacks V-112: Microsoft SharePoint Input Validation Flaws Permit Cross-Site Scripting and Denial of Service Attacks March 15, 2013 - 6:00am Addthis PROBLEM: Several vulnerabilities were reported in Microsoft SharePoint PLATFORM: Microsoft SharePoint 2010 SP1 ABSTRACT: This security update resolves four reported vulnerabilities in Microsoft SharePoint and Microsoft SharePoint Foundation. REFERENCE LINKS: Security Tracker Alert ID 1028278 MS Security Bulletin MS13-024 CVE-2013-0080 CVE-2013-0083 CVE-2013-0084 CVE-2013-0085 IMPACT ASSESSMENT: High DISCUSSION: The security update addresses the vulnerabilities correcting the way that Microsoft SharePoint Server validates URLs and user input.

180

Characterization of flaws in a tube bundle mock-up for reliability studies  

Science Conference Proceedings (OSTI)

As part of an assessment of in-service inspection of steam generator tubes, the authors will assemble a steam generator mock-up for round robin studies and use as a test bed in evaluating emerging technologies. Progress is reported on the characterization of flaws that will be part of the mock-up. Eddy current and ultrasonic techniques are being evaluated as a means to characterize the flaws in the mock-up tubes before final assembly. Twenty Inconel 600 tubes with laboratory-grown cracks, typical of those to be used in the mock-up, were provided by Pacific Northwest National Laboratory for laboratory testing. After the tubes were inspected with eddy current and ultrasonic techniques, they were destructively analyzed to establish the actual depths, lengths, and profiles of the cracks. The analysis of the results will allow the best techniques to be used for characterizing the flaws in the mock-up tubes.

Kupperman, D.S.; Bakhtiari, S.

1996-10-01T23:59:59.000Z

Note: This page contains sample records for the topic "quicktime multiple flaws" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

U-006:Cisco Network Admission Control Manager Directory Traversal Flaw Lets  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6:Cisco Network Admission Control Manager Directory Traversal 6:Cisco Network Admission Control Manager Directory Traversal Flaw Lets Remote Users Obtain Potentially Sensitive Information U-006:Cisco Network Admission Control Manager Directory Traversal Flaw Lets Remote Users Obtain Potentially Sensitive Information October 7, 2011 - 8:45am Addthis PROBLEM: Cisco Network Admission Control Manager Directory Traversal Flaw Lets Remote Users Obtain Potentially Sensitive Information PLATFORM: Cisco NAC Manager software versions 4.8.X Cisco NAC Manager software versions 4.7.X and earlier are not affected ABSTRACT: An unauthenticated attacker could exploit this vulnerability to access sensitive information, including password files and system logs, that could be leveraged to launch subsequent attacks. reference LINKS: Cisco Security Advisory Document ID: 113189

182

V-168: Splunk Web Input Validation Flaw Permits Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

68: Splunk Web Input Validation Flaw Permits Cross-Site 68: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks V-168: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks May 31, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Splunk Web PLATFORM: Version(s) prior to 5.0.3 ABSTRACT: A reflected cross-site scripting vulnerability was identified in Splunk Web REFERENCE LINKS: SecurityTracker Alert ID: 1028605 Splunk Security Advisory SPL-59895 CVE-2012-6447 IMPACT ASSESSMENT: Medium DISCUSSION: The web interface does not properly filter HTML code from user-supplied input before displaying the input. A remote user can create a specially crafted URL that, when loaded by a target user, will cause arbitrary scripting code to be executed by the target user's browser. The code will

183

V-191: Apple Mac OS X Multiple Vulnerabilities | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

1: Apple Mac OS X Multiple Vulnerabilities 1: Apple Mac OS X Multiple Vulnerabilities V-191: Apple Mac OS X Multiple Vulnerabilities July 3, 2013 - 6:00am Addthis PROBLEM: Apple has issued a security update for Mac OS X PLATFORM: Apple Macintosh OS X ABSTRACT: The vulnerabilities are caused due to a bundled version of QuickTime REFERENCE LINKS: Secunia Advisory SA54049 APPLE-SA-2013-07-02-1 Security Update 2013-003 CVE-2013-1018 CVE-2013-1019 CVE-2013-1022 IMPACT ASSESSMENT: High DISCUSSION: A boundary error when parsing compressed data within H.264 encoded movie files can be exploited to cause a buffer overflow A boundary error when handling the Sorenson Video 3 "mdat" section within a MOV file can be exploited to cause a buffer overflow A boundary error when handling "mvhd" atoms can be exploited to cause a

184

V-191: Apple Mac OS X Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Apple Mac OS X Multiple Vulnerabilities 1: Apple Mac OS X Multiple Vulnerabilities V-191: Apple Mac OS X Multiple Vulnerabilities July 3, 2013 - 6:00am Addthis PROBLEM: Apple has issued a security update for Mac OS X PLATFORM: Apple Macintosh OS X ABSTRACT: The vulnerabilities are caused due to a bundled version of QuickTime REFERENCE LINKS: Secunia Advisory SA54049 APPLE-SA-2013-07-02-1 Security Update 2013-003 CVE-2013-1018 CVE-2013-1019 CVE-2013-1022 IMPACT ASSESSMENT: High DISCUSSION: A boundary error when parsing compressed data within H.264 encoded movie files can be exploited to cause a buffer overflow A boundary error when handling the Sorenson Video 3 "mdat" section within a MOV file can be exploited to cause a buffer overflow A boundary error when handling "mvhd" atoms can be exploited to cause a

185

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

30, 2013 30, 2013 V-167: GnuTLS TLS Record Decoding Denial of Service Vulnerability A vulnerability has been reported in GnuTLS, which can be exploited by malicious people to cause a DoS (Denial of Service) May 29, 2013 V-166: HP-UX Directory Server Discloses Passwords to Remote Authenticated and Local Users Two vulnerabilities were reported in HP-UX Directory Server. May 28, 2013 V-165: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote Users Spoof the Server A vulnerability was reported in Cisco WebEx for iOS. May 27, 2013 V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code Apple QuickTime Multiple Vulnerabilities May 24, 2013 V-163: Red Hat Network Satellite Server Inter-Satellite Sync Remote Authentication Bypass The system does not properly validate all Inter-Satellite Sync operations

186

Pre-SW - Steam Generator Management Program: Flaw Handbook Calculator for Excel 2010, Version 2.0  

Science Conference Proceedings (OSTI)

The EPRI Steam Generator Management Program: Steam Generator Degradation Specific Flaw Handbook (1019037) defines burst pressure equations for steam generator tubes with various degradation morphologies, and the EPRI Steam Generator Management Program: Steam Generator Integrity Assessment Guidelines (1019038) describes a probabilistic evaluation process which can be used to account for key input parameter uncertainties. The Flaw Handbook Calculator software is an automated ...

2013-11-20T23:59:59.000Z

187

T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Apple iOS Certificate Chain Validation Flaw Lets Certain 6: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or Modify SSL/TLS Sessions T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or Modify SSL/TLS Sessions July 26, 2011 - 1:06am Addthis PROBLEM: A vulnerability was reported in Apple iOS. A remote user with the ability to conduct a man-in-the-middle attack can access or modify SSL/TLS sessions. PLATFORM: iOS 4.2.5 through 4.2.9 for iPhone 4 (CDMA) iOS 3.0 through 4.3.4 for iPhone 3GS and iPhone 4 (GSM) iOS 3.1 through 4.3.4 for iPod touch (3rd generation) and later iOS 3.2 through 4.3.4 for iPad ABSTRACT: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or Modify SSL/TLS Sessions. reference LINKS: SecurityTracker Alert ID: 1025837

188

U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: RSA Access Manager Session Replay Flaw Lets Remote Users 5: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System July 5, 2012 - 7:02am Addthis PROBLEM: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System PLATFORM: Version(s): Server version 6.0.x, 6.1, 6.1 SP1, 6.1 SP2, 6.1 SP3; all Agent versions ABSTRACT: A vulnerability was reported in RSA Access Manager. A remote user can gain access to the target system. reference LINKS: SecurityFocus ESA-2012-026 SecurityTracker Alert ID: 1027220 CVE-2012-2281 RSA SecurCare Online MPACT ASSESSMENT: Medium Discussion: RSA Access Manager contains a vulnerability that can be potentially exploited by a malicious user to replay the session with compromised session tokens. This is due to improper invalidation of session tokens

189

V-165: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

65: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote 65: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote Users Spoof the Server V-165: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote Users Spoof the Server May 28, 2013 - 12:46am Addthis PROBLEM: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote Users Spoof the Server PLATFORM: Cisco WebEx for iOS 4.1, Other versions may also be affected. ABSTRACT: A vulnerability was reported in Cisco WebEx for iOS. REFERENCE LINKS: Cisco SecurityTracker Alert ID: 1028592 Secunia Advisory SA51412 CVE-2012-6399 IMPACT ASSESSMENT: Medium DISCUSSION: A security issue in Cisco WebEx for iOS can be exploited by malicious people to conduct spoofing attacks. The security issue is caused due to the application not properly verifying the server SSL certificate. This can be exploited to e.g. spoof the server

190

U-007: IBM Rational AppScan Import/Load Function Flaws Let Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: IBM Rational AppScan Import/Load Function Flaws Let Remote 7: IBM Rational AppScan Import/Load Function Flaws Let Remote Users Execute Arbitrary Code U-007: IBM Rational AppScan Import/Load Function Flaws Let Remote Users Execute Arbitrary Code October 10, 2011 - 9:15am Addthis PROBLEM: IBM Rational AppScan Import/Load Function Flaws Let Remote Users Execute Arbitrary Code. PLATFORM: Version(s): 7.8, 7.8.0.1, 7.8.0.2, 7.9, 7.9.0.1, 7.9.0.2, 7.9.0.3, 8.0, 8.0.0.1, 8.0.0.2 ABSTRACT: Two vulnerabilities were reported in IBM Rational AppScan. A remote user can cause arbitrary code to be executed on the target user's system. reference LINKS: IBM Security Advisory Document ID: 1515110 IBM Fix Pack Document ID: 4030774 SecurityTracker Alert ID: 1026154 IMPACT ASSESSMENT: High Discussion: A high risk security vulnerability in the "Import functionality" of IBM

191

U-260: ISC BIND RDATA Processing Flaw Lets Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: ISC BIND RDATA Processing Flaw Lets Remote Users Deny 0: ISC BIND RDATA Processing Flaw Lets Remote Users Deny Service U-260: ISC BIND RDATA Processing Flaw Lets Remote Users Deny Service September 14, 2012 - 6:00am Addthis PROBLEM: ISC BIND RDATA Processing Flaw Lets Remote Users Deny Service PLATFORM: Version(s): 9.0.x -> 9.6.x, 9.4-ESV->9.4-ESV-R5-P1, 9.6-ESV->9.6-ESV-R7-P2, 9.7.0->9.7.6-P2, 9.8.0->9.8.3-P2, 9.9.0->9.9.1-P2 ABSTRACT: A vulnerability was reported in ISC BIND. reference LINKS: The vendor's advisory SecurityTracker Alert ID: 1027529 Bugtraq ID: 55522 Red Hat Bugzilla - Bug 856754 CVE-2012-4244 IMPACT ASSESSMENT: High Discussion: A remote user can send a query for a record that has RDATA in excess of 65535 bytes to cause named to exit. This can be exploited against recursive servers by causing the server to query for records provided by an

192

T-602: BlackBerry Enterprise Server Input Validation Flaw in BlackBerry Web  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

02: BlackBerry Enterprise Server Input Validation Flaw in 02: BlackBerry Enterprise Server Input Validation Flaw in BlackBerry Web Desktop Manager Permits Cross-Site Scripting Attacks T-602: BlackBerry Enterprise Server Input Validation Flaw in BlackBerry Web Desktop Manager Permits Cross-Site Scripting Attacks April 14, 2011 - 5:07am Addthis PROBLEM: BlackBerry Enterprise Server Input Validation Flaw in BlackBerry Web Desktop Manager Permits Cross-Site Scripting Attacks PLATFORM: BlackBerry Enterprise Server Express versions 5.0.1 and 5.0.2 for Microsoft Exchange, 5.0.2 for IBM Lotus Domino, 5.0.0 through 5.0.3 for Microsoft Exchange and IBM Lotus Domino, and version 5.0.1 for Novell GroupWise. OS Platform(s): Windows (2000), Windows (2003), Windows (2008) ABSTRACT: The BlackBerry Web Desktop Manager not properly filter HTML code from

193

U-073: Bugzilla Flaws Permit Cross-Site Scripting and Cross-Site Request  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

73: Bugzilla Flaws Permit Cross-Site Scripting and Cross-Site 73: Bugzilla Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks U-073: Bugzilla Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks January 3, 2012 - 10:30am Addthis PROBLEM: Bugzilla Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks PLATFORM: Version(s): prior to 3.4.13, 3.6.7, 4.0.3, 4.2rc1 ABSTRACT: Several vulnerabilities were reported in Bugzilla. A remote user can conduct cross-site scripting attacks. reverence LINKS: SecurityTracker Alert ID: 1026480 3.4.12 Security Advisory Bug 697699 Bug 703975 Bug 703983 IMPACT ASSESSMENT: Medium Discussion: Tabular and graphical reports, as well as new charts have a debug mode which displays raw data as plain text. This text is not correctly escaped and a crafted URL could use this vulnerability to inject code leading to

194

T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

76: Apple iOS Certificate Chain Validation Flaw Lets Certain 76: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or Modify SSL/TLS Sessions T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or Modify SSL/TLS Sessions July 26, 2011 - 1:06am Addthis PROBLEM: A vulnerability was reported in Apple iOS. A remote user with the ability to conduct a man-in-the-middle attack can access or modify SSL/TLS sessions. PLATFORM: iOS 4.2.5 through 4.2.9 for iPhone 4 (CDMA) iOS 3.0 through 4.3.4 for iPhone 3GS and iPhone 4 (GSM) iOS 3.1 through 4.3.4 for iPod touch (3rd generation) and later iOS 3.2 through 4.3.4 for iPad ABSTRACT: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or Modify SSL/TLS Sessions. reference LINKS: SecurityTracker Alert ID: 1025837

195

How Presentation Flaws Affect Perceived Site Quality, Trust, and Intention to Purchase from an Online Store  

Science Conference Proceedings (OSTI)

Although there has been a great deal of research on impression formation, little application of that research has been made to electronic commerce. A research model was constructed that hypothesized errors, poor style, and incompleteness to be inversely ... Keywords: Intention To Purchase, Trust In E-Commerce, Web Site Credibility, Web Site Presentation Flaws, Web Site Quality

Andrea Everard; Dennis F. Galletta

2006-01-01T23:59:59.000Z

196

Apparatus and method for detecting and/or measuring flaws in conductive material  

Science Conference Proceedings (OSTI)

The present invention uses a magnet and sensor coil unilaterial and in relative motion to a conductive material, to measure perturbation or variation in the magnetic field in the presence of a flaw. A liftoff compensator measures a distance between the conductive material and the magnet.

Hockey, Ronald L. (Richland, WA); Riechers, Douglas M. (Richland, WA)

2000-01-01T23:59:59.000Z

197

Two Dynamical Core Formulation Flaws Exposed by a Baroclinic Instability Test Case  

Science Conference Proceedings (OSTI)

Two flaws in the semi-Lagrangian algorithm originally implemented as an optional dynamical core in the NCAR Community Atmosphere Model (CAM3.1) are exposed by steady-state and baroclinic instability test cases. Remedies are demonstrated and have ...

David L. Williamson; Jerry G. Olson; Christiane Jablonowski

2009-02-01T23:59:59.000Z

198

U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

205: RSA Access Manager Session Replay Flaw Lets Remote Users 205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System July 5, 2012 - 7:02am Addthis PROBLEM: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System PLATFORM: Version(s): Server version 6.0.x, 6.1, 6.1 SP1, 6.1 SP2, 6.1 SP3; all Agent versions ABSTRACT: A vulnerability was reported in RSA Access Manager. A remote user can gain access to the target system. reference LINKS: SecurityFocus ESA-2012-026 SecurityTracker Alert ID: 1027220 CVE-2012-2281 RSA SecurCare Online MPACT ASSESSMENT: Medium Discussion: RSA Access Manager contains a vulnerability that can be potentially exploited by a malicious user to replay the session with compromised session tokens. This is due to improper invalidation of session tokens

199

Development of flaw evaluation and acceptance procedures for flaw indications in the cooling water system at the Savannah River Site K Reactor  

SciTech Connect

This paper describes the methodology used in determining the criteria for acceptance of inspection indications in the K-Reactor Cooling Water System at the Savannah River Plant. These criteria have been developed in a manner consistent with the development of similar criteria in the ASME Code Section 11 for commercial light water reactors, but with a realistic treatment of the operating conditions in the cooling water system. The technical basis for the development of these criteria called {open_quotes}Acceptance Standards{close_quotes} is contained in this paper. A second portion of this paper contains the methodology used in the construction of flaw evaluation charts which have been developed for each specific line size in the cooling water system. The charts provide the results of detailed fracture mechanics calculations which have been completed to determine the largest flaw which can be accepted in the cooling water system without repair. These charts are designed for use in conjunction with inservice inspections of the cooling water system, and only require inspection results to determine acceptability.

Tandon, S.; Bamford, W.H. [Westinghouse Electric Corp., Pittsburgh, PA (US); Cowfer, C.D.; Ostrowski, R. [Westinghouse Savannah River Co., Aiken, SC (US)

1993-06-01T23:59:59.000Z

200

Development of flaw evaluation and acceptance procedures for flaw indications in the cooling water system at the Savannah River Site K Reactor  

SciTech Connect

This paper describes the methodology used in determining the criteria for acceptance of inspection indications in the K-Reactor Cooling Water System at the Savannah River Plant. These criteria have been developed in a manner consistent with the development of similar criteria in the ASME Code Section 11 for commercial light water reactors, but with a realistic treatment of the operating conditions in the cooling water system. The technical basis for the development of these criteria called [open quotes]Acceptance Standards[close quotes] is contained in this paper. A second portion of this paper contains the methodology used in the construction of flaw evaluation charts which have been developed for each specific line size in the cooling water system. The charts provide the results of detailed fracture mechanics calculations which have been completed to determine the largest flaw which can be accepted in the cooling water system without repair. These charts are designed for use in conjunction with inservice inspections of the cooling water system, and only require inspection results to determine acceptability.

Tandon, S.; Bamford, W.H. (Westinghouse Electric Corp., Pittsburgh, PA (United States)); Cowfer, C.D.; Ostrowski, R. (Westinghouse Savannah River Co., Aiken, SC (United States))

1993-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "quicktime multiple flaws" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Detection and characterization of flaws in segments of light water reactor pressure vessels  

Science Conference Proceedings (OSTI)

Studies have been conducted to determine flaw density in segments cut from light water reactor (LWR) pressure vessels as part of the Oak Ridge National Laboratory's Heavy-Section Steel Technology (HSST) Program. Segments from the Hope Creek Unit 2 vessil and the Pilgrim Unit 2 Vessel were purchased from salvage dealers. Hope Creek was a boiling water reactor (BWR) design and Pilgrim was a pressurized water reactor (PWR) design. Neither were ever placed in service. Objectives were to evaluate these LWR segments for flaws with ultrasonic and liquid penetrant techniques. Both objectives were successfully completed. One significant indication was detected in a Hope Creek seam weld by ultrasonic techniques and characterized by further analyses terminating with destructive correlation. This indication (with a through-wall dimension of approx.6 mm (approx.0.24 in.)) was detected in only 3 m (10 ft) of weldment and offers extremely limited data when compared to the extent of welding even in a single pressure vessel. However, the detection and confirmation of the flaw in the arbitrarily selected sections implies the Marshall report estimates (and others) are nonconservative for such small flaws. No significant indications were detected in the Pilgrim material by ultrasonic techniques. Unfortunately, the Pilgrim segments contained relatively little weldment; thus, we limited our ultrasonic examinations to the cladding and subcladding regions. Fluorescent liquid penetrant inspection of the cladding surfaces for both LWR segments detected no significant indications (i.e., for a total of approximately 6.8 m/sup 2/ (72 ft/sup 2/) of cladding surface).

Cook, K.V.; Cunningham, R.A. Jr.; McClung, R.W.

1987-01-01T23:59:59.000Z

202

BWRVIP-139: Vessel and Internals Project, Steam Dryer Inspection and Flaw Evaluation Guidelines  

Science Conference Proceedings (OSTI)

This document provides steam dryer inspection and flaw evaluation guidelines consistent with those developed for other boiling water reactor (BWR) internal components. It includes (1) documentation of the steam dryer configurations for the different plants, (2) a summary of dryer cracking incidents based on field experience, (3) documentation of the regions of susceptibility for fatigue cracking and intergranular stress corrosion cracking (IGSCC), (4) a review of the failure modes and effects of cracking...

2005-04-01T23:59:59.000Z

203

Evaluation of Manual Ultrasonic Examinations Applied to Detect Flaws in Primary System Dissimilar Metal Welds at North Anna Power Station  

SciTech Connect

During a recent inservice inspection (ISI) of a dissimilar metal weld (DMW) in an inlet (hot leg) steam generator nozzle at North Anna Power Station Unit 1, several axially oriented flaws went undetected by the licensee's manual ultrasonic testing (UT) technique. The flaws were subsequently detected as a result of outside diameter (OD) surface machining in preparation for a full structural weld overlay. The machining operation uncovered the existence of two through-wall flaws, based on the observance of primary water leaking from the DMW. Further ultrasonic tests were then performed, and a total of five axially oriented flaws, classified as primary water stress corrosion cracking (PWSCC), were detected in varied locations around the weld circumference.

Anderson, Michael T.; Diaz, Aaron A.; Doctor, Steven R.

2012-06-01T23:59:59.000Z

204

U-111: IBM AIX ICMP Processing Flaw Lets Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

11: IBM AIX ICMP Processing Flaw Lets Remote Users Deny Service 11: IBM AIX ICMP Processing Flaw Lets Remote Users Deny Service U-111: IBM AIX ICMP Processing Flaw Lets Remote Users Deny Service February 27, 2012 - 6:27am Addthis PROBLEM: A vulnerability was reported in IBM AIX. A remote user can cause denial of service conditions. PLATFORM: version(s): 5.3, 6.1, and 7.1 ABSTRACT: A remote user can send a specially crafted ICMP packet to cause the target service to crash. reference LINKS: Vendor Advisory Security Tracker ID 1026742 CVE-2011-1385 IMPACT ASSESSMENT: Medium Discussion: There is an error in the handling of a particular ICMP packet in which a remote user can cause a denial of service. Impact: Denial of service on AIX via network. Solution: The vendor has issued a fix. 5.3.12: APAR IV03369 6.1.5: APAR IV13672 6.1.6: APAR IV13554

205

T-662: ISC BIND Packet Processing Flaw Lets Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: ISC BIND Packet Processing Flaw Lets Remote Users Deny 2: ISC BIND Packet Processing Flaw Lets Remote Users Deny Service T-662: ISC BIND Packet Processing Flaw Lets Remote Users Deny Service July 6, 2011 - 7:47am Addthis PROBLEM: A vulnerability was reported in ISC BIND. A remote user can cause denial of service conditions. PLATFORM: 9.6.3, 9.6-ESV-R4, 9.6-ESV-R4-P1, 9.6-ESV-R5b1 9.7.0, 9.7.0-P1, 9.7.0-P2, 9.7.1, 9.7.1-P1, 9.7.1-P2, 9.7.2, 9.7.2-P1, 9.7.2-P2, 9.7.2-P3, 9.7.3, 9.7.3-P1, 9.7.3-P2, 9.7.4b1 9.8.0, 9.8.0-P1, 9.8.0-P2, 9.8.0-P3, 9.8.1b1 ABSTRACT: A defect in the affected BIND 9 versions allows an attacker to remotely cause the "named" process to exit using a specially crafted packet. This defect affects both recursive and authoritative servers. The code location of the defect makes it impossible to protect BIND using ACLs configured

206

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

21 - 17930 of 29,416 results. 21 - 17930 of 29,416 results. Article U-202: Apple QuickTime Multiple Stack Overflow Vulnerabilities Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. http://energy.gov/cio/articles/u-202-apple-quicktime-multiple-stack-overflow-vulnerabilities Article U-185: OpenLDAP May Ignore TLSCipherSuite Setting in Some Cases A vulnerability was reported in OpenLDAP. The system may use a weaker cipher suite than specified. http://energy.gov/cio/articles/u-185-openldap-may-ignore-tlsciphersuite-setting-some-cases Article U-166: Adobe Shockwave Player Memory Corruption Flaws Let Remote Users Execute Arbitrary Code Multiple vulnerabilities were reported in Adobe Shockwave Player. A remote user can cause arbitrary code to be executed on the target user's system.

207

A Flaw Tolerance Approach to Address Reactor Vessel Head Penetration Cracking Issue  

SciTech Connect

Nickel-based alloys and the associated welds are susceptible to Primary Water Stress Corrosion Cracking. In Pressurized Water Reactor nuclear power plants, the reactor vessel closure head upper penetration nozzles used for the Control Rod Drive Mechanisms and other instrumentation systems are made of such nickel-based alloys. Cracking and leakage have been observed in the upper head penetration nozzles in nuclear power plants worldwide. Such cracking and the resulting leakage is a degradation of the reactor vessel pressure boundary. Regulatory requirements have been issued by the Nuclear Regulatory Commission regarding periodic inspection of the susceptible areas to enable detection of indications and provide reasonable assurance of continued structural integrity for reactor vessel closure head. A flaw tolerance approach has been used in the disposition of detected indications to minimize outage delays, by performing up-front fracture mechanics evaluations for the common types of indications detected in the susceptible areas. Details of the flaw tolerance approach are presented in this paper. (authors)

Ng, C. K.; Jirawongkraisorn, S.; Swamy, S. [Westinghouse Electric Company, LLC, Nuclear Services Division, P. O. Box 158, Madison, PA 15663 (United States)

2006-07-01T23:59:59.000Z

208

Serious Flaws in Korf et al.'s Analysis on Time Complexity of A*  

E-Print Network (OSTI)

Understanding the effect of a heuristic on the time complexity of the well-known A* search algorithm has been a subject of a large research body in AI. Among those researches is Korf et al.'s analysis (Korf & Reid, 1998; Korf et al., 2001; Korf, 2000a; Korf, 2000b), which concluded that the effect of a heuristic is to reduce the effective depth rather than effective branching factor. Since this conclusion conflicts with both previous analysis and recent analysis by other authors, we try to investigate the causes of such contradictions and finally find out that Korf et al.'s analysis has many serious flaws from which their main conclusion was drawn.

Dinh, Hang

2008-01-01T23:59:59.000Z

209

U-067:WebSVN Input Validation Flaw in getLog() Permits Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7:WebSVN Input Validation Flaw in getLog() Permits Cross-Site 7:WebSVN Input Validation Flaw in getLog() Permits Cross-Site Scripting Attacks U-067:WebSVN Input Validation Flaw in getLog() Permits Cross-Site Scripting Attacks December 22, 2011 - 8:15am Addthis PROBLEM: WebSVN Input Validation Flaw in getLog() Permits Cross-Site Scripting Attacks PLATFORM: WebSVN 2.3.0 and prior versions ABSTRACT: A remote user can access the target user's cookies (including authentication cookies), if any, associated with the site running the WebSVN software, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user. reference LINKS: SecurityTracker Alert ID: 1026438 WebSVN version update WebSVN News IMPACT ASSESSMENT: Medium Discussion: The getLog() function does not properly filter HTML code from user-supplied

210

HYDROGEN EFFECTS ON THE BURST PROPERTIES OF TYPE 304L STAINLESS STEEL FLAWED VESSELS  

DOE Green Energy (OSTI)

The effect of hydrogen on the burst properties Type 304L stainless steel vessels was investigated. The purpose of the study was to compare the burst properties of hydrogen-exposed stainless steel vessels burst with different media: water, helium gas, or deuterium gas. A second purpose of the tests was to provide data for the development of a predictive finite-element model. The burst tests were conducted on hydrogen-exposed and unexposed axially-flawed cylindrical vessels. The results indicate that samples burst pneumatically had lower volume ductility than those tested hydraulically. Deuterium gas tests had slightly lower ductility than helium gas tests. Burst pressures were not affected by burst media. Hydrogen-charged samples had lower volume ductility and slightly higher burst pressures than uncharged samples. Samples burst with deuterium gas fractured by quasi-cleavage near the inside wall. The results of the tests were used to improve a previously developed predictive finite-element model. The results show that predicting burst behavior requires as a material input the effect of hydrogen on the plastic strain to fracture from tensile tests. The burst test model shows that a reduction in the plastic strain to fracture of the material will result in lower volume ductility without a reduction in burst pressure which is in agreement with the burst results.

Morgan, M; Monica Hall, M; Ps Lam, P; Dean Thompson, D

2008-03-27T23:59:59.000Z

211

BWRVIP-18, Revision 1-A: BWR Vessel and Internals Project, BWR Core Spray Internals Inspection and Flaw Evaluation Guidelines  

Science Conference Proceedings (OSTI)

The Boiling Water Reactor Vessel and Internals Project (BWRVIP), formed in June 1994, is an association of utilities focused exclusively on boiling water reactor (BWR) vessel and internals issues. This BWRVIP report contains generic guidelines that describe locations on the core spray piping and spargers for which inspection is needed, categories of plants for which inspection needs would differ, extent of inspection and reinspection for each location, and flaw evaluation procedures to determine ...

2012-04-09T23:59:59.000Z

212

Using Designed Residual Stress Profiles to Produce Flaw-Tolerant Glass  

SciTech Connect

A processing approach has been identified and reduced to practice in which a residual stress profile can be designed such that cracks in a brittle material are arrested or grow in a stable fashion. In the procedure, cracks in the body encounter an increase in the magnitude of residual compression as the crack propagates. If correctly designed, the process increases strength, significantly decreases strength variability and gives rise to multiple cracking. This approach is demonstrated for an ion-exchanged silicate glass using four-point and biaxial flexure strength testing. Optical microscopy was used to study the morphology and development of the multiple cracking that precedes the final failure.

BEAUCHAMP, E.K.; GLASS, S. JILL; GREEN, D.J.; SGLAVO, M.

1999-09-02T23:59:59.000Z

213

MULTIPLE TORNADO  

E-Print Network (OSTI)

The purpose of this note is to call attention to a preferred 1,000-500-mb. thickness line that in the mean accompanies multiple tornado outbreaks in the United States. Studies by Sutcliffe [I] and others have suggested that thickness patterns are a suitable synoptic tool for obtaining a picture of the three-dimensional structure of the atmosphere. SutclifFe and Forsdyke [2] have placed particular emphasis on charts showing the pattern of thickness of the 1,000-500-mb. layer. The contribution of the thickness pattern and the synoptic pressure patterns to the vorticity of the tornado is outside the scope of the present study. However, though much has been written concerning the value of such patterns in the evaluation of vertical motion and synoptic development, there has

Conrad P. Mook

1954-01-01T23:59:59.000Z

214

Progress in evaluation and improvement in nondestructive examination reliability for inservice inspection of Light Water Reactors (LWRs) and characterize fabrication flaws in reactor pressure vessels  

Science Conference Proceedings (OSTI)

This paper is a review of the work conducted under two programs. One (NDE Reliability Program) is a multi-year program addressing the reliability of nondestructive evaluation (NDE) for the inservice inspection (ISI) of light water reactor components. This program examines the reliability of current NDE, the effectiveness of evolving technologies, and provides assessments and recommendations to ensure that the NDE is applied at the right time, in the right place with sufficient effectiveness that defects of importance to structural integrity will be reliably detected and accurately characterized. The second program (Characterizing Fabrication Flaws in Reactor Pressure Vessels) is assembling a data base to quantify the distribution of fabrication flaws that exist in US nuclear reactor pressure vessels with respect to density, size, type, and location. These programs will be discussed as two separate sections in this report. 4 refs., 7 figs.

Doctor, S.R.; Bowey, R.E.; Good, M.S.; Friley, J.R.; Kurtz, R.J.; Simonen, F.A.; Taylor, T.T.; Heasler, P.G.; Andersen, E.S.; Diaz, A.A.; Greenwood, M.S.; Hockey, R.L.; Schuster, G.J.; Spanner, J.C.; Vo, T.V.

1991-10-01T23:59:59.000Z

215

Electrophoretically active sol-gel processes to backfill, seal, and/or densify porous, flawed, and/or cracked coatings on electrically conductive material  

DOE Patents (OSTI)

Electrophoretically active sol-gel processes to fill, seal, and/or density porous, flawed, and/or cracked coatings on electrically conductive substrates. Such coatings may be dielectrics, ceramics, or semiconductors and, by the present invention, may have deposited onto and into them sol-gel ceramic precursor compounds which are subsequently converted to sol-gel ceramics to yield composite materials with various tailored properties. 6 figs.

Panitz, J.K.; Reed, S.T.; Ashley, C.S.; Neiser, R.A.; Moffatt, W.C.

1999-07-20T23:59:59.000Z

216

Materials Reliability Program: Advanced FEA Evaluation of Growth of Postulated Circumferential PWSCC Flaws in Pressurizer Nozzle Dis similar Metal Welds (MRP-216, Rev. 1)  

Science Conference Proceedings (OSTI)

Indications of circumferential flaws in the pressurizer nozzles at Wolf Creek raised questions about the need to accelerate refueling outages or take mid-cycle outages at other plants. This study demonstrates the viability of leak detection as a means to preclude the potential for rupture for the pressurizer nozzle dissimilar metal (DM) welds in a group of nine PWRs originally scheduled to perform performance demonstration initiative (PDI) inspection or mitigation during the spring 2008 outage season. Mo...

2007-08-10T23:59:59.000Z

217

Materials Reliability Program: Advanced FEA Evaluation of Growth of Postulated Circumferential PWSCC Flaws in Pressurizer Nozzle Dis similar Metal Welds (MRP-216)  

Science Conference Proceedings (OSTI)

Indications of circumferential flaws in the pressurizer nozzles at Wolf Creek raised questions about the need to accelerate refueling outages or take mid-cycle outages at other plants. This study demonstrates the viability of leak detection as a means to preclude the potential for rupture for the pressurizer nozzle dissimilar metal (DM) welds in a group of nine PWRs originally scheduled to perform performance demonstration initiative (PDI) inspection or mitigation during the spring 2008 outage season. Mo...

2007-08-02T23:59:59.000Z

219

Learning from multiple heuristics  

Science Conference Proceedings (OSTI)

Heuristic functions for single-agent search applications estimate the cost of the optimal solution. When multiple heuristics exist, taking their maximum is an effective way to combine them. A new technique is introduced for combining multiple heuristic ...

Mehdi Samadi; Ariel Felner; Jonathan Schaeffer

2008-07-01T23:59:59.000Z

220

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

July 5, 2012 July 5, 2012 U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System A vulnerability was reported in RSA Access Manager. A remote user can gain access to the target system. July 3, 2012 U-204: HP Network Node Manager i Input Validation Hole Permits Cross-Site Scripting Attacks Potential security vulnerabilities have been identified with HP Network Node Manager I (NNMi) for HP-UX, Linux, Solaris, and Windows. The vulnerabilities could be remotely exploited resulting in cross site scripting (XSS). June 29, 2012 U-202: Apple QuickTime Multiple Stack Overflow Vulnerabilities Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. June 28, 2012 U-201: HP System Management Homepage Bugs Let Remote Users Deny Service

Note: This page contains sample records for the topic "quicktime multiple flaws" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Multiple density layered insulator  

DOE Patents (OSTI)

A multiple density layered insulator for use with a laser is disclosed which provides at least two different insulation materials for a laser discharge tube, where the two insulation materials have different thermoconductivities. The multiple layer insulation materials provide for improved thermoconductivity capability for improved laser operation. 4 figs.

Alger, T.W.

1994-09-06T23:59:59.000Z

222

Multiple density layered insulator  

DOE Patents (OSTI)

A multiple density layered insulator for use with a laser is disclosed wh provides at least two different insulation materials for a laser discharge tube, where the two insulation materials have different thermoconductivities. The multiple layer insulation materials provide for improved thermoconductivity capability for improved laser operation.

Alger, Terry W. (Tracy, CA)

1994-01-01T23:59:59.000Z

223

Multiple shell fusion targets  

DOE Patents (OSTI)

Multiple shell fusion targets for use with electron beam and ion beam implosion systems are described. The multiple shell targets are of the low-power type and use a separate relatively low Z, low density ablator at large radius for the outer shell, which reduces the focusing and power requirements of the implosion system while maintaining reasonable aspect ratios. The targets use a high Z, high density pusher shell placed at a much smaller radius in order to obtain an aspect ratio small enough to protect against fluid instability. Velocity multiplication between these shells further lowers the power requirements. Careful tuning of the power profile and intershell density results in a low entropy implosion which allows breakeven at low powers. For example, with ion beams as a power source, breakeven at 10-20 Terrawatts with 10 MeV alpha particles for imploding a multiple shell target can be accomplished.

Lindl, J.D.; Bangerter, R.O.

1975-10-31T23:59:59.000Z

224

Photovoltaics: Separating Multiple Excitons  

Science Conference Proceedings (OSTI)

Scientists have demonstrated an efficient process for generating multiple excitons in adjacent silicon nanocrystals from a single high-energy photon. Their findings could prove useful for a wide range of photovoltaic applications.

Nozik, A. J.

2012-05-01T23:59:59.000Z

225

Learning from Multiple Outlooks  

E-Print Network (OSTI)

We consider semi-supervised learning from multiple outlooks of the same learning task, that is, learning from different representations of the same type of data. As opposed to learning from multiple views where it is assumed that the exact same instances have multiple representations, we only assume the availability of samples of the same learning task in different domains. We develop an algorithmic framework that is based on mapping the (unlabeled) data followed by adjusting the mapping using the scarcer labeled data. The mapped data from all the outlooks can then be used for a generic classification algorithm. We further provide sample complexity results under the assumption that the different outlooks are inherently low dimension Gaussian mixtures. Experiments with real-world data indicate the performance boost from using multiple outlooks.

Gal-on, Maayan

2010-01-01T23:59:59.000Z

226

Pyrochemical multiplicity counter development  

Science Conference Proceedings (OSTI)

Impure plutonium-bearing materials from pyrochemical processes often display both significant self-multiplication and variable ({alpha},n) reaction rates. Standard neutron coincidence counting techniques usually fail to accurately measure these materials. Neutron multiplicity counters measure the third moment of the neutron multiplicity distribution and thus make it possible to deduce the fertile plutonium mass of a sample even when both the self-multiplication and the ({alpha},n) reaction rate are unknown. A multiplicity counter suitable for measuring pyrochemical materials has been designed and built. This paper describes the results of characterization studies for the new counter. The counter consists of 126 helium-3 tubes arranged in 4 concentric rings in a polyethylene moderator; the average spacing between the tubes is 1.59 cm. The end plugs for the counter are made of graphite, and the 24.1- by 37.5-cm sample cavity is cadmium lined. The counter consists of two distinct halves from which the neutron counts are summed. The counter is capable of operation in either a freestanding mode with the two halves coupled together by an external cabinet or in a glove-box mode with the two halves placed around a glovebox well and then mated. For a {sup 252}Cf source centered in the sample cavity, the measured efficiency of the new multiplicity counter is 57.7% and its die-away time is 47.2{mu}s. 8 refs., 9 figs.

Langner, D.G.; Dytlewski, N.; Krick, M.S.

1991-01-01T23:59:59.000Z

227

Multiple stage multiple filter hydrate store  

DOE Patents (OSTI)

An improved hydrate store for a metal halogen battery system is disclosed which employs a multiple stage, multiple filter means for separating the halogen hydrate from the liquid used in forming the hydrate. The filter means is constructed in the form of three separate sections which combine to substantially cover the interior surface of the store container. Exit conduit means is provided in association with the filter means for transmitting liquid passing through the filter means to a hydrate former subsystem. The hydrate former subsystem combines the halogen gas generated during the charging of the battery system with the liquid to form the hydrate in association with the store. Relief valve means is interposed in the exit conduit means for controlling the operation of the separate sections of the filter means, such that the liquid flow through the exit conduit means from each of the separate sections is controlled in a predetermined sequence. The three separate sections of the filter means operate in three discrete stages to provide a substantially uniform liquid flow to the hydrate former subsystem during the charging of the battery system. The separation of the liquid from the hydrate causes an increase in the density of the hydrate by concentrating the hydrate along the filter means. 7 figs.

Bjorkman, H.K. Jr.

1983-05-31T23:59:59.000Z

228

FOURIER TRANSFORM MULTIPLE QUANTUM NMR  

E-Print Network (OSTI)

TRANSFORM MULTIPLE QUANTUM NMR G. Drobny, A. Pines, S.TRANSFO~~ MULTIPLE QUANTUM NMR G. Drobny, A. Pines, S.

Drobny, G.

2011-01-01T23:59:59.000Z

229

Multiple sort flow cytometer  

DOE Patents (OSTI)

A flow cytometer utilizes multiple lasers for excitation and respective fluorescence of identified dyes bonded to specific cells or events to identify and verify multiple events to be sorted from a sheath flow and droplet stream. Once identified, verified and timed in the sheath flow, each event is independently tagged upon separation from the flow by an electrical charge of +60, +120, or +180 volts and passed through oppositely charged deflection plates with ground planes to yield a focused six way deflection of at least six events in a narrow plane.

Van den Engh, Ger (Seattle, WA); Esposito, Richard J. (Seattle, WA)

1996-01-01T23:59:59.000Z

230

V-094: IBM Multiple Products Multiple Vulnerabilities | Department of  

NLE Websites -- All DOE Office Websites (Extended Search)

94: IBM Multiple Products Multiple Vulnerabilities 94: IBM Multiple Products Multiple Vulnerabilities V-094: IBM Multiple Products Multiple Vulnerabilities February 19, 2013 - 1:41am Addthis PROBLEM: IBM Multiple Products Multiple Vulnerabilities PLATFORM: IBM Maximo Asset Management versions 7.5, 7.1, and 6.2 IBM Maximo Asset Management Essentials versions 7.5, 7.1, and 6.2 IBM SmartCloud Control Desk version 7.5 IBM Tivoli Asset Management for IT versions 7.2, 7.1, and 6.2 IBM Tivoli Change and Configuration Management Database versions 7.2 and 7.1 IBM Tivoli Service Request Manager versions 7.2, 7.1, and 6.2 ABSTRACT: A weakness and multiple vulnerabilities have been reported in multiple IBM products. REFERENCE LINKS: IBM Reference #:1625624 IBM Product Security Incident Response Blog Secunia Advisory SA52132

231

Multiple gap photovoltaic device  

DOE Patents (OSTI)

A multiple gap photovoltaic device having a transparent electrical contact adjacent a first cell which in turn is adjacent a second cell on an opaque electrical contact, includes utilizing an amorphous semiconductor as the first cell and a crystalline semiconductor as the second cell.

Dalal, Vikram L. (Newark, DE)

1981-01-01T23:59:59.000Z

232

Multiple System Rate Process  

NLE Websites -- All DOE Office Websites (Extended Search)

DSW Multiple System Transmission Rate Process DSW Multiple System Transmission Rate Process Federal Register Notice Withdrawing Rate Proposal (PDF) Formal Process Extension Federal Register Notice (PDF) Customer Savings Under Various MSTR (XLS) Public Information Forum March 29, 2005 Customer Meeting Overview (Power Point) Customer Meeting Overview (PDF) Customer Meeting Transcript (PDF) Public Comment Forum April 6, 2005 Customer Meeting Transcript (PDF) Response Letter 5-17-05 (PDF) Customer Letters Tonopah ID-5/25/05 (PDF) APS-5/26/05 (PDF) SRP-5/27/05 (PDF) RSLynch-6/1/05 (PDF) KRSaline-6/1/05 (PDF) Formal Process Federal Register Notice (Word) Federal Register Notice (PDF) Brochure (Word) Appendices to Brochure: A B C D E1 E2 F1 F2 GH Public Information Forum July 14, 2004 Customer Meeting Overview (Power Point)

233

Portable multiplicity counter  

DOE Patents (OSTI)

A portable multiplicity counter has signal input circuitry, processing circuitry and a user/computer interface disposed in a housing. The processing circuitry, which can comprise a microcontroller integrated circuit operably coupled to shift register circuitry implemented in a field programmable gate array, is configured to be operable via the user/computer interface to count input signal pluses receivable at said signal input circuitry and record time correlations thereof in a total counting mode, coincidence counting mode and/or a multiplicity counting mode. The user/computer interface can be for example an LCD display/keypad and/or a USB interface. The counter can include a battery pack for powering the counter and low/high voltage power supplies for biasing external detectors so that the counter can be configured as a hand-held device for counting neutron events.

Newell, Matthew R. (Los Alamos, NM); Jones, David Carl (Los Alamos, NM)

2009-09-01T23:59:59.000Z

234

Multiple sclerosis and interferon  

NLE Websites -- All DOE Office Websites (Extended Search)

Multiple sclerosis and interferon Multiple sclerosis and interferon Name: iguanajoe Status: N/A Age: N/A Location: N/A Country: N/A Date: Around 1993 Question: I have recently read that interferon is being used as a treatment for multiple sclerosis. Please explain how it affects the nerve tissue and how effective it is. Replies: Interferon is a cell to cell chemical messenger which essentially protects cells from viruses. That is, when a virus infects a cell, it sends out interferon, which is received by neighboring cells. A biochemical reaction then follows which builds the cells resistance viruses, and hopefully, it will be enough to prevent the virus from spreading. If there is work with interferon and MS, perhaps some researchers believe that MS is caused by a viral infection that destroys nervous tissue. r, that viruses cause some genetic mutation which compromises the maintenance of healthy nervous tissue. By the way, the genetic cause for another muscular-nervous disorder, Lou Gherigs Disease or ALS, was recently found to be a hereditary genetic disorder. People susceptible to ALS did not have a gene which codes for a certain superoxide dismutase antioxidant enzyme, necessary to maintain healthy nervous tissue and prevent it from free radical destruction. Maybe the cause of MS is similar.

235

In-service Inspection Ultrasonic Testing of Reactor Pressure Vessel Welds for Assessing Flaw Density and Size Distribution per 10 CFR 50.61a, Alternate Fracture Toughness Requirements  

SciTech Connect

Pressurized thermal shock (PTS) events are system transients in a pressurized water reactor (PWR) in which there is a rapid operating temperature cool-down that results in cold vessel temperatures with or without repressurization of the vessel. The rapid cooling of the inside surface of the reactor pressure vessel (RPV) causes thermal stresses that can combine with stresses caused by high pressure. The aggregate effect of these stresses is an increase in the potential for fracture if a pre-existing flaw is present in a material susceptible to brittle failure. The ferritic, low alloy steel of the reactor vessel beltline adjacent to the core, where neutron radiation gradually embrittles the material over the lifetime of the plant, can be susceptible to brittle fracture. The PTS rule, described in the Code of Federal Regulations, Title 10, Section 50.61 (50.61), Fracture Toughness Requirements for Protection against Pressurized Thermal Shock Events, adopted on July 23, 1985, establishes screening criteria to ensure that the potential for a reactor vessel to fail due to a PTS event is deemed to be acceptably low. The U.S. Nuclear Regulatory Commission (NRC) completed a research program that concluded that the risk of through-wall cracking due to a PTS event is much lower than previously estimated. The NRC subsequently developed a rule, 50.61a, published on January 4, 2010, entitled Alternate Fracture Toughness Requirements for Protection Against Pressurized Thermal Shock Events (75 FR 13). Use of the new rule by licensees is optional. The 50.61a rule differs from 50.61 in that it requires licensees who choose to follow this alternate method to analyze the results from periodic volumetric examinations required by the ASME Code, Section XI, Rules for Inservice Inspection (ISI) of Nuclear Power Plants. These analyses are intended to determine if the actual flaw density and size distribution in the licensees reactor vessel beltline welds are bounded by the flaw density and size distribution values used in the PTS technical basis. Under a contract with the NRC, Pacific Northwest National Laboratory (PNNL) has been working on a program to assess the ability of current inservice inspection (ISI)-ultrasonic testing (UT) techniques, as qualified through ASME Code, Appendix VIII, Supplements 4 and 6, to detect small fabrication or inservice-induced flaws located in RPV welds and adjacent base materials. As part of this effort, the investigators have pursued an evaluation, based on the available information, of the capability of UT to provide flaw density/distribution inputs for making RPV weld assessments in accordance with 50.61a. This paper presents the results of an evaluation of data from the 1993 Browns Ferry Nuclear Plant, Unit 3, Spirit of Appendix VIII reactor vessel examination, a comparison of the flaw density/distribution from this data with the distribution in 50.61a, possible reasons for differences, and plans and recommendations for further work in this area.

Sullivan, Edmund J.; Anderson, Michael T.; Norris, Wallace

2012-09-17T23:59:59.000Z

236

Case study of the propagation of a small flaw under PWR loading conditions and comparison with the ASME code design life. Comparison of ASME Code Sections III and XI  

SciTech Connect

A cooperative study was performed by EG and G Idaho, Inc., and Oak Ridge National Laboratory to investigate the degree of conservatism and consistency in the ASME Boiler and Pressure Vessel Code Section III fatigue evaluation procedure and Section XI flaw acceptance standards. A single, realistic, sample problem was analyzed to determine the significance of certain points of criticism made of an earlier parametric study by staff members of the Division of Engineering Standards of the Nuclear Regulatory Commission. The problem was based on a semielliptical flaw located on the inside surface of the hot-leg piping at the reactor vessel safe-end weld for the Zion 1 pressurized-water reactor (PWR). Two main criteria were used in selecting the problem; first, it should be a straight pipe to minimize the computational expense; second, it should exhibit as high a cumulative usage factor as possible. Although the problem selected has one of the highest cumulative usage factors of any straight pipe in the primary system of PWRs, it is still very low. The Code Section III fatigue usage factor was only 0.00046, assuming it was in the as-welded condition, and fatigue crack-growth analyses predicted negligible crack growth during the 40-year design life. When the analyses were extended past the design life, the usage factor was less than 1.0 when the flaw had propagated to failure. The current study shows that the criticism of the earlier report should not detract from the conclusion that if a component experiences a high level of cyclic stress corresponding to a fatigue usage factor near 1.0, very small cracks can propagate to unacceptable sizes.

Yahr, G.T.; Gwaltney, R.C.; Richardson, A.K.; Server, W.L.

1986-01-01T23:59:59.000Z

237

Phase-multiplication holography  

DOE Patents (OSTI)

This disclosure relates generally to nondestructive testing for identifying structural characteristics of an object by scanned holographic techniques using a known source of radiation, such as electromagnetic or acoustical radiation. It is an object of this invention to provide an apparatus and method for synthetic aperture expansion in holographic imaging applications to construct fringe patterns capable of holographic reproduction where aperture restrictions in nondestructive testing applications would conventionally make such imaging techniques impossible. The apparatus and method result in the production of a sharply defined frontal image of structural characteristics which could not otherwise be imaged because they occur either near the surface of the object or are confined by geometry restricting aperture dimensions available for scanning purposes. The depth of the structural characteristic below the surface of the object can also be determined by the reconstruction parameters which produce the sharpest focus. Lateral resolution is established by simulated reduction in the radiation wavelength and may easily be an order of magnitude less than the electromagnetic wavelength in the material or 2 times the standard depth of penetration. Since the phase multiplication technique is performed on the detected data, the penetration depth available due to the longer wavelength signals applied to the test object remains unchanged. The phase multiplication technique can also be applied to low frequency acoustic holography, resulting in a test which combines excellent penetration of difficult materials with high resolution images.

Collins, H.D.; Prince, J.M.; Davis, T.J.

1982-01-25T23:59:59.000Z

238

Multiple capillary biochemical analyzer  

DOE Patents (OSTI)

A multiple capillary analyzer allows detection of light from multiple capillaries with a reduced number of interfaces through which light must pass in detecting light emitted from a sample being analyzed, using a modified sheath flow cuvette. A linear or rectangular array of capillaries is introduced into a rectangular flow chamber. Sheath fluid draws individual sample streams through the cuvette. The capillaries are closely and evenly spaced and held by a transparent retainer in a fixed position in relation to an optical detection system. Collimated sample excitation radiation is applied simultaneously across the ends of the capillaries in the retainer. Light emitted from the excited sample is detected by the optical detection system. The retainer is provided by a transparent chamber having inward slanting end walls. The capillaries are wedged into the chamber. One sideways dimension of the chamber is equal to the diameter of the capillaries and one end to end dimension varies from, at the top of the chamber, slightly greater than the sum of the diameters of the capillaries to, at the bottom of the chamber, slightly smaller than the sum of the diameters of the capillaries. The optical system utilizes optic fibers to deliver light to individual photodetectors, one for each capillary tube. A filter or wavelength division demultiplexer may be used for isolating fluorescence at particular bands. 21 figs.

Dovichi, N.J.; Zhang, J.Z.

1995-08-08T23:59:59.000Z

239

Multiple layer insulation cover  

DOE Patents (OSTI)

A multiple layer insulation cover for preventing heat loss in, for example, a greenhouse, is disclosed. The cover is comprised of spaced layers of thin foil covered fabric separated from each other by air spaces. The spacing is accomplished by the inflation of spaced air bladders which are integrally formed in the cover and to which the layers of the cover are secured. The bladders are inflated after the cover has been deployed in its intended use to separate the layers of the foil material. The sizes of the material layers are selected to compensate for sagging across the width of the cover so that the desired spacing is uniformly maintained when the cover has been deployed. The bladders are deflated as the cover is stored thereby expediting the storage process and reducing the amount of storage space required.

Farrell, James J. (Livingston Manor, NY); Donohoe, Anthony J. (Ovid, NY)

1981-11-03T23:59:59.000Z

240

Traits and Multiple Genes  

NLE Websites -- All DOE Office Websites (Extended Search)

Traits and Multiple Genes Traits and Multiple Genes Name: Frank Location: N/A Country: N/A Date: N/A Question: Please, could you give me an example of how human traits are controlled by more than one pair of alleles? Replies: Your question is just a bit vague, there are different answers depending on just what your question is. I will answer it in terms of polygenic traits also known as additive alleles. When you think of traits such as skin color, hair color and eye color, or traits where there is a wide range of phenotypes they are usually under the control of more than one pair of alleles. These alleles can even be on different chromosomes! Each pair of additive alleles adds to the phenotype. For instance in the case of skin color, scientists now believe that 3 genes control skin color. You then get 3 sets from your mother and 3 from your father for 6 possibilities. If all 6 of the alleles are for dark skin, you will have the darkest possible skin. If you have 5 dark alleles and one light, you will have very dark skin. If you have all 6 light alleles then you will have the lightest skin possible. Is it possible to have a child that is light skinned when both parents are dark-skinned? Well, not if both have all 6 dark alleles, but if they have some light alleles and the child inherits all of the possible light alleles available, then yes, the child could have lighter skin than either parent. It is now believed that eye color is not simply brown being dominant over blue because how many people do you know that have the same shade of brown or blue eyes? Eye color must also be polygenic.

Note: This page contains sample records for the topic "quicktime multiple flaws" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Multiple stage railgun  

DOE Patents (OSTI)

A multiple stage magnetic railgun accelerator (10) for accelerating a projectile (15) by movement of a plasma arc (13) along the rails (11,12). The railgun (10) is divided into a plurality of successive rail stages (10a-n) which are sequentially energized by separate energy sources (14a-n) as the projectile (15) moves through the bore (17) of the railgun (10). Propagation of energy from an energized rail stage back towards the breech end (29) of the railgun (10) can be prevented by connection of the energy sources (14a-n) to the rails (11,12) through isolation diodes (34a-n). Propagation of energy from an energized rail stage back towards the breech end of the railgun can also be prevented by dividing the rails (11,12) into electrically isolated rail sections (11a-n, 12a-n). In such case means (55a-n) are used to extinguish the arc at the end of each energized stage and a fuse (31) or laser device (61) is used to initiate a new plasma arc in the next energized rail stage.

Hawke, Ronald S. (Livermore, CA); Scudder, Jonathan K. (Pleasanton, CA); Aaland, Kristian (Livermore, CA)

1982-01-01T23:59:59.000Z

242

Usability in multiple monitor displays  

Science Conference Proceedings (OSTI)

An experimental study was conducted to examine the impact of multiple monitors on user performance and multitasking. Forty-three participants were assigned to two groups - a multi-monitor group and a singlemonitor group - to carry out a series of tasks. ... Keywords: large display monitor, multiple monitors, multitasking, usability, user performance

Jacob M. Truemper; Hong Sheng; Michael G. Hilgers; Richard H. Hall; Morris Kalliny; Basanta Tandon

2008-10-01T23:59:59.000Z

243

Anomaly Detection at Multiple Scales  

Science Conference Proceedings (OSTI)

Please note that the content of this book primarily consists of articles available from Wikipedia or other free sources online. Anomaly Detection at Multiple Scales, or ADAMS, is a $35 million DARPA project designed to identify patterns and anomalies ...

Alain Sren Mikhayhu

2012-06-01T23:59:59.000Z

244

Multiple Specialization of WAM Code  

Science Conference Proceedings (OSTI)

Program specialization is normally supported by global analysis of the program. Compilers use the information deduced to generate more efficient, specialized implementations of the program. This specialization can be single or multiple, depending if ...

Michel Ferreira; Lus Damas

1999-01-01T23:59:59.000Z

245

Parallel progressive multiple sequence alignment  

Science Conference Proceedings (OSTI)

Multiple Sequence Alignment is an essential tool in the analysis and comparison of biological sequences. Unfortunately, the complexity of this problem is exponential. Currently feasible methods are, therefore, only approximations. The progressive ...

Erik Pitzer

2005-02-01T23:59:59.000Z

246

Federal Energy Management Program: Multiple Motivations Institutional  

NLE Websites -- All DOE Office Websites (Extended Search)

Multiple Multiple Motivations Institutional Change Principle to someone by E-mail Share Federal Energy Management Program: Multiple Motivations Institutional Change Principle on Facebook Tweet about Federal Energy Management Program: Multiple Motivations Institutional Change Principle on Twitter Bookmark Federal Energy Management Program: Multiple Motivations Institutional Change Principle on Google Bookmark Federal Energy Management Program: Multiple Motivations Institutional Change Principle on Delicious Rank Federal Energy Management Program: Multiple Motivations Institutional Change Principle on Digg Find More places to share Federal Energy Management Program: Multiple Motivations Institutional Change Principle on AddThis.com... Sustainable Buildings & Campuses

247

CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure...

248

Robust Multiple Car Tracking With Occlusion Reasoning  

E-Print Network (OSTI)

BERKELEY Robust Multiple Car Tracking with OcclusionAND HIGHWAYS Robust Multiple Car Tracking with Occlusiondraws decisions like "stalled car in lane 2 detected", "high

Koler, Dieter; Weber, Joseph; Malik, Jitendra

1994-01-01T23:59:59.000Z

249

Normalized Compression Distance of Multiples  

E-Print Network (OSTI)

Normalized compression distance (NCD) is a parameter-free similarity measure based on compression. The NCD between pairs of objects is not sufficient for all applications. We propose an NCD of finite multisets (multiples) of objacts that is metric and is better for many applications. Previously, attempts to obtain such an NCD failed. We use the theoretical notion of Kolmogorov complexity that for practical purposes is approximated from above by the length of the compressed version of the file involved, using a real-world compression program. We applied the new NCD for multiples to retinal progenitor cell questions that were earlier treated with the pairwise NCD. Here we get significantly better results. We also applied the NCD for multiples to synthetic time sequence data. The preliminary results are as good as nearest neighbor Euclidean classifier.

Cohen, Andrew R

2012-01-01T23:59:59.000Z

250

Constraining multiple systems with GAIA  

E-Print Network (OSTI)

GAIA will provide observations of some multiple asteroid and dwarf systems. These observations are a way to determine and improve the quantification of dynamical parameters, such as the masses and the gravity fields, in these multiple systems. Here we investigate this problem in the cases of Pluto's and Eugenia's system. We simulate observations reproducing an approximate planning of the GAIA observations for both systems, as well as the New Horizons observations of Pluto. We have developed a numerical model reproducing the specific behavior of multiple asteroid system around the Sun and fit it to the simulated observations using least-square method, giving the uncertainties on the fitted parameters. We found that GAIA will improve significantly the precision of Pluto's and Charon's mass, as well as Petit Prince's orbital elements and Eugenia's polar oblateness.

Beauvalet, L; Arlot, J -E; Bancelin, D; Binzel, R P; Marchis, F

2012-01-01T23:59:59.000Z

251

Multiple resonant railgun power supply  

DOE Patents (OSTI)

A multiple repetitive resonant railgun power supply provides energy for repetitively propelling projectiles from a pair of parallel rails. A plurality of serially connected paired parallel rails are powered by similar power supplies. Each supply comprises an energy storage capacitor, a storage inductor to form a resonant circuit with the energy storage capacitor and a magnetic switch to transfer energy between the resonant circuit and the pair of parallel rails for the propelling of projectiles. The multiple serial operation permits relatively small energy components to deliver overall relatively large amounts of energy to the projectiles being propelled.

Honig, Emanuel M. (Los Alamos, NM); Nunnally, William C. (Los Alamos, NM)

1988-01-01T23:59:59.000Z

252

Multiple resonant railgun power supply  

DOE Patents (OSTI)

A multiple repetitive resonant railgun power supply provides energy for repetitively propelling projectiles from a pair of parallel rails. A plurality of serially connected paired parallel rails are powered by similar power supplies. Each supply comprises an energy storage capacitor, a storage inductor to form a resonant circuit with the energy storage capacitor and a magnetic switch to transfer energy between the resonant circuit and the pair of parallel rails for the propelling of projectiles. The multiple serial operation permits relatively small energy components to deliver overall relatively large amounts of energy to the projectiles being propelled.

Honig, E.M.; Nunnally, W.C.

1985-06-19T23:59:59.000Z

253

Multiple Partonic Interactions in Herwig++  

E-Print Network (OSTI)

We review the implementation of a model for multiple partonic interactions in Herwig++. Moreover, we show how recent studies on the colour structure of events in Herwig++ led to a significant improvement in the description of soft inclusive observables in pp interactions at the LHC.

Stefan Gieseke; Christian Rohr; Andrzej Siodmok

2013-02-20T23:59:59.000Z

254

Multiple target laser ablation system  

DOE Patents (OSTI)

A laser ablation apparatus and method are provided in which multiple targets consisting of material to be ablated are mounted on a movable support. The material transfer rate is determined for each target material, and these rates are stored in a controller. A position detector determines which target material is in a position to be ablated, and then the controller controls the beam trigger timing and energy level to achieve a desired proportion of each constituent material in the resulting film.

Mashburn, Douglas N. (Knoxville, TN)

1996-01-01T23:59:59.000Z

255

Multiple Uses of Substation Data  

Science Conference Proceedings (OSTI)

This report describes a suite of modules developed under the Multiple Uses of Substation Data project. The modules are aimed at the integration and automated analysis of data coming from several Intelligent Electronic Devices (IEDs) such as Digital Protective Relays, Digital Fault Recorders and Circuit Breaker Monitors. Once data are collected, automated analysis processes the files to extract relevant information. The modules convert non-operational data to information that may be used by variety of app...

2008-06-30T23:59:59.000Z

256

Improving feedback from multiple choice tests  

Science Conference Proceedings (OSTI)

Providing individual feedback to large groups of students can be difficult. By asking students to record their confidence in multiple choice test answers the quality of feedback can be improved. In a "multiple choice question" (MCQ) test the student ...

William Fone

2002-06-01T23:59:59.000Z

257

Multiple piece turbine rotor blade  

DOE Patents (OSTI)

A multiple piece turbine rotor blade with a shell having an airfoil shape and secured between a spar and a platform with the spar including a tip end piece. a snap ring fits around the spar and abuts against the spar tip end piece on a top side and abuts against a shell on the bottom side so that the centrifugal loads from the shell is passed through the snap ring and into the spar and not through a tip cap dovetail slot and projection structure.

Jones, Russell B; Fedock, John A

2013-05-21T23:59:59.000Z

258

Multiple channel programmable coincidence counter  

DOE Patents (OSTI)

A programmable digital coincidence counter having multiple channels and featuring minimal dead time. Neutron detectors supply electrical pulses to a synchronizing circuit which in turn inputs derandomized pulses to an adding circuit. A random access memory circuit connected as a programmable length shift register receives and shifts the sum of the pulses, and outputs to a serializer. A counter is input by the adding circuit and downcounted by the serializer, one pulse at a time. The decoded contents of the counter after each decrement is output to scalers.

Arnone, G.J.

1989-02-27T23:59:59.000Z

259

Visual secret sharing for multiple secrets  

Science Conference Proceedings (OSTI)

Conventional visual secret sharing schemes are designed for a single secret image so it is inefficient to generate numerous share images for multiple secret images simultaneously. Therefore, a novel visual secret sharing scheme for multiple secret images ... Keywords: Multiple secret sharing, Visual cryptography, Visual pattern, Visual secret sharing

Jen-Bang Feng; Hsien-Chu Wu; Chwei-Shyong Tsai; Ya-Fen Chang; Yen-Ping Chu

2008-12-01T23:59:59.000Z

260

Multiple channel data acquisition system  

DOE Patents (OSTI)

A multiple channel data acquisition system for the transfer of large amounts of data from a multiplicity of data channels has a plurality of modules which operate in parallel to convert analog signals to digital data and transfer that data to a communications host via a FASTBUS. Each module has a plurality of submodules which include a front end buffer (FEB) connected to input circuitry having an analog to digital converter with cache memory for each of a plurality of channels. The submodules are interfaced with the FASTBUS via a FASTBUS coupler which controls a module bus and a module memory. The system is triggered to effect rapid parallel data samplings which are stored to the cache memories. The cache memories are uploaded to the FEBs during which zero suppression occurs. The data in the FEBs is reformatted and compressed by a local processor during transfer to the module memory. The FASTBUS coupler is used by the communications host to upload the compressed and formatted data from the module memory. The local processor executes programs which are downloaded to the module memory through the FASTBUS coupler.

Crawley, H. Bert (Ames, IA); Rosenberg, Eli I. (Ames, IA); Meyer, W. Thomas (Ames, IA); Gorbics, Mark S. (Ames, IA); Thomas, William D. (Boone, IA); McKay, Roy L. (Ames, IA); Homer, Jr., John F. (Ames, IA)

1990-05-22T23:59:59.000Z

Note: This page contains sample records for the topic "quicktime multiple flaws" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Multiple channel data acquisition system  

DOE Patents (OSTI)

A multiple channel data acquisition system for the transfer of large amounts of data from a multiplicity of data channels has a plurality of modules which operate in parallel to convert analog signals to digital data and transfer that data to a communications host via a FASTBUS. Each module has a plurality of submodules which include a front end buffer (FEB) connected to input circuitry having an analog to digital converter with cache memory for each of a plurality of channels. The submodules are interfaced with the FASTBUS via a FASTBUS coupler which controls a module bus and a module memory. The system is triggered to effect rapid parallel data samplings which are stored to the cache memories. The cache memories are uploaded to the FEBs during which zero suppression occurs. The data in the FEBs is reformatted and compressed by a local processor during transfer to the module memory. The FASTBUS coupler is used by the communications host to upload the compressed and formatted data from the module memory. The local processor executes programs which are downloaded to the module memory through the FASTBUS coupler. 25 figs.

Crawley, H.B.; Rosenberg, E.I.; Meyer, W.T.; Gorbics, M.S.; Thomas, W.D.; McKay, R.L.; Homer, J.F. Jr.

1990-05-22T23:59:59.000Z

262

Hereditary Multiple Exostoses with Pseudoaneurysm  

Science Conference Proceedings (OSTI)

A 16-year-old male patient with hereditary multiple exostoses (HME) was found to have a pseudoaneurysm of the left popliteal artery caused by osteochondroma in the lower femur. The diagnosis was confirmed by ultrasound, magnetic resonance imaging and magnetic resonance angiography without the need to perform an angiogram. The osteochondroma was excised and the popliteal artery was repaired with a saphenous graft. Vascular complications are extremely rare in HME, pseudoaneurysm being the most common and mostly located in the popliteal artery. This complication should be considered in young HME patients with a mass at the knee region. The radiological spectrum of investigations allows the diagnosis of this complication with proper and less invasive management procedures for the patient.

Al-Hadidy, Azmy M. [Jordan University Hospital, University of Jordan, Department of Diagnostic Radiology (Jordan)], E-mail: ahadidy@ju.edu.jo; Al-Smady, Moa'ath M. [Jordan University Hospital, University of Jordan, Department of Vascular Surgery (Jordan); Haroun, Azmi A. [Jordan University Hospital, University of Jordan, Department of Diagnostic Radiology (Jordan); Hamamy, Hanan A. [National Institute for Diabetes Endocrinology and Genetics (Jordan); Ghoul, Suha M. [Jordan University Hospital, University of Jordan, Department of Diagnostic Radiology (Jordan); Shennak, Akram O. [Jordan University Hospital, University of Jordan, Department of Orthopedic Surgery (Jordan)

2007-06-15T23:59:59.000Z

263

Automated program flaw finding using simulated annealing  

Science Conference Proceedings (OSTI)

One of the major costs in a software project is the construction of test-data. This paper outlines a generalised test-case data generation framework based on optimisation techniques. The framework can incorporate a number of testing criteria, for both ... Keywords: automatic test-case generation, exception conditions, formal specifications, optimisation techniques, simulated annealing, software testing

Nigel Tracey; John Clark; Keith Mander

1998-03-01T23:59:59.000Z

264

V-207: Wireshark Multiple Denial of Service Vulnerabilities ...  

NLE Websites -- All DOE Office Websites (Extended Search)

7: Wireshark Multiple Denial of Service Vulnerabilities V-207: Wireshark Multiple Denial of Service Vulnerabilities July 31, 2013 - 1:59am Addthis PROBLEM: Multiple vulnerabilities...

265

U-173: Symantec Web Gateway Multiple Vulnerabilities | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Symantec Web Gateway Multiple Vulnerabilities U-173: Symantec Web Gateway Multiple Vulnerabilities May 21, 2012 - 7:00am Addthis PROBLEM: Symantec Web Gateway Multiple...

266

V-019: Google Chrome Multiple Vulnerabilities | Department of...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

19: Google Chrome Multiple Vulnerabilities V-019: Google Chrome Multiple Vulnerabilities November 8, 2012 - 6:00am Addthis PROBLEM: Google Chrome Multiple Vulnerabilities PLATFORM:...

267

Integrated Inverter Control for Multiple Electric Machines ...  

Wind Energy; Partners (27 ... control for directing multiple inverters with a single ... 57, 62), which may include a three-phase main ...

268

Management of multiple-use commons.  

E-Print Network (OSTI)

??This thesis addresses an example of multiple-use commons problems: the case of land use for forestry and reindeer husbandry. Forestry use land for industrial purposes (more)

Widmark, Camilla

2009-01-01T23:59:59.000Z

269

Implementation of multiple specialization in logic programs  

Science Conference Proceedings (OSTI)

Keywords: abstract interpretation, compile-time analysis, direct manipulation, distributed computing, graphical user interfaces, logic programming, multimedia, multiple program specialization, optimization, reconfiguration, user interface management system

Germn Puebla; Manuel Hermenegildo

1995-06-01T23:59:59.000Z

270

MULTIPLE OXIDANT CHROMIUM LEACHING FROM HANFORD WASTE  

MULTIPLE OXIDANT CHROMIUM LEACHING FROM HANFORD WASTE USDOE Aluminum Chromium Leaching Workshop January 24th, 2007 Jennifer E. Holland, Ph.D. Chairman, President, CEO

271

Development of multiple robotic fish cooperation platform  

Science Conference Proceedings (OSTI)

This article presents the development of a multiple robotic fish cooperation platform, which is established by employing a group of radio-controlled, multi-link fish-like robots. This work is inspired by the observation from nature that the capability ... Keywords: Multi-agent system, Multiple robot cooperation, Platform, Robotic fish

Jinyan Shao; Long Wang; Junzhi Yu

2007-03-01T23:59:59.000Z

272

Multiple attributes analysis of vegetable production  

Science Conference Proceedings (OSTI)

This paper shows the possibility of some multiple criteria decision-making methods in agricultural enterprise decisions. In practice humans often meet multi-criteria decision problems. The success of every organization depends, among other things, on ... Keywords: AHP, ORESTE, TOPSIS, WSM, agricultural decision, multiple attribute decision methods

Martin Mat?j?ek; Helena Broov

2011-04-01T23:59:59.000Z

273

External and mental referencing of multiple representations  

Science Conference Proceedings (OSTI)

This article reports on two experimental studies that investigate the impact of integration and external activity on an instructional support method that encourages learners to systematically and interactively integrate multiple representations in the ... Keywords: Cognitive load, Coherence formation, Multimedia, Multiple representations, Structure mapping, Visualizations

Daniel Bodemer; Uwe Faust

2006-01-01T23:59:59.000Z

274

PJM Interconnection (Multiple States) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

PJM Interconnection (Multiple States) PJM Interconnection (Multiple States) PJM Interconnection (Multiple States) < Back Eligibility Developer Savings Category Alternative Fuel Vehicles Hydrogen & Fuel Cells Buying & Making Electricity Water Home Weatherization Solar Wind Program Info State Delaware Program Type Interconnection PJM (originally Pennsylvania, Jersey, Maryland) Interconnection is a Regional Transmission Organization (RTO) that coordinates the movement of wholesale electricity in all or parts of Delaware, Illinois, Indiana, Kentucky, Maryland, Michigan, New Jersey, North Carolina, Ohio, Pennsylvania, Tennessee, Virginia, West Virginia and the District of Columbia. The PJM region has an area of 214,000 square miles, a population of about 60 million and a peak demand of 163,848 megawatts

275

Multiple predictor smoothing methods for sensitivity analysis  

Science Conference Proceedings (OSTI)

The use of multiple predictor smoothing methods in sampling-based sensitivity analyses of complex models is investigated. Specifically, sensitivity analysis procedures based on smoothing methods employing the stepwise application of the following nonparametric ...

Curtis B. Storlie; Jon C. Helton

2005-12-01T23:59:59.000Z

276

A Bistatic Multiple-Doppler Radar Network  

Science Conference Proceedings (OSTI)

A multiple-Doppler radar network can be constructed using only one, traditional, transmitting pencil-beam radar and one or more passive, low-gain, nontransmitting receivers at remote sites. Radiation scattered from the pencil beam of the ...

Joshua Wurman; Stanley Heckman; Dennis Boccippio

1993-12-01T23:59:59.000Z

277

Multiple signal fault detection using fuzzy logic  

Science Conference Proceedings (OSTI)

In this paper, we describe a multiple Signal Fault Detection system that employs fuzzy logic at two levels of detection: signal segment fault and signal fault. The system involves signal segmentation, feature extraction and fuzzy logic based segment ...

Yi Lu Murphey; Jacob Crossman; ZhiHang Chen

2003-06-01T23:59:59.000Z

278

Engine control system for multiple combustion modes  

Science Conference Proceedings (OSTI)

To reduce the emission by Diesel-engine in railway traction, continuous development and innovation in combustion, sensing net, control method and strategies are required to met the legal requirements. Multiple combustion modes by Diesel engines can reduce ...

D. Bonta; V. Tulbure; Cl. Festila

2008-05-01T23:59:59.000Z

279

Fair resource allocation in multiple access channels  

E-Print Network (OSTI)

We consider the problem of resource allocation in a multiple access channel. Our objective is to obtain rate and power allocation policies that maximize a general concave utility function of average transmission rates over ...

ParandehGheibi, Ali

2008-01-01T23:59:59.000Z

280

Minimizing Errors Associated with Multiplate Radiation Shields  

Science Conference Proceedings (OSTI)

Multiplate radiation shield errors are examined using the following techniques: 1) ray tracing analysis, 2) wind tunnel experiments, 3) numerical flow simulations, and 4) field testing. The authors objectives are to develop guidelines for ...

Scott J. Richardson; Fred V. Brock; Steven R. Semmer; Cathy Jirak

1999-11-01T23:59:59.000Z

Note: This page contains sample records for the topic "quicktime multiple flaws" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Persistent Multiple Jets and PV Staircase  

Science Conference Proceedings (OSTI)

The persistence of multiple jets is investigated with a quasigeostrophic, two-layer, ?-plane channel model. Linearly unstable normal modes are found to be capable of qualitatively describing the eddy fluxes of the nonlinear model. For a ...

Changhyun Yoo; Sukyoung Lee

2010-07-01T23:59:59.000Z

282

Visualizing Multiple Measures of Forecast Quality  

Science Conference Proceedings (OSTI)

A method for visually representing multiple measures of dichotomous (yesno) forecast quality (probability of detection, false alarm ratio, bias, and critical success index) in a single diagram is presented. Illustration of the method is provided ...

Paul J. Roebber

2009-04-01T23:59:59.000Z

283

Satellite Remote Sensing of Multiple Cloud Layers  

Science Conference Proceedings (OSTI)

The goals of the current study are threefold: 1) to present a multispectral, multiresolution (MSMR) methodology for analysis of scenes containing multiple cloud layers; 2) to apply the MSMR method to two multilevel cloud scenes recorded by the ...

B.A. Baum; T. Uttal; M. Poellot; T.P. Ackerman; J.M. Alvarez; J. Intrieri; D.O'C. Starr; J. Titlow; V. Tovinkere; E. Clothiaux

1995-12-01T23:59:59.000Z

284

Multiple-description multistage vector quantization  

Science Conference Proceedings (OSTI)

Multistage vector quantization (MSVQ) is a technique for low complexity implementation of high-dimensional quantizers, which has found applications within speech, audio, and image coding. In this paper, a multiple-description MSVQ (MD-MSVQ) targeted ...

Pradeepa Yahampath

2007-07-01T23:59:59.000Z

285

Multiple-Coincidence Interrogation of Fissionables  

SciTech Connect

The multiple coincidence technique uses 14.1 MeV neutrons to produce (n, multiple-?) coincidences to detect fissile and fissionable materials. Measurements of n-?-? coincidences with targets of depleted uranium (DU), W, and Pb, show that the counting rate for the DU is substantially above that for the non-fissionables. Also, the data involving prompt neutrons and delayed gammas in the DU time spectra provide a signature for fissionables that is distinct from that of non-fissionables.

J.P. Hurley, R.P. Keegan, J.R. Tinsley, R. Trainham

2009-05-01T23:59:59.000Z

286

Review: Independent component analysis for multiple-input multiple-output wireless communication systems  

Science Conference Proceedings (OSTI)

Independent component analysis (ICA), an efficient higher order statistics (HOS) based blind source separation technique, has been successfully applied in various fields. In this paper, we provide an overview of the applications of ICA in multiple-input ... Keywords: Frequency-domain equalization (FDE), I/Q imbalance, Independent component analysis (ICA), Multiple-input multiple-output (MIMO), Orthogonal frequency-division multiplexing (OFDM), Peak-to-average power ratio (PAPR)

J. Gao; X. Zhu; A. K. Nandi

2011-04-01T23:59:59.000Z

287

Experiment on a Modeling of Positive Electrodes with Multiple...  

NLE Websites -- All DOE Office Websites (Extended Search)

Experiment on a Modeling of Positive Electrodes with Multiple Active Materials for Lithium-Ion Batteries Title Experiment on a Modeling of Positive Electrodes with Multiple Active...

288

V-205: IBM Tivoli System Automation for Multiplatforms Java Multiple...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: IBM Tivoli System Automation for Multiplatforms Java Multiple Vulnerabilities V-205: IBM Tivoli System Automation for Multiplatforms Java Multiple Vulnerabilities July 29, 2013...

289

V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilit...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: IBM Maximo Asset Management Products Java Multiple Vulnerabilities V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilities May 22, 2013 - 12:46am Addthis...

290

V-145: IBM Tivoli Federated Identity Manager Products Java Multiple...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: IBM Tivoli Federated Identity Manager Products Java Multiple Vulnerabilities V-145: IBM Tivoli Federated Identity Manager Products Java Multiple Vulnerabilities April 30, 2013 -...

291

Stereo matching via selective multiple windows  

E-Print Network (OSTI)

Window-based correlation algorithms are widely used for stereo matching due to their computational efficiency as compared to global algorithms. In this paper, a multiple window correlation algorithm for stereo matching is presented which addresses the problems associated with a fixed window size. The developed algorithm differs from the previous multiple window algorithms by introducing a reliability test to select the most reliable window among multiple windows of increasing sizes. This ensures that at least one window is large enough to cover a region of adequate intensity variations while at the same time small enough to cover a constant depth region. A recursive computation procedure is also used to allow a computationally efficient implementation of the algorithm. The outcome obtained from a standard set of images with known disparity maps shows that the generated disparity maps are more accurate as compared to two popular stereo matching local algorithms.

Satyajit Anil Adhyapak; Nasser Kehtarnavaz; Mihai Nadin

2007-01-01T23:59:59.000Z

292

Beam profiles from multiple aperture sources  

SciTech Connect

Using a rapidly convergent approximation scheme, formulas are given for beam intensity profiles everywhere. In the first approximation, formulas are found for multiple aperture sources, such as a TFTR design, and integrated power for rectangular plates downstream for Gaussian beamlets. This analysis is duplicated for Lorentzian beamlets which should provide a probable upper bound for off-axis loading as Gaussian beamlets provide a probable lower bound. Formulas for beam intensity profiles are found everywhere. In first approximation, formulas are found for downstream intensity of multiple sources and integrated power for rectangular plates.

Whealton, J.H.

1979-02-01T23:59:59.000Z

293

Quantum internet using code division multiple access  

E-Print Network (OSTI)

A crucial open problem in large-scale quantum networks is how to efficiently transmit quantum data among many pairs of users via a common data-transmission medium. We propose a solution by developing a quantum code division multiple access (q-CDMA) approach in which quantum information is chaotically encoded to spread its spectral content, and then decoded via chaos synchronization to separate different sender-receiver pairs. In comparison to other existing approaches, such as frequency division multiple access (FDMA), the proposed q-CDMA can greatly increase the information rates per channel used, especially for very noisy quantum channels.

Jing Zhang; Yu-xi Liu; Sahin Kaya Ozdemir; Re-Bing Wu; Feifei Gao; Xiang-Bin Wang; Lan Yang; Franco Nori

2012-04-08T23:59:59.000Z

294

Laser isotope separation by multiple photon absorption  

DOE Patents (OSTI)

Multiple photon absorption from an intense beam of infrared laser light may be used to induce selective chemical reactions in molecular species which result in isotope separation or enrichment. The molecular species must have a sufficient density of vibrational states in its vibrational manifold that, in the presence of sufficiently intense infrared laser light tuned to selectively excite only those molecules containing a particular isotope, multiple photon absorption can occur. By this technique, for example, intense CO.sub.2 laser light may be used to highly enrich .sup.34 S in natural SF.sub.6 and .sup.11 B in natural BCl.sub.3.

Robinson, C. Paul (Los Alamos, NM); Rockwood, Stephen D. (Los Alamos, NM); Jensen, Reed J. (Los Alamos, NM); Lyman, John L. (Los Alamos, NM); Aldridge, III, Jack P. (Los Alamos, NM)

1977-01-01T23:59:59.000Z

295

Laser isotope separation by multiple photon absorption  

DOE Patents (OSTI)

Multiple photon absorption from an intense beam of infrared laser light may be used to induce selective chemical reactions in molecular species which result in isotope separation or enrichment. The molecular species must have a sufficient density of vibrational states in its vibrational manifold that, is the presence of sufficiently intense infrared laser light tuned to selectively excite only those molecules containing a particular isotope, multiple photon absorption can occur. By this technique, for example, intense CO.sub.2 laser light may be used to highly enrich .sup.34 S in natural SF.sub.6 and .sup.11 B in natural BCl.sub.3.

Robinson, C. Paul (Los Alamos, NM); Rockwood, Stephen D. (Los Alamos, NM); Jensen, Reed J. (Los Alamos, NM); Lyman, John L. (Los Alamos, NM); Aldridge, III, Jack P. (Los Alamos, NM)

1987-01-01T23:59:59.000Z

296

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

articlesu-086linux-kernel-procmem-privilege-escalation-vulnerability Article T-683:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code Google Chrome Multiple...

297

Volumetric stem biomass modelling using multiple regression  

Science Conference Proceedings (OSTI)

This paper presented the development of a simple model for obtaining the stem volume of a tropical tree species, that is, Cinnamomum iners based on the two volumetric equations, namely, the Huber's and Newton's equations. Variables considered during ... Keywords: best model, correlation tests, interactions, multiple regression, selection criteria, stem volume, volumetric equations

Noraini Abdullah; Zainodin Hj. Jubok; J. B. Nigel Jonney

2007-12-01T23:59:59.000Z

298

Clustering local frequency items in multiple databases  

Science Conference Proceedings (OSTI)

Frequent items could be considered as a basic type of patterns in a database. In the context of multiple data sources, most of the global patterns are based on local frequency items. A multi-branch company transacting from different branches often needs ... Keywords: Association, Clustering, Data mining, Measure of association, Multi-database mining

Animesh Adhikari

2013-07-01T23:59:59.000Z

299

Energy and momentum in multiple metric theories  

E-Print Network (OSTI)

We derive the expressions for canonical energy, momentum, and angular momentum for multiple metric theories. We prove that although the metric fields are generally interacting, the total energy is the sum of conserved energies corresponding to each metric. A positive energy theorem is given as a result.

Talshir, Idan

2013-01-01T23:59:59.000Z

300

Ensemble smoother with multiple data assimilation  

Science Conference Proceedings (OSTI)

In the last decade, ensemble-based methods have been widely investigated and applied for data assimilation of flow problems associated with atmospheric physics and petroleum reservoir history matching. This paper focuses entirely on the reservoir history-matching ... Keywords: Ensemble Kalman filter, Ensemble smoother, History matching, Multiple data assimilation

Alexandre A. Emerick, Albert C. Reynolds

2013-06-01T23:59:59.000Z

Note: This page contains sample records for the topic "quicktime multiple flaws" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Steady water waves with multiple critical layers  

E-Print Network (OSTI)

We construct small-amplitude periodic water waves with multiple critical layers. In addition to waves with arbitrarily many critical layers and a single crest in each period, two-dimensional sets of waves with several crests and troughs in each period are found. The setting is that of steady two-dimensional finite-depth gravity water waves with vorticity.

Mats Ehrnstrm; Joachim Escher; Erik Wahln

2010-04-29T23:59:59.000Z

302

Energy and momentum in multiple metric theories  

E-Print Network (OSTI)

We derive the expressions for canonical energy, momentum, and angular momentum for multiple metric theories. We prove that although the metric fields are generally interacting, the total energy is the sum of conserved energies corresponding to each metric. A positive energy theorem is given as a result.

Talshir, Idan

2012-01-01T23:59:59.000Z

303

Multiple kernel learning with gaussianity measures  

Science Conference Proceedings (OSTI)

Kernel methods are known to be effective for nonlinear multivariate analysis. One of the main issues in the practical use of kernel methods is the selection of kernel. There have been a lot of studies on kernel selection and kernel learning. Multiple ...

Hideitsu Hino; Nima Reyhani; Noboru Murata

2012-07-01T23:59:59.000Z

304

Multiple Input Microcantilever Sensor with Capacitive Readout  

DOE Green Energy (OSTI)

A surface-micromachined MEMS process has been used to demonstrate multiple-input chemical sensing using selectively coated cantilever arrays. Combined hydrogen and mercury-vapor detection was achieved with a palm-sized, self-powered module with spread-spectrum telemetry reporting.

Britton, C.L., Jr.; Brown, G.M.; Bryan, W.L.; Clonts, L.G.; DePriest, J.C.; Emergy, M.S.; Ericson, M.N.; Hu, Z.; Jones, R.L.; Moore, M.R.; Oden, P.I.; Rochelle, J.M.; Smith, S.F.; Threatt, T.D.; Thundat, T.; Turner, G.W.; Warmack, R.J.; Wintenberg, A.L.

1999-03-11T23:59:59.000Z

305

bu.edu/eng26 Managing Multiple,  

E-Print Network (OSTI)

the workload for human operators of semi-autonomous underwater, ground and aerial vehicles in military's computer code can follow, and thus survey a defined space. ROBOTICS #12;27 A persistent surveillance scenario in which multiple agents coordinate to survey a complex scene with areas weighted by importance

Goldberg, Bennett

306

Route to direct multiphoton multiple ionization  

Science Conference Proceedings (OSTI)

We address the concept of direct multiphoton multiple ionization in atoms exposed to intense, short-wavelength radiation and explore the conditions under which such processes dominate over the sequential. Their contribution is shown to be quite robust, even under intensity fluctuations and interaction volume integration, and reasonable agreement with experimental data is also found.

Lambropoulos, P. [Institute of Electronic Structure and Laser, FORTH, P.O. Box 1527, GR-71110 Heraklion (Greece); Department of Physics, University of Crete, P.O. Box 2208, GR-71003 Heraklion, Crete (Greece); Kavli Institute for Theoretical Physics, Santa Barbara, California 93106 (United States); Nikolopoulos, G. M. [Institute of Electronic Structure and Laser, FORTH, P.O. Box 1527, GR-71110 Heraklion (Greece); Kavli Institute for Theoretical Physics, Santa Barbara, California 93106 (United States); Papamihail, K. G. [Department of Physics, University of Crete, P.O. Box 2208, GR-71003 Heraklion, Crete (Greece)

2011-02-15T23:59:59.000Z

307

A material's multiple personalities | Argonne National Laboratory  

NLE Websites -- All DOE Office Websites (Extended Search)

News News Press Releases Feature Stories In the News Experts Guide Media Contacts Social Media Photos Videos Fact Sheets, Brochures and Reports Summer Science Writing Internship The brightness and energy of X-ray beams are critical properties for research. The APS Upgrade will make our X-ray beams brighter, meaning more X-rays can be focused onto a smaller, laser-like spot, allowing researchers to gather more data in greater detail in less time. A material's multiple personalities By Jared Sagoff * September 11, 2013 Tweet EmailPrint ARGONNE, Ill. - Just like people, materials can sometimes exhibit "multiple personalities." This kind of unusual behavior in a certain class of materials has compelled researchers at the U.S. Department of Energy's Argonne National Laboratory to take a closer look at the precise

308

Multiple Scattering Measurements in the MICE Experiment  

Science Conference Proceedings (OSTI)

The international Muon Ionization Cooling Experiment (MICE), under construction at RAL, will test a prototype cooling channel for a future Neutrino Factory or Muon Collider. The cooling channel aims to achieve, using liquid hydrogen absorbers, a 10% reduction in transverse emittance. The change in 4D emittance will be determined with an accuracy of 1% by measuring muons individually. Step IV of MICE will make the first precise emittance-reduction measurements of the experiment. Simulation studies using G4MICE, based on GEANT4, find a significant difference in multiple scattering in low Z materials, compared with the standard expression quoted by the Particle Data Group. Direct measurement of multiple scattering using the scintillating-fibre trackers is found to be possible, but requires the measurement resolution to be unfolded from the data.

Carlisle, T.; Cobb, J.; /Oxford U.; Neuffer, D.; /Fermilab

2012-05-01T23:59:59.000Z

309

Evaluation of multiple emission point facilities  

SciTech Connect

In 1970, the New York State Department of Environmental Conservation (NYSDEC) assumed responsibility for the environmental aspect of the state's regulatory program for by-product, source, and special nuclear material. The major objective of this study was to provide consultation to NYSDEC and the US NRC to assist NYSDEC in determining if broad-based licensed facilities with multiple emission points were in compliance with NYCRR Part 380. Under this contract, BNL would evaluate a multiple emission point facility, identified by NYSDEC, as a case study. The review would be a nonbinding evaluation of the facility to determine likely dispersion characteristics, compliance with specified release limits, and implementation of the ALARA philosophy regarding effluent release practices. From the data collected, guidance as to areas of future investigation and the impact of new federal regulations were to be developed. Reported here is the case study for the University of Rochester, Strong Memorial Medical Center and Riverside Campus.

Miltenberger, R.P.; Hull, A.P.; Strachan, S.; Tichler, J.

1988-01-01T23:59:59.000Z

310

Subcritical Measurments Multiple HEU Metal Castings  

SciTech Connect

Experiments with the standard annular highly enriched uranium (HEU) metal castings at the Y-12 National Security Complex were performed in which up to five castings ({approx}90 kg) were assembled in a tightly packed array with minimal spacing between castings. The fission chain multiplication process was initiated by a time-tagged {sup 252}Cf spontaneously fissioning neutron source or by time and directionally tagged neutrons from a small portable DT neutron generator. The prompt neutron time behavior was measured with plastic scintillation detectors sensitive to the fast neutron (>1 MeV) and gamma ray without distinction. These experiments were performed to provide data to benchmark methods for the calculation of the prompt neutron time behavior. Previous measurements with a single casting have been reported. This paper presents the experimental results for multiple castings.

Mihalczo, John T [ORNL; Archer, Daniel E [ORNL; Wright, Michael C [ORNL; Mullens, James Allen [ORNL

2008-01-01T23:59:59.000Z

311

MCNP6 Fission Multiplicity with FMULT Card  

Science Conference Proceedings (OSTI)

With the merger of MCNPX and MCNP5 into MCNP6, MCNP6 now provides all the capabilities of both codes allowing the user to access all the fission multiplicity data sets. Detailed in this paper is: (1) the new FMULT card capabilities for accessing these different data sets; (2) benchmark calculations, as compared to experiment, detailing the results of selecting these separate data sets for thermal neutron induced fission on U-235.

Wilcox, Trevor [Los Alamos National Laboratory; Fensin, Michael Lorne [Los Alamos National Laboratory; Hendricks, John S. [Los Alamos National Laboratory; James, Michael R. [Los Alamos National Laboratory; McKinney, Gregg W. [Los Alamos National Laboratory

2012-06-18T23:59:59.000Z

312

Multiple Use of Existing Transmission Corridors  

Science Conference Proceedings (OSTI)

Multiple use utility corridors can provide significant benefits for the utilities and the public. However, increasing the power flow in the power system can raise compatibility issues with other utilities or systems that share the corridor. This report provides case studies of three common corridors for which compatibility issues were raised as a result of planned increases in power transmission capacity. The case studies review the criteria used to evaluate compatibility and the need for mitigation meas...

2007-12-18T23:59:59.000Z

313

Hiding the Higgs Boson with Multiple Scalars  

E-Print Network (OSTI)

We consider models with multiple Higgs scalar gauge singlets and the resulting restrictions on the parameters from precision electroweak measurements. In these models, the scalar singlets mix with the SU(2) Higgs doublet, potentially leading to reduced couplings of the scalars to fermions and gauge bosons relative to the Standard Model Higgs boson couplings. Such models can make the Higgs sector difficult to explore at the LHC. We emphasize the new physics resulting from the addition of at least two scalar Higgs singlets.

Sally Dawson; Wenbin Yan

2009-04-13T23:59:59.000Z

314

Lamp method and apparatus using multiple reflections  

DOE Patents (OSTI)

A method wherein the light in a sulfur or selenium lamp is reflected through the fill a multiplicity of times to convert ultraviolet radiation to visible is disclosed. A light emitting device comprised of an electrodeless envelope which bears a light reflecting covering around a first portion which does not crack due to differential thermal expansion and which has a second portion which comprises a light transmissive aperture. 20 figs.

MacLennan, D.A.; Turner, B.; Kipling, K.

1999-05-11T23:59:59.000Z

315

Lamp method and apparatus using multiple reflections  

DOE Patents (OSTI)

A method wherein the light in a sulfur or selenium lamp is reflected through the fill a multiplicity of times to convert ultraviolet radiation to visible. A light emitting device comprised of an electrodeless envelope which bears a light reflecting covering around a first portion which does not crack due to differential thermal expansion and which has a second portion which comprises a light transmissive aperture.

MacLennan, Donald A. (Butler, PA); Turner, Brian (Damascus, MD); Kipling, Kent (Gaithersburg, MD)

1999-01-01T23:59:59.000Z

316

Multiple quantum coherence in HYSCORE spectra  

Science Conference Proceedings (OSTI)

The implementation of matched pulses in two-dimensional electron spin echo envelope modulation experiments results in a drastic increase in intensity of peaks representing nuclear multiple quantum coherence. For a spin system consisting of one electron spin S= 1 2 and two nuclei with spin I= 1 2 the nuclear coherence created by the sequence (?/2)???(?/2) is calculated. The transfer amplitudes between different kinds of nuclear coherences of a microwave ? pulse are given. A new matched HYSCORE pulse sequence

Lorenz Liesum; Arthur Schweiger

2001-01-01T23:59:59.000Z

317

MPACT Fast Neutron Multiplicity System Prototype Development  

Science Conference Proceedings (OSTI)

This document serves as both an FY2103 End-of-Year and End-of-Project report on efforts that resulted in the design of a prototype fast neutron multiplicity counter leveraged upon the findings of previous project efforts. The prototype design includes 32 liquid scintillator detectors with cubic volumes 7.62 cm in dimension configured into 4 stacked rings of 8 detectors. Detector signal collection for the system is handled with a pair of Struck Innovative Systeme 16-channel digitizers controlled by in-house developed software with built-in multiplicity analysis algorithms. Initial testing and familiarization of the currently obtained prototype components is underway, however full prototype construction is required for further optimization. Monte Carlo models of the prototype system were performed to estimate die-away and efficiency values. Analysis of these models resulted in the development of a software package capable of determining the effects of nearest-neighbor rejection methods for elimination of detector cross talk. A parameter study was performed using previously developed analytical methods for the estimation of assay mass variance for use as a figure-of-merit for system performance. A software package was developed to automate these calculations and ensure accuracy. The results of the parameter study show that the prototype fast neutron multiplicity counter design is very nearly optimized under the restraints of the parameter space.

D.L. Chichester; S.A. Pozzi; J.L. Dolan; M.T. Kinlaw; S.J. Thompson; A.C. Kaplan; M. Flaska; A. Enqvist; J.T. Johnson; S.M. Watson

2013-09-01T23:59:59.000Z

318

PARS II Process Document - Project Phasing (Multiple CD-2 from...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Project Phasing (Multiple CD-2 from Single CD-1) PARS II Process Document - Project Phasing (Multiple CD-2 from Single CD-1) This document details the process by which projects...

319

Expression of multiple proteins in transgenic plants  

DOE Patents (OSTI)

A method is disclosed for the production of multiple proteins in transgenic plants. A DNA construct for introduction into plants includes a provision to express a fusion protein of two proteins of interest joined by a linking domain including plant ubiquitin. When the fusion protein is produced in the cells of a transgenic plant transformed with the DNA construction, native enzymes present in plant cells cleave the fusion protein to release both proteins of interest into the cells of the transgenic plant. Since the proteins are produced from the same fusion protein, the initial quantities of the proteins in the cells of the plant are approximately equal.

Vierstra, Richard D. (Madison, WI); Walker, Joseph M. (Madison, WI)

2002-01-01T23:59:59.000Z

320

Multiple volume compressor for hot gas engine  

DOE Patents (OSTI)

A multiple volume compressor for use in a hot gas (Stirling) engine having a plurality of different volume chambers arranged to pump down the engine when decreased power is called for and return the working gas to a storage tank or reservoir. A valve actuated bypass loop is placed over each chamber which can be opened to return gas discharged from the chamber back to the inlet thereto. By selectively actuating the bypass valves, a number of different compressor capacities can be attained without changing compressor speed whereby the capacity of the compressor can be matched to the power available from the engine which is used to drive the compressor.

Stotts, Robert E. (Clifton Park, NY)

1986-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "quicktime multiple flaws" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Multiplicative cascades and seismicity in natural time  

Science Conference Proceedings (OSTI)

Natural time chi enables the distinction of two origins of self-similarity, i.e., the process memory and the process increments infinite variance. Employing multiplicative cascades in natural time, the most probable value of the variance kappa{sub 1}(ident to-{sup 2}) is explicitly related with the parameter b of the Gutenberg-Richter law of randomly shuffled earthquake data. Moreover, the existence of temporal and magnitude correlations is studied in the original earthquake data. Magnitude correlations are larger for closer in time earthquakes, when the maximum interoccurrence time varies from half a day to 1 min.

Sarlis, N. V.; Skordas, E. S.; Varotsos, P. A. [Department of Physics, Solid State Section and Solid Earth Physics Institute, University of Athens, Panepistimiopolis, Zografos, 157 84 Athens (Greece)

2009-08-15T23:59:59.000Z

322

Statistical estimation of multiple faults in aircraft gas turbine engines  

E-Print Network (OSTI)

415 Statistical estimation of multiple faults in aircraft gas turbine engines S Sarkar, C Rao of multiple faults in aircraft gas-turbine engines, based on a statistical pattern recognition tool called commercial aircraft engine. Keywords: aircraft propulsion, gas turbine engines, multiple fault estimation

Ray, Asok

323

An extreme-distance approach to multiple criteria ranking  

Science Conference Proceedings (OSTI)

A distance approach based on extreme points, or predefined ideal and anti-ideal points, is proposed to improve on the TOPSIS (Technique for Order Performance [or Ordered Preference] by Similarity to Ideal Solution) method of multiple criteria ranking. ... Keywords: Comparative study, Distance-based ranking, Multiple criteria decision analysis, Multiple criteria ranking, TOPSIS

Ye Chen; D. Marc Kilgour; Keith W. Hipel

2011-03-01T23:59:59.000Z

324

A MULTIPLE-ITEM MULTIPLE-CONSTRAINT INVENTORY OPTIMIZATION AND SUPPLIER SELECTION MODEL UNDER LEAD TIME DEMAND UNCERTAINTY.  

E-Print Network (OSTI)

??The objective of this thesis is to solve a multiple-item, one-retailer inventory control and supplier selection problem with multiple constraints and uncertainties. For each item, (more)

Zhu, Rongjia

2009-01-01T23:59:59.000Z

325

Multiple output timing and trigger generator  

SciTech Connect

In support of the development of a multiple stage pulse modulator at the Los Alamos National Laboratory, we have developed a first generation, multiple output timing and trigger generator. Exploiting Commercial Off The Shelf (COTS) Micro Controller Units (MCU's), the timing and trigger generator provides 32 independent outputs with a timing resolution of about 500 ns. The timing and trigger generator system is comprised of two MCU boards and a single PC. One of the MCU boards performs the functions of the timing and signal generation (the timing controller) while the second MCU board accepts commands from the PC and provides the timing instructions to the timing controller. The PC provides the user interface for adjusting the on and off timing for each of the output signals. This system provides 32 output or timing signals which can be pre-programmed to be in an on or off state for each of 64 time steps. The width or duration of each of the 64 time steps is programmable from 2 {micro}s to 2.5 ms with a minimum time resolution of 500 ns. The repetition rate of the programmed pulse train is only limited by the time duration of the programmed event. This paper describes the design and function of the timing and trigger generator system and software including test results and measurements.

Wheat, Robert M. [Los Alamos National Laboratory; Dale, Gregory E [Los Alamos National Laboratory

2009-01-01T23:59:59.000Z

326

Energy-Efficient Matrix Multiplication on FPGAs  

E-Print Network (OSTI)

We develop new algorithms and architectures for matrix multiplication on configurable devices. These designs significantly reduce the energy dissipation and latency compared with the state-of-the-art FPGA-based designs. We derive functions to represent the impact of algorithmic level design choices on the system-wide energy dissipation, latency, and area by capturing algorithm and architecture details including features of the target FPGA. The functions are used to optimize energy performance under latency and area constraints for a family of candidate algorithms and architectures. As a result, our designs improve the energy performance of the optimized design from the recent Xilinx library by 32% to 88% without any increase in area-latency product. In terms of comprehensive metrics such as EAT (Energy-Area-Time) and E/AT (Energy/Area-Time), our designs offer superior performance compared with the Xilinx design by 50%-79% and 13%-44%, respectively. We also address how to exploit further increases in density of future FPGA devices for asymptotic improvement in latency and energy dissipation for multiplication of larger size matrices.

Ju-wook Jang; Seonil Choi; Viktor K. Prasanna

2002-01-01T23:59:59.000Z

327

Performance of joint transmit scheme assisted multiple-input multiple-output multi-carrier IDMA system  

Science Conference Proceedings (OSTI)

In this paper, we present the performance of a multiple-input multiple-output multi-carrier interleave division multiple access (MC-IDMA) system assisted by combined vertical Bell Laboratories layered space-time architecture and space-time block code ...

K. S. Vishvaksenan, R. Seshasayanan, Yuvaraj Krishnamoorthy

2013-04-01T23:59:59.000Z

328

T-576: Oracle Solaris Adobe Flash Player Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Oracle Solaris Adobe Flash Player Multiple Vulnerabilities 6: Oracle Solaris Adobe Flash Player Multiple Vulnerabilities T-576: Oracle Solaris Adobe Flash Player Multiple Vulnerabilities March 14, 2011 - 3:05pm Addthis PROBLEM: Oracle has acknowledged multiple vulnerabilities in Adobe Flash Player included in Solaris, which can be exploited by malicious people to compromise a user's system. PLATFORM: Sun Solaris 10 ABSTRACT: Oracle Solaris Adobe Flash Player Multiple Vulnerabilities. reference LINKS: Secunia Advisory: SA43747 Oracle Sun Advisory: CVE Multiple Vulnerabilities in Adobe Flash Player Secure List: SA43747 Oracle Sun Support Adobe Flash Player for Linux and Solaris IMPACT ASSESSMENT: High Discussion: Oracle has acknowledged multiple vulnerabilities in Solaris, which can be exploited by malicious people to disclose sensitive information, bypass

329

Automatic Commissioning of Multiple VAV Terminals  

E-Print Network (OSTI)

A site survey on a modern operating commercial building screened 261 ineffective VAV (Variable Air Volume) boxes (20.9% of the total boxes in the building) and summarized ten typical faults for VAV air-conditioning system(s) resulting in energy waste, performance degradation or totally out of control. A strategy is developed to automatically check the health condition of VAV terminals and diagnose the faults. Hybrid approach is employed to establish a commissioning and re-commissioning tool of VAV air-conditioning system. Performance indices with expert rules based on system physical characteristics are adopted to detect and diagnose the nine of the ten faults. PCA (Principal Component Analysis) method is developed to detect and diagnose the VAV box flow sensor bias (Fault 10) and to reconstruct the faulty sensors. A multiple VAV fault FDD strategy for a VAV entire system is developed, which is validated in simulation and filed tests.

Qin, J.; Wang, S.

2004-01-01T23:59:59.000Z

330

Multi-Stage Multiple-Hypothesis Tracking  

E-Print Network (OSTI)

While multiple hypothesis tracking (MHT) is widely acknowledged as an effective methodology for multi-target surveillance, there is a challenge to manage effectively a potentially large number of track hypotheses. Advanced single-stage track-while-fuse does not always offer the best processing scheme. We study two instances where multi-stage MHT processing is beneficialdense target scenarios and complementary-sensor surveillanceand propose two processing schemes for these challenges: track-break-fuse and trackbefore-fuse, respectively. We provide simulation results demonstrating the advantages of these schemes over track-while-fuse. Moregenerally, we argue that multi-stage MHT offers a powerful and flexible paradigm to circumvent limitations in conventional MHT processing.

Stefano Coraluppi; Craig Carthel

2009-01-01T23:59:59.000Z

331

Multiple hearth furnace for reducing iron oxide  

SciTech Connect

A multiple moving hearth furnace (10) having a furnace housing (11) with at least two moving hearths (20) positioned laterally within the furnace housing, the hearths moving in opposite directions and each moving hearth (20) capable of being charged with at least one layer of iron oxide and carbon bearing material at one end, and being capable of discharging reduced material at the other end. A heat insulating partition (92) is positioned between adjacent moving hearths of at least portions of the conversion zones (13), and is capable of communicating gases between the atmospheres of the conversion zones of adjacent moving hearths. A drying/preheat zone (12), a conversion zone (13), and optionally a cooling zone (15) are sequentially positioned along each moving hearth (30) in the furnace housing (11).

Brandon, Mark M. (Charlotte, NC); True, Bradford G. (Charlotte, NC)

2012-03-13T23:59:59.000Z

332

Multiple predictor smoothing methods for sensitivity analysis.  

Science Conference Proceedings (OSTI)

The use of multiple predictor smoothing methods in sampling-based sensitivity analyses of complex models is investigated. Specifically, sensitivity analysis procedures based on smoothing methods employing the stepwise application of the following nonparametric regression techniques are described: (1) locally weighted regression (LOESS), (2) additive models, (3) projection pursuit regression, and (4) recursive partitioning regression. The indicated procedures are illustrated with both simple test problems and results from a performance assessment for a radioactive waste disposal facility (i.e., the Waste Isolation Pilot Plant). As shown by the example illustrations, the use of smoothing procedures based on nonparametric regression techniques can yield more informative sensitivity analysis results than can be obtained with more traditional sensitivity analysis procedures based on linear regression, rank regression or quadratic regression when nonlinear relationships between model inputs and model predictions are present.

Helton, Jon Craig; Storlie, Curtis B.

2006-08-01T23:59:59.000Z

333

MULTIPLICITY AMONG F-TYPE STARS  

SciTech Connect

As part of a homogeneous all-sky volume-complete sample of half a thousand solar-type stars within 25 pc we present a census for the subset of the 150-mostly F-type stars-in the mass range 1.1 M{sub Sun} {<=} M {<=} 1.7 M{sub Sun} in terms of their observed multiplicities. The major obstacle, as expected, arises from the onset of stellar rotation in this mass range for it continues to support many hidden companions. Yet, a solid increase of the fraction of binary and higher level systems as a function of the primary mass is manifest. There is even the prospect that on account of many companion candidates the single-star fraction may already converge to zero at the transition to the A-type stars.

Fuhrmann, K.; Chini, R., E-mail: klaus@ing.iac.es [Astronomisches Institut, Ruhr-Universitaet Bochum, Universitaetsstrasse 150, D-44801 Bochum (Germany)

2012-12-15T23:59:59.000Z

334

MPACT Fast Neutron Multiplicity System Design Concepts  

Science Conference Proceedings (OSTI)

This report documents work performed by Idaho National Laboratory and the University of Michigan in fiscal year (FY) 2012 to examine design parameters related to the use of fast-neutron multiplicity counting for assaying plutonium for materials protection, accountancy, and control purposes. This project seeks to develop a new type of neutron-measurement-based plutonium assay instrument suited for assaying advanced fuel cycle materials. Some current-concept advanced fuels contain high concentrations of plutonium; some of these concept fuels also contain other fissionable actinides besides plutonium. Because of these attributes the neutron emission rates of these new fuels may be much higher, and more difficult to interpret, than measurements made of plutonium-only materials. Fast neutron multiplicity analysis is one approach for assaying these advanced nuclear fuels. Studies have been performed to assess the conceptual performance capabilities of a fast-neutron multiplicity counter for assaying plutonium. Comparisons have been made to evaluate the potential improvements and benefits of fast-neutron multiplicity analyses versus traditional thermal-neutron counting systems. Fast-neutron instrumentation, using for example an array of liquid scintillators such as EJ-309, have the potential to either a) significantly reduce assay measurement times versus traditional approaches, for comparable measurement precision values, b) significantly improve assay precision values, for measurement durations comparable to current-generation technology, or c) moderating improve both measurement precision and measurement durations versus current-generation technology. Using the MCNPX-PoliMi Monte Carlo simulation code, studies have been performed to assess the doubles-detection efficiency for a variety of counter layouts of cylindrical liquid scintillator detector cells over one, two, and three rows. Ignoring other considerations, the best detector design is the one with the most detecting volume. However, operational limitations guide a) the maximum acceptable size of each detector cell (due to PSD performance and maximum-acceptable per-channel data throughput rates, limited by pulse pile-up and the processing rate of the electronics components of the system) and b) the affordability of a system due to the number of total channels of data to be collected and processed. As a first estimate, it appears that a system comprised of two rows of detectors 5" ? 3" would yield a working prototype system with excellent performance capabilities for assaying Pu-containing items and capable of handling high signal rates likely when measuring items with Pu and other actinides. However, it is still likely that gamma-ray shielding will be needed to reduce the total signal rate in the detectors. As a first step prior to working with these larger-sized detectors, it may be practical to perform scoping studies using small detectors, such as already-on-hand 3" ? 3" detectors.

D. L. Chichester; S. A. Pozzi; J. L. Dolan; M. T. Kinlaw; A. C. Kaplan; M. Flaska; A. Enqvist; J. T. Johnsom; S. M. Watson

2012-10-01T23:59:59.000Z

335

Multiple channel optical data acquisition system  

DOE Patents (OSTI)

A multiple channel optical data acquisition system is provided in which a plurality of remote sensors monitoring specific process variable are interrogated by means of a single optical fiber connecting the remote station/sensors to a base station. The remote station/sensors derive all power from light transmitted through the fiber from the base station. Each station/sensor is individually accessed by means of a light modulated address code sent over the fiber. The remote station/sensors use a single light emitting diode to both send and receive light signals to communicate with the base station and provide power for the remote station. The system described can power at least 100 remote station/sensors over an optical fiber one mile in length.

Fasching, G.E.; Goff, D.R.

1985-02-22T23:59:59.000Z

336

Multiple microprocessor based nuclear reactor power monitor  

SciTech Connect

The reactor power monitor is a portable multiple-microprocessor controlled data acquisition device being built for the International Atomic Energy Association. Its function is to measure and record the hourly integrated operating thermal power level of a nuclear reactor for the purpose of detecting unannounced plutonium production. The monitor consists of a /sup 3/He proportional neutron detector, a write-only cassette tape drive and control electronics based on two INTEL 8748 microprocessors. The reactor power monitor operates from house power supplied by the plant operator, but has eight hours of battery backup to cover power interruptions. Both the hourly power levels and any line power interruptions are recorded on tape and in memory. Intermediate dumps from the memory to a data terminal or strip chart recorder can be performed without interrupting data collection.

Lewis, P.S.; Ethridge, C.D.

1979-01-01T23:59:59.000Z

337

Surface Microstructure Extraction from Multiple Aerial Images  

E-Print Network (OSTI)

In this paper we present a system that recovers building facet images from multiple source images and, as a first step towards detailed analysis of microstructures, extracts windows from walls. The system employs a sophisticated multi-image texture mapping technique to eliminate the corrupting effects of shadows and occlusions and to find a "best piece representation" of each facet. The system is model-driven, providing a context-based environment for microstructure analysis. The window extraction module focuses attention on wall facets, attempting to extract the 2-D window patterns attached to the walls using an oriented region growing technique. High-level knowledge is incorporated to simplify the computation of symbolic window extraction. The algorithms are typically useful in urban sites. Experiments show successful applications of this approach to site model refinement. Keywords: microstructure extraction, model refinement, texture mapping, aerial imagery, image understanding 1 I...

Xiaoguang Wang; Robert T. Collins; Jeff Dehart

1997-01-01T23:59:59.000Z

338

Early expansion in exploding multiple wire arrays  

Science Conference Proceedings (OSTI)

A simple model is developed for the initial stage (blow-off and the onset of pinching) of a multiple exploded wire array. With obvious modifications the model can also be applied to single wires or other self-pinched plasma columns. Each wire in the array is modeled as a plasma cylinder undergoing self-similar radial motion, and the whole array is coupled self-consistently to an external circuit. The plasma expands initially; the onset of self-pinch is shown to be coincident with the plasma conductivity reaching a value large enough for skin effect to occur. The model is run for a variety of system parameters, and the choice of machine and wire parameters to attain particular objectives (e.g., rapid current rise, limited wire expansion, etc.) is discussed.

Bloomberg, H.W.; Lampe, M.; Colombant, D.G.

1980-10-01T23:59:59.000Z

339

Time-resolved multiple probe spectroscopy  

SciTech Connect

Time-resolved multiple probe spectroscopy combines optical, electronic, and data acquisition capabilities to enable measurement of picosecond to millisecond time-resolved spectra within a single experiment, using a single activation pulse. This technology enables a wide range of dynamic processes to be studied on a single laser and sample system. The technique includes a 1 kHz pump, 10 kHz probe flash photolysis-like mode of acquisition (pump-probe-probe-probe, etc.), increasing the amount of information from each experiment. We demonstrate the capability of the instrument by measuring the photolysis of tungsten hexacarbonyl (W(CO){sub 6}) monitored by IR absorption spectroscopy, following picosecond vibrational cooling of product formation through to slower bimolecular diffusion reactions on the microsecond time scale.

Greetham, G. M.; Sole, D.; Clark, I. P.; Parker, A. W.; Pollard, M. R.; Towrie, M. [Central Laser Facility, Science and Technology Facilities Council, Research Complex at Harwell, Rutherford Appleton Laboratory, Harwell, Oxfordshire, OX11 0QX (United Kingdom)

2012-10-15T23:59:59.000Z

340

The multiple vortex nature of tropical cyclogenesis  

E-Print Network (OSTI)

This thesis contains an observational analysis of the genesis of Tropical Storm Allison (2001). Using a paradigm of tropical cyclone formation as the superposition of potential vorticity (PV) anomalies, the importance of different scales of PV merger to various aspects of Allison?s formation is discussed. While only the case of Allison is discussed in great detail, other studies have also documented PV superposition on various scales, and superposition could be important for most tropical cyclones. Preceding Allison?s genesis, PV superposition on the large scale destabilized the atmosphere and increased low-level cyclonic vorticity. This presented a more favorable environment for the formation of MCV-type PV anomalies and smaller, surface-based, meso-?-scale vortices. Although these vortices eventually merged to form a more concentrated vortex with stronger surface pressure gradients, the merger happened well after landfall of Allison and no strengthening ensued. The unstable, vorticity-rich environment was also favorable for the development of even smaller, meso-?-scale vortices that accompanied deep convective cells within one of Allison?s meso-?-scale vortices. The observations herein suggest that the meso-?- scale convective cells and vortices are the respective source of PV production and building blocks for the meso-?-scale vortices. Finally, this thesis discusses issues related to the multiple vortex nature of tropical cyclone formation. For instance, the tracking of developing tropical cyclones is greatly complicated by the presence of multiple vortices. For these cases, the paradigm of a single cyclone center is inappropriate and alternative tracking methods are introduced.

Sippel, Jason Allen

2004-12-01T23:59:59.000Z

Note: This page contains sample records for the topic "quicktime multiple flaws" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Synchronous Squamous Cell Carcinoma in Multiple Digits  

E-Print Network (OSTI)

Cancers of the perionychium are relatively rare occurrences and are often related to chronic inflammation associated with trauma, infection, exposure to ultraviolet radiation, or other carcinogens. Squamous cell carcinoma is the most common tumor reported of the nail bed. Synchronous squamous cell carcinomas of the perionychium have been rarely reported. We present a case of a 46-year-old woman with synchronous squamous cell carcinomas involving both hands and multiple digits. Treatment modalities include chemotherapeutics, Mohs surgery, and amputation. Early diagnosis of squamous cell carcinoma of the nail bed provides the greatest chance to preserve maximal function of the hand. Onychomycosis may be the presenting symptom of a patient with squamous cell carcinoma and may also be a predisposing factor in patients with occupational risk factors. Suspicion of this disease process can help the clinician establish the diagnosis via biopsy and provide optimal care for these patients. Cancers of the perionychium are relatively rare occurrences and are often related to chronic inflammation associated with trauma, infection, exposure to ultraviolet radiation, or other carcinogens. Squamous cell carcinoma is the most common tumor reported of the nail bed. Synchronous squamous cell carcinomas of the perionychium have been rarely reported. We present a case of a 46-year-old woman with synchronous squamous cell carcinomas involving both hands and multiple digits. CASE REPORT A 46-year-old white female was referred from the dermatology clinic with a biopsy-proven squamous cell carcinoma of the left ring finger perionychium. Physical examination demonstrated erythematous scaly lesions with the absence of a nail plate at the left thumb, index Authors have no financial disclaimers or conflicts to disclose. 70 ABNER ET AT finger, and ring finger as well as the right long finger, without associated lymphadenopathy (Fig 1). She described chronic onychomycosis of the nails attributed to her job as a dishwasher.

Morton L. Kasdan; Bradon J. Wilhelmi; Mda A B

2011-01-01T23:59:59.000Z

342

V-121: Google Chrome Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Google Chrome Multiple Vulnerabilities 1: Google Chrome Multiple Vulnerabilities V-121: Google Chrome Multiple Vulnerabilities March 28, 2013 - 12:29am Addthis PROBLEM: Google Chrome Multiple Vulnerabilities PLATFORM: versions prior to 26.0.1410.43. ABSTRACT: Multiple vulnerabilities have been reported in Google Chrome REFERENCE LINKS: Secunia Advisory SA52761 CVE-2013-0916 CVE-2013-0917 CVE-2013-0918 CVE-2013-0919 CVE-2013-0920 CVE-2013-0921 CVE-2013-0922 CVE-2013-0923 CVE-2013-0924 CVE-2013-0925 CVE-2013-0926 IMPACT ASSESSMENT: High DISCUSSION: Multiple vulnerabilities have been reported in Google Chrome, where one has an unknown impact and others can be exploited by malicious people to bypass certain security restrictions and compromise a user's system. IMPACT: 1) A use-after-free error exists in Web Audio.

343

V-105: Google Chrome Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Google Chrome Multiple Vulnerabilities 5: Google Chrome Multiple Vulnerabilities V-105: Google Chrome Multiple Vulnerabilities March 6, 2013 - 12:09am Addthis PROBLEM: Google Chrome Multiple Vulnerabilities PLATFORM: Google Chrome prior to 25.0.1364.152. ABSTRACT: Multiple vulnerabilities have been reported in Google Chrome REFERENCE LINKS: Stable Channel Update Secunia Advisory SA52454 CVE-2013-0902 CVE-2013-0903 CVE-2013-0904 CVE-2013-0905 CVE-2013-0906 CVE-2013-0907 CVE-2013-0908 CVE-2013-0909 CVE-2013-0910 CVE-2013-0911 IMPACT ASSESSMENT: High DISCUSSION: Multiple vulnerabilities in Google Chrome may have an unknown impact and others can be exploited by malicious people to compromise a user's system. 1) A use-after-free error exists in frame loader. 2) A use-after-free error exists in browser navigation handling.

344

V-050: IBM InfoSphere Information Server Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: IBM InfoSphere Information Server Multiple Vulnerabilities 0: IBM InfoSphere Information Server Multiple Vulnerabilities V-050: IBM InfoSphere Information Server Multiple Vulnerabilities December 19, 2012 - 1:00am Addthis PROBLEM: IBM InfoSphere Information Server Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in versions prior to 9.1. ABSTRACT: Multiple vulnerabilities have been reported in IBM InfoSphere Information Server REFERENCE LINKS: Secunia Advisory SA51605 IBM Support home IBM InfoSphere Information Server, Version 9.1 fix list IMPACT ASSESSMENT: Medium DISCUSSION: Multiple vulnerabilities have been reported in IBM InfoSphere Information Server, where some have an unknown impact and others can be exploited by malicious users to bypass certain security restrictions. 1) An unspecified error exists in the InfoCenter component.

345

V-050: IBM InfoSphere Information Server Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: IBM InfoSphere Information Server Multiple Vulnerabilities 0: IBM InfoSphere Information Server Multiple Vulnerabilities V-050: IBM InfoSphere Information Server Multiple Vulnerabilities December 19, 2012 - 1:00am Addthis PROBLEM: IBM InfoSphere Information Server Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in versions prior to 9.1. ABSTRACT: Multiple vulnerabilities have been reported in IBM InfoSphere Information Server REFERENCE LINKS: Secunia Advisory SA51605 IBM Support home IBM InfoSphere Information Server, Version 9.1 fix list IMPACT ASSESSMENT: Medium DISCUSSION: Multiple vulnerabilities have been reported in IBM InfoSphere Information Server, where some have an unknown impact and others can be exploited by malicious users to bypass certain security restrictions. 1) An unspecified error exists in the InfoCenter component.

346

U-104: Adobe Flash Player Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Adobe Flash Player Multiple Vulnerabilities 4: Adobe Flash Player Multiple Vulnerabilities U-104: Adobe Flash Player Multiple Vulnerabilities February 16, 2012 - 6:30am Addthis PROBLEM: Adobe Flash Player Multiple Vulnerabilities PLATFORM: Adobe Flash Player versions 11.1.102.55 and prior for Windows, Macintosh, Linux, and Solaris Adobe Flash Player versions 11.1.112.61 and prior for Android 4.x Adobe Flash Player versions 11.1.111.5 and prior for Android 3.x and prior ABSTRACT: Multiple vulnerabilities have been reported in Adobe Flash Player, which can be exploited by malicious people to conduct cross-site scripting attacks, bypass certain security restrictions, and compromise a user's system. reference LINKS: Adobe Security Bulletin Secunia Advisory 48033 IMPACT ASSESSMENT: High Discussion: Multiple vulnerabilities have been reported in Adobe Flash Player, which

347

U-249: Google Chrome Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

49: Google Chrome Multiple Vulnerabilities 49: Google Chrome Multiple Vulnerabilities U-249: Google Chrome Multiple Vulnerabilities August 31, 2012 - 6:00am Addthis PROBLEM: Google Chrome Multiple Vulnerabilities PLATFORM: Google Chrome 21.x ABSTRACT: Multiple vulnerabilities have been reported in Google Chrome. reference LINKS: Secunia Advisory SA50447 Stable Channel Update CVE-2012-2865 CVE-2012-2866 CVE-2012-2867 CVE-2012-2868 CVE-2012-2869 CVE-2012-2870 CVE-2012-2871 CVE-2012-2872 IMPACT ASSESSMENT: High Discussion: Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact and others can be exploited by malicious people to conduct cross-site scripting attacks and compromise a user's system. 1) An out-of-bounds read error exists when handling line breaks. 2) A bad cast error exists within run-ins.

348

Organic light emitting device having multiple separate emissive layers  

DOE Patents (OSTI)

An organic light emitting device having multiple separate emissive layers is provided. Each emissive layer may define an exciton formation region, allowing exciton formation to occur across the entire emissive region. By aligning the energy levels of each emissive layer with the adjacent emissive layers, exciton formation in each layer may be improved. Devices incorporating multiple emissive layers with multiple exciton formation regions may exhibit improved performance, including internal quantum efficiencies of up to 100%.

Forrest, Stephen R. (Ann Arbor, MI)

2012-03-27T23:59:59.000Z

349

Multiple Steady States in Azeotropic and Reactive Distillation  

E-Print Network (OSTI)

Introduction . Motivation Overview on the Contributions MSS in Reactive Distillation Conclusions Outline Multiple Steady States (MSS) Overview on the Contributions . The Starting Point . Consolidation . Industrial Applications . Incorporating Reactions MSS in Reactive Distillation Conclusions Outline Multiple Steady States (MSS) Overview on the Contributions MSS in Reactive Distillation . Prediction Method . MTBE Process Conclusions Outline Multiple Steady States (MSS) Overview on the Contributions MSS in Reactive Distillation Conclusions Distillation Overview . Ideal binary / multicomponent distillation . Homogeneous azeotropic distillation -- Heavy entrainer (extractive distillation) -- Intermediate entrainer -- "Boundary scheme" (ligh

Thomas E. Gttinger

1998-01-01T23:59:59.000Z

350

Multiple connection for an undersea cable system  

Science Conference Proceedings (OSTI)

A multiple connection is claimed for connecting a plurality of armored cables to the housing of electrical apparatus in an undersea system having a cable interconnection point where a plurality of cables serving different destinations are brought together. Each of these cables comprise a core surrounded by armor and are terminated by a length of bared core extending beyond a severed end of the armor. The housing has a hollow cable-fixing part through which the bared cable cores pass, characterized in that said connection comprises: a steel binding ring through which the armored portion of each of said cables, is threaded, said ring serving to bind said armored portions of cable together; a steel tube threaded over said bared cores of said cables, having one end abutting against severed end portions of the armor of said cables and having its other end fixed mechanically to said hollow cable-fixing part of the electrical apparatus housing; and auxiliary armor wound around the portions of armored cable bound together by said ring and around the adjacent portion of said steel tube.

Guazzo, L.; Trezeguet, J.P.

1984-05-08T23:59:59.000Z

351

Permeation absorption sampler with multiple detection  

DOE Patents (OSTI)

A system for detecting analytes in air or aqueous systems includes a permeation absorption preconcentrator sampler for the analytes and analyte detectors. The preconcentrator has an inner fluid-permeable container into which a charge of analyte-sorbing liquid is intermittently injected, and a fluid-impermeable outer container. The sample is passed through the outer container and around the inner container for trapping and preconcentrating the analyte in the sorbing liquid. The analyte can be detected photometrically by injecting with the sorbing material a reagent which reacts with the analyte to produce a characteristic color or fluorescence which is detected by illuminating the contents of the inner container with a light source and measured the absorbed or emitted light, or by producing a characteristic chemiluminescence which can be detected by a suitable light sensor. The analyte can also be detected amperometrically. Multiple inner containers may be provided into which a plurality of sorbing liquids are respectively introduced for simultaneously detecting different analytes. baffling may be provided in the outer container. A calibration technique is disclosed. 9 figs.

Zaromb, S.

1989-03-30T23:59:59.000Z

352

Inelastic shadowing effects in multiple scattering  

SciTech Connect

The projectile--nucleon scattering amplitudes used as input into multiple scattering theories of projectile--nucleus scattering naturally include the effects of coupling to inelastic (i.e., production) channels. We employ a multichannel separable potential to describe the projectile--nucleon interaction and show that within the fixed nucleon framework we can obtain the nuclear elastic scattering amplitude. This includes terms outside the conventional formalisms, corresponding to intermediate propagation in the inelastic channels both above and below inelastic threshold. We refer to this as inelastic shadowing. In a two-channel approximation, we show that knowledge of the projectile--nucleon elastic scattering phase shifts plus specification of the inelastic threshold energy are sufficient to determine the off-shell coupled- channel transition matrix, implying that the nuclear amplitude can be calculated within this model without any detailed information about the inelastic channels. We study this solution quantitatively for some model problems and for pion scattering, with the general result that inelastic shadowing can be significant whenever the elementary interaction has important channel coupling. For pion scattering in the energy regime characterized by strongly absorptive resonance, we find, for example, that the effect of inelastic shadowing is much more important than that due to two-nucleon correlations. (AIP)

Londergan, J.T.; Moniz, E.J.

1975-09-19T23:59:59.000Z

353

Multiple capillary biochemical analyzer with barrier member  

DOE Patents (OSTI)

A multiple capillary biochemical analyzer for sequencing DNA and performing other analyses, in which a set of capillaries extends from wells in a microtiter plate into a cuvette. In the cuvette the capillaries are held on fixed closely spaced centers by passing through a sandwich construction having a pair of metal shims which squeeze between them a rubber gasket, forming a leak proof seal for an interior chamber in which the capillary ends are positioned. Sheath fluid enters the chamber and entrains filament sample streams from the capillaries. The filament sample streams, and sheath fluid, flow through aligned holes in a barrier member spaced close to the capillary ends, into a collection chamber having a lower glass window. The filament streams are illuminated above the barrier member by a laser, causing them to fluoresce. The fluorescence is viewed end-on by a CCD camera chip located below the glass window. The arrangement ensures an equal optical path length from all fluorescing spots to the CCD chip and also blocks scattered fluorescence illumination, providing more uniform results and an improved signal to noise ratio.

Dovichi, Norman J. (Edmonton, CA); Zhang, Jian Z. (Edmonton, CA)

1996-01-01T23:59:59.000Z

354

Multiple capillary biochemical analyzer with barrier member  

DOE Patents (OSTI)

A multiple capillary biochemical analyzer is disclosed for sequencing DNA and performing other analyses, in which a set of capillaries extends from wells in a microtiter plate into a cuvette. In the cuvette the capillaries are held on fixed closely spaced centers by passing through a sandwich construction having a pair of metal shims which squeeze between them a rubber gasket, forming a leak proof seal for an interior chamber in which the capillary ends are positioned. Sheath fluid enters the chamber and entrains filament sample streams from the capillaries. The filament sample streams, and sheath fluid, flow through aligned holes in a barrier member spaced close to the capillary ends, into a collection chamber having a lower glass window. The filament streams are illuminated above the barrier member by a laser, causing them to fluoresce. The fluorescence is viewed end-on by a CCD camera chip located below the glass window. The arrangement ensures an equal optical path length from all fluorescing spots to the CCD chip and also blocks scattered fluorescence illumination, providing more uniform results and an improved signal-to-noise ratio. 12 figs.

Dovichi, N.J.; Zhang, J.Z.

1996-10-22T23:59:59.000Z

355

CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure Control  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain GAO is making recommendations to the Department of Homeland Security (DHS) to develop a strategy for coordinating control systems security efforts and to enhance information sharing with relevant stakeholders. DHS officials did not agree or disagree with GAO's recommendations, but stated that they would take them under advisement. CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain More Documents & Publications GAO Challenges and Efforts to Secure Control Systems (March 2004)

356

Analysis of Strategies for Reducing Multiple Emissions from Power ...  

U.S. Energy Information Administration (EIA)

Analysis of Strategies for Reducing Multiple Emissions from Power Plants: ... Over the next decade, power plant operators may face significant requirements ...

357

T-681:IBM Lotus Symphony Multiple Unspecified Vulnerabilities  

Energy.gov (U.S. Department of Energy (DOE))

Multiple unspecified vulnerabilities in IBM Lotus Symphony 3 before FP3 have unknown impact and attack vectors, related to "critical security vulnerability issues."

358

Savannah River maintains safety focus through multiple tasks...  

National Nuclear Security Administration (NNSA)

focus through multiple tasks Posted By Office of Public Affairs The Savannah River Tritium Enterprise took advantage of a recent multi-week outage to safely complete a...

359

Advanced optical sensor for monitoring and control of multiple...  

NLE Websites -- All DOE Office Websites (Extended Search)

Advanced optical sensor for monitoring and control of multiple gas and turbine-blade properties University of Wisconsin - Madison Department of Mechanical Engineering Principal...

360

Is a building with multiple occupancies considered residential...  

NLE Websites -- All DOE Office Websites (Extended Search)

Model Policies Glossary Related Links ACE Learning Series Utility Savings Estimators Is a building with multiple occupancies considered residential or commercial? The IECC...

Note: This page contains sample records for the topic "quicktime multiple flaws" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

HIGH EFFI IEN Y MULTIPLE JUN TION SOLAR ELLS  

multiple-jun tion solar ells te hnology summary te hnology readiness level: 3 ritial funtions and on epts have een proven in a laoratory setting. author:

362

Efficient and robust multiple access control for wireless multimedia services  

Science Conference Proceedings (OSTI)

In this paper, we propose a new multiple access control (MAC) protocol for wireless distributed multimedia systems based on ATM, in which user demands are highly heterogeneous and can be classified as CBR, VBR, and ABR. Our protocol is motivated by two ... Keywords: FDD, TDMA, adaptive protocol, multiple access control, wireless ATM, wireless multimedia

Yu-Kwong Kwok; Vincent K. N. Lau

2000-10-01T23:59:59.000Z

363

Tools for designing and delivering multiple-perspective scenarios  

Science Conference Proceedings (OSTI)

This paper describes two prototype tools developed as part of a design-based investigation into the use of multiple-perspective scenarios. A multiple-perspective scenario is one constructed as many different narratives about the same events, with the ... Keywords: XML, knowledge management, scenarios, training, video-conferencing

Wally Smith; Daghan Acay; Ramon Fano; Gideon Ratner

2006-11-01T23:59:59.000Z

364

PREFAIL: a programmable tool for multiple-failure injection  

Science Conference Proceedings (OSTI)

As hardware failures are no longer rare in the era of cloud computing, cloud software systems must "prevail" against multiple, diverse failures that are likely to occur. Testing software against multiple failures poses the problem of combinatorial explosion ... Keywords: distributed systems, fault injection, testing

Pallavi Joshi; Haryadi S. Gunawi; Koushik Sen

2011-10-01T23:59:59.000Z

365

A debug interface for debugging multiple domain specific aspect languages  

Science Conference Proceedings (OSTI)

Research in the area of multi-DSAL development has been mainly devoted to enabling the interoperability of multiple aspect mechanisms. Less attention has been given to making programming with multiple aspect languages practical. For domain specific aspect ... Keywords: AspectJ, aspect-oriented programming (AOP), aspect-oriented software engineering (AOSE), awesome, cool, debugging, domain specific languages (DSLs), validate

Yoav Apter; David H. Lorenz; Oren Mishali

2012-03-01T23:59:59.000Z

366

Minimum cost multiple multicast network coding with quantized rates  

Science Conference Proceedings (OSTI)

In this paper, we consider multiple multicast sessions with intra-session network coding where rates over all links are integer multiples of a basic rate. Although having quantized rates over communication links is quite common, conventional minimum ... Keywords: Decomposition algorithm, Multicast networks, Network coding

M. A. Raayatpanah; H. Salehi Fathabadi; B. H. Khalaj; S. Khodayifar

2013-04-01T23:59:59.000Z

367

The Energy Harvesting Multiple Access Channel with Energy Storage Losses  

E-Print Network (OSTI)

The Energy Harvesting Multiple Access Channel with Energy Storage Losses Kaya Tutuncuoglu and Aylin considers a Gaussian multiple access channel with two energy harvesting transmitters with lossy energy storage. The power allocation policy maximizing the average weighted sum rate given the energy harvesting

Yener, Aylin

368

Zooming, Multiple Windows, and Visual Working Memory Matthew Plumlee  

E-Print Network (OSTI)

1 Zooming, Multiple Windows, and Visual Working Memory Matthew Plumlee Department of Computer, USA E-mail: colinw@cisunix.unh.edu ABSTRACT Zooming and multiple windows are two techniques designed windows comes in the way they aid visual working memory. The task to which we apply our model

New Hampshire, University of

369

A Group-Theoretic Approach to Fast Matrix Multiplication  

Science Conference Proceedings (OSTI)

We develop a new, group-theoretic approach to bounding the exponent of matrix multiplication. There are two components to this approach: (1) identifying groups G that admit a certain type of embedding of matrix multiplication into the group algebra \\mathbb{C}[G] ...

Henry Cohn; Christopher Umans

2003-10-01T23:59:59.000Z

370

Energy Consumption in Downlink MIMO Relay Systems with Multiple Users  

Science Conference Proceedings (OSTI)

This paper focuses on the energy consumption problem in the downlink MIMO relay systems with multiple users. Power consumption under the target sum capacity is used as the energy efficient performance metric. Three transmission schemes, i.e. regenerate ... Keywords: Energy Consumption, MIMO, Relay, Multiple Users

Jie Xu; Ling Qiu

2010-12-01T23:59:59.000Z

371

V-081: Wireshark Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Wireshark Multiple Vulnerabilities 1: Wireshark Multiple Vulnerabilities V-081: Wireshark Multiple Vulnerabilities January 31, 2013 - 12:21am Addthis PROBLEM: Wireshark Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in versions prior to 1.8.5 and 1.6.13. ABSTRACT: Multiple vulnerabilities have been reported in Wireshark REFERENCE LINKS: Wireshark 1.8.5 Release Notes Secunia Advisory SA51968 IMPACT ASSESSMENT: High DISCUSSION: 1) Errors in the Bluetooth HCI, CSN.1, DCP-ETSI DOCSIS CM-STAUS, IEEE 802.3 Slow Protocols, MPLS, R3, RTPS, SDP, and SIP dissectors can be exploited to trigger infinite loops and consume CPU resources via specially crafted packets. 2) An error in the CLNP dissector when processing certain packets can be exploited to cause a crash via a specially crafted packet.

372

V-118: IBM Lotus Domino Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: IBM Lotus Domino Multiple Vulnerabilities 8: IBM Lotus Domino Multiple Vulnerabilities V-118: IBM Lotus Domino Multiple Vulnerabilities March 25, 2013 - 12:40am Addthis PROBLEM: IBM Lotus Domino Multiple Vulnerabilities PLATFORM: IBM Domino 8.x ABSTRACT: Multiple vulnerabilities have been reported in IBM Lotus Domino REFERENCE LINKS: IBM Reference #:1627597 Secunia Advisory SA52753 CVE-2012-6277 CVE-2013-0486 CVE-2013-0487 IMPACT ASSESSMENT: High DISCUSSION: 1) An unspecified error can be exploited to disclose time-limited authentication credentials via the Domino Java Console and subsequently gain otherwise restricted access. Successful exploitation may require certain knowledge of Domino server configuration. 2) An unspecified error in the HTTP server component can be exploited to cause a memory leak and subsequently crash the server.

373

V-097: Google Chrome Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Google Chrome Multiple Vulnerabilities 7: Google Chrome Multiple Vulnerabilities V-097: Google Chrome Multiple Vulnerabilities February 22, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Google Chrome PLATFORM: The vulnerabilities are reported in versions prior to Google Chrome 24.x ABSTRACT: Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact and others can be exploited by malicious people to bypass certain security restrictions and compromise a user's system. REFERENCE LINKS: Secunia Advisory SA52320 Chrome Stable Channel Update CVE-2013-0879 CVE-2013-0880 CVE-2013-0881 CVE-2013-0882 CVE-2013-0883 CVE-2013-0884 CVE-2013-0885 CVE-2013-0886 CVE-2013-0887 CVE-2013-0888 CVE-2013-0889 CVE-2013-0890 CVE-2013-0891 CVE-2013-0892 CVE-2013-0893

374

V-081: Wireshark Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Wireshark Multiple Vulnerabilities 1: Wireshark Multiple Vulnerabilities V-081: Wireshark Multiple Vulnerabilities January 31, 2013 - 12:21am Addthis PROBLEM: Wireshark Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in versions prior to 1.8.5 and 1.6.13. ABSTRACT: Multiple vulnerabilities have been reported in Wireshark REFERENCE LINKS: Wireshark 1.8.5 Release Notes Secunia Advisory SA51968 IMPACT ASSESSMENT: High DISCUSSION: 1) Errors in the Bluetooth HCI, CSN.1, DCP-ETSI DOCSIS CM-STAUS, IEEE 802.3 Slow Protocols, MPLS, R3, RTPS, SDP, and SIP dissectors can be exploited to trigger infinite loops and consume CPU resources via specially crafted packets. 2) An error in the CLNP dissector when processing certain packets can be exploited to cause a crash via a specially crafted packet.

375

V-090: Adobe Flash Player / AIR Multiple Vulnerabilities | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Adobe Flash Player / AIR Multiple Vulnerabilities 0: Adobe Flash Player / AIR Multiple Vulnerabilities V-090: Adobe Flash Player / AIR Multiple Vulnerabilities February 13, 2013 - 12:14am Addthis PROBLEM: Adobe Flash Player / AIR Multiple Vulnerabilities PLATFORM: Adobe Flash Player versions 11.5.502.149 and prior for Windows and Macintosh Adobe Flash Player versions 11.2.202.262 and prior for Linux Adobe Flash Player versions 11.1.115.37 and prior for Android 4.x Adobe Flash Player versions 11.1.111.32 and prior for Android 3.x and 2.x Adobe AIR versions 3.5.0.1060 and prior Adobe AIR versions 3.5.0.1060 SDK and prior ABSTRACT: Multiple vulnerabilities have been reported in Adobe Flash Player and AIR. REFERENCE LINKS: Vulnerability identifier: APSB13-05 Secunia Advisory SA52166 CVE-2013-0637 CVE-2013-0638 CVE-2013-0639

376

V-059: MoinMoin Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: MoinMoin Multiple Vulnerabilities 9: MoinMoin Multiple Vulnerabilities V-059: MoinMoin Multiple Vulnerabilities January 1, 2013 - 5:57am Addthis PROBLEM: MoinMoin Multiple Vulnerabilities PLATFORM: Version(s): MoinMoin 1.x ABSTRACT: Multiple vulnerabilities have been reported in MoinMoin, which can be exploited by malicious users to conduct script insertion attacks and compromise a vulnerable system and by malicious people to manipulate certain data. REFERENCE LINKS: Secunia Advisory SA51663 CVE-2012-6080 CVE-2012-6081 CVE-2012-6082 IMPACT ASSESSMENT: High DISCUSSION: 1) Certain input when handling the AttachFile action is not properly verified before being used to write files. This can be exploited to overwrite arbitrary files via directory traversal sequences. 2) The application allows the upload of files with arbitrary extensions to

377

U-100: Google Chrome Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Google Chrome Multiple Vulnerabilities 0: Google Chrome Multiple Vulnerabilities U-100: Google Chrome Multiple Vulnerabilities February 10, 2012 - 7:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact and others can be exploited by malicious people to bypass certain security restrictions, manipulate certain data, and compromise a user's system. PLATFORM: Google Chrome 16.x ABSTRACT: A remote user can create a specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. Reference LINKS: Google Announcements and Release Channel Secunia Advisory SA47938 Security Tracker ID 1026654 IMPACT ASSESSMENT: High Discussion: Multiple vulnerabilities have been reported in Google Chrome, where some

378

V-096: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities 6: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities V-096: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities February 21, 2013 - 6:00am Addthis PROBLEM: A weakness and multiple vulnerabilities have been reported in Mozilla Thunderbird and SeaMonkey PLATFORM: The vulnerabilities are reported in Thunderbird versions prior to 17.0.3 and SeaMonkey versions prior to 2.16. ABSTRACT: A weakness and multiple vulnerabilities have been reported in Mozilla Thunderbird and SeaMonkey, which can be exploited by malicious people to disclose potentially sensitive information, conduct spoofing attacks, bypass certain security restrictions, and compromise a user's system. REFERENCE LINKS: Secunia Advisory SA52280 Mozilla Security Advisory 2013-21 CVE-2013-0765 CVE-2013-0772

379

V-132: IBM Tivoli System Automation Application Manager Multiple  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: IBM Tivoli System Automation Application Manager Multiple 2: IBM Tivoli System Automation Application Manager Multiple Vulnerabilities V-132: IBM Tivoli System Automation Application Manager Multiple Vulnerabilities April 12, 2013 - 6:00am Addthis PROBLEM: IBM has acknowledged multiple vulnerabilities in IBM Tivoli System Automation Application Manager PLATFORM: The vulnerabilities are reported in IBM Tivoli System Automation Application Manager versions 3.1, 3.2, 3.2.1, and 3.2.2 ABSTRACT: Multiple security vulnerabilities exist in the IBM Java Runtime Environment component of IBM Tivoli System Automation Application Manager which may affect the product REFERENCE LINKS: Secunia Advisory: SA53006 IBM Security Bulletin 21633991 IBM Security Bulletin 21633992 CVE-2011-3563 CVE-2012-0497 CVE-2012-0498 CVE-2012-0499 CVE-2012-0501

380

U-066: Mozilla Firefox / Thunderbird Multiple Vulnerabilities | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Mozilla Firefox / Thunderbird Multiple Vulnerabilities 6: Mozilla Firefox / Thunderbird Multiple Vulnerabilities U-066: Mozilla Firefox / Thunderbird Multiple Vulnerabilities December 22, 2011 - 6:30am Addthis PROBLEM: Mozilla Firefox / Thunderbird Multiple Vulnerabilities . PLATFORM: Mozilla Firefox 8.x and Mozilla Thunderbird 8.x ABSTRACT: Multiple vulnerabilities have been reported in Mozilla Firefox and Thunderbird. reference LINKS: Advisory 2011-53 Advisory 2011-54 Advisory 2011-55 Advisory 2011-56 Advisory 2011-57 Advisory 2011-58 Secunia Advisory: SA47302 IMPACT ASSESSMENT: High Discussion: Vulnerabilities have been reported in Mozilla Firefox and Thunderbird, where one has an unknown impact and others can be exploited by malicious people to disclose sensitive information and compromise a user's system. 1) Some unspecified errors can be exploited to corrupt memory. No further

Note: This page contains sample records for the topic "quicktime multiple flaws" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

V-126: Mozilla Firefox Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Mozilla Firefox Multiple Vulnerabilities 6: Mozilla Firefox Multiple Vulnerabilities V-126: Mozilla Firefox Multiple Vulnerabilities April 4, 2013 - 6:00am Addthis PROBLEM: Mozilla Firefox Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in versions prior to 20.0 ABSTRACT: Multiple vulnerabilities have been reported in Mozilla Firefox, which can be exploited by malicious, local users to gain escalated privileges and by malicious people to conduct spoofing and cross-site scripting attacks and compromise a user's system. REFERENCE LINKS: Secunia Advisory SA52770 Secunia Advisory SA52293 Mozilla Security Announcement mfsa2013-30 Mozilla Security Announcement mfsa2013-31 Mozilla Security Announcement mfsa2013-32 Mozilla Security Announcement mfsa2013-34 Mozilla Security Announcement mfsa2013-35

382

V-224: Google Chrome Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Google Chrome Multiple Vulnerabilities 4: Google Chrome Multiple Vulnerabilities V-224: Google Chrome Multiple Vulnerabilities August 22, 2013 - 1:05am Addthis PROBLEM: Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact and others can be exploited by malicious, local users to disclose potentially sensitive information and by malicious people to compromise a user's system. PLATFORM: Google Chrome 28.x ABSTRACT: The vulnerabilities are reported in versions prior to 29.0.1547.57 REFERENCE LINKS: Secunia Advisory ID: 1028921 CVE-2013-2887 CVE-2013-2900 CVE-2013-2901 CVE-2013-2902 CVE-2013-2903 CVE-2013-2904 CVE-2013-2905 IMPACT ASSESSMENT: High DISCUSSION: Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact and others can be exploited by malicious, local users to disclose

383

V-096: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities 6: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities V-096: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities February 21, 2013 - 6:00am Addthis PROBLEM: A weakness and multiple vulnerabilities have been reported in Mozilla Thunderbird and SeaMonkey PLATFORM: The vulnerabilities are reported in Thunderbird versions prior to 17.0.3 and SeaMonkey versions prior to 2.16. ABSTRACT: A weakness and multiple vulnerabilities have been reported in Mozilla Thunderbird and SeaMonkey, which can be exploited by malicious people to disclose potentially sensitive information, conduct spoofing attacks, bypass certain security restrictions, and compromise a user's system. REFERENCE LINKS: Secunia Advisory SA52280 Mozilla Security Advisory 2013-21 CVE-2013-0765 CVE-2013-0772

384

V-132: IBM Tivoli System Automation Application Manager Multiple  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: IBM Tivoli System Automation Application Manager Multiple 2: IBM Tivoli System Automation Application Manager Multiple Vulnerabilities V-132: IBM Tivoli System Automation Application Manager Multiple Vulnerabilities April 12, 2013 - 6:00am Addthis PROBLEM: IBM has acknowledged multiple vulnerabilities in IBM Tivoli System Automation Application Manager PLATFORM: The vulnerabilities are reported in IBM Tivoli System Automation Application Manager versions 3.1, 3.2, 3.2.1, and 3.2.2 ABSTRACT: Multiple security vulnerabilities exist in the IBM Java Runtime Environment component of IBM Tivoli System Automation Application Manager which may affect the product REFERENCE LINKS: Secunia Advisory: SA53006 IBM Security Bulletin 21633991 IBM Security Bulletin 21633992 CVE-2011-3563 CVE-2012-0497 CVE-2012-0498 CVE-2012-0499 CVE-2012-0501

385

U-162: Drupal Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

162: Drupal Multiple Vulnerabilities 162: Drupal Multiple Vulnerabilities U-162: Drupal Multiple Vulnerabilities May 4, 2012 - 7:00am Addthis PROBLEM: Drupal Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in 7.x versions prior to 7.13. ABSTRACT: Several vulnerabilities were reported in Drupal: Denial of Service, Access bypass, and Unvalidated form redirect reference LINKS: Security Advisory: DRUPAL-SA-CORE-2012-002 Bugtraq ID: 53359 Secunia Advisory SA49012 CVE-2012-1588 CVE-2012-1589 CVE-2012-1590 CVE-2012-1591 CVE-2012-2153 MPACT ASSESSMENT: High Discussion: A weakness, a security issue, and multiple vulnerabilities have been reported in Drupal, which can be exploited by malicious users to disclose sensitive information, bypass certain security restrictions, and cause a DoS (Denial of Service).

386

T-542: SAP Crystal Reports Server Multiple Vulnerabilities | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: SAP Crystal Reports Server Multiple Vulnerabilities 2: SAP Crystal Reports Server Multiple Vulnerabilities T-542: SAP Crystal Reports Server Multiple Vulnerabilities January 25, 2011 - 2:30pm Addthis PROBLEM: SAP Crystal Reports Server Multiple Vulnerabilities. PLATFORM: Crystal Reports Server 2008 ABSTRACT: Multiple vulnerabilities in SAP Crystal Reports Server 2008, which can be exploited by malicious users to disclose potentially sensitive information and by malicious people to conduct cross-site scripting attacks, manipulate certain data, and compromise a user's system. reference LINKS: Secunia Advisory SA43060 Vulnerability Report: Crystal Reports Server 2008 IMPACT ASSESSMENT: High Discussion: 1) Input passed to the "actId" parameter in InfoViewApp/jsp/common/actionNav.jsp, "backUrl" parameter in

387

V-092: Pidgin Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Pidgin Multiple Vulnerabilities 2: Pidgin Multiple Vulnerabilities V-092: Pidgin Multiple Vulnerabilities February 15, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Pidgin PLATFORM: Vulnerabilities are reported in version 2.10.6. Prior versions may also be affected. ABSTRACT: Multiple vulnerabilities have been reported in Pidgin, which can be exploited by malicious people to manipulate certain data, cause a DoS (Denial of Service), and compromise a user's system. REFERENCE LINKS: Secunia Advisory SA52178 Pidgin CVE-2013-0271 CVE-2013-0272 CVE-2013-0273 CVE-2013-0274 IMPACT ASSESSMENT: High DISCUSSION: 1) An error within the MXit protocol plugin when saving images can be exploited to overwrite certain files. 2) A boundary error within the "mxit_cb_http_read()" function

388

V-180: IBM Application Manager For Smart Business Multiple Vulnerabilities  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

V-180: IBM Application Manager For Smart Business Multiple V-180: IBM Application Manager For Smart Business Multiple Vulnerabilities V-180: IBM Application Manager For Smart Business Multiple Vulnerabilities June 18, 2013 - 12:38am Addthis PROBLEM: IBM Application Manager For Smart Business Multiple Vulnerabilities PLATFORM: IBM Application Manager For Smart Business 1.x ABSTRACT: A security issue and multiple vulnerabilities have been reported in IBM Application Manager For Smart Business REFERENCE LINKS: Security Bulletin 1640752 Secunia Advisory SA53844 CVE-2012-1531 CVE-2012-1532 CVE-2012-1533 CVE-2012-2190 CVE-2012-2191 CVE-2012-2203 CVE-2012-3143 CVE-2012-3159 CVE-2012-3216 CVE-2012-4820 CVE-2012-4821 CVE-2012-4822 CVE-2012-4823 CVE-2012-5068 CVE-2012-5069 CVE-2012-5071 CVE-2012-5072 CVE-2012-5073 CVE-2012-5075 CVE-2012-5079

389

V-214: Mozilla Firefox Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Mozilla Firefox Multiple Vulnerabilities 4: Mozilla Firefox Multiple Vulnerabilities V-214: Mozilla Firefox Multiple Vulnerabilities August 8, 2013 - 2:16am Addthis PROBLEM: Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 23.0 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors. PLATFORM: Mozilla Firefox 22.x ABSTRACT: The vulnerabilities are reported in versions prior to 23.0. REFERENCE LINKS: Secunia Advisory SA54418 CVE-2013-1701 CVE-2013-1702 CVE-2013-1704 CVE-2013-1705 CVE-2013-1706 CVE-2013-1707 CVE-2013-1709 CVE-2013-1710 CVE-2013-1711 CVE-2013-1713 CVE-2013-1714 CVE-2013-1717 IMPACT ASSESSMENT: High DISCUSSION: Multiple vulnerabilities have been reported in Mozilla Firefox, which can

390

T-542: SAP Crystal Reports Server Multiple Vulnerabilities | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: SAP Crystal Reports Server Multiple Vulnerabilities 2: SAP Crystal Reports Server Multiple Vulnerabilities T-542: SAP Crystal Reports Server Multiple Vulnerabilities January 25, 2011 - 2:30pm Addthis PROBLEM: SAP Crystal Reports Server Multiple Vulnerabilities. PLATFORM: Crystal Reports Server 2008 ABSTRACT: Multiple vulnerabilities in SAP Crystal Reports Server 2008, which can be exploited by malicious users to disclose potentially sensitive information and by malicious people to conduct cross-site scripting attacks, manipulate certain data, and compromise a user's system. reference LINKS: Secunia Advisory SA43060 Vulnerability Report: Crystal Reports Server 2008 IMPACT ASSESSMENT: High Discussion: 1) Input passed to the "actId" parameter in InfoViewApp/jsp/common/actionNav.jsp, "backUrl" parameter in

391

V-059: MoinMoin Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: MoinMoin Multiple Vulnerabilities 9: MoinMoin Multiple Vulnerabilities V-059: MoinMoin Multiple Vulnerabilities January 1, 2013 - 5:57am Addthis PROBLEM: MoinMoin Multiple Vulnerabilities PLATFORM: Version(s): MoinMoin 1.x ABSTRACT: Multiple vulnerabilities have been reported in MoinMoin, which can be exploited by malicious users to conduct script insertion attacks and compromise a vulnerable system and by malicious people to manipulate certain data. REFERENCE LINKS: Secunia Advisory SA51663 CVE-2012-6080 CVE-2012-6081 CVE-2012-6082 IMPACT ASSESSMENT: High DISCUSSION: 1) Certain input when handling the AttachFile action is not properly verified before being used to write files. This can be exploited to overwrite arbitrary files via directory traversal sequences. 2) The application allows the upload of files with arbitrary extensions to

392

V-119: IBM Security AppScan Enterprise Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: IBM Security AppScan Enterprise Multiple Vulnerabilities 9: IBM Security AppScan Enterprise Multiple Vulnerabilities V-119: IBM Security AppScan Enterprise Multiple Vulnerabilities March 26, 2013 - 12:56am Addthis PROBLEM: IBM Security AppScan Enterprise Multiple Vulnerabilities PLATFORM: IBM Rational AppScan 5.x IBM Rational AppScan 8.x ABSTRACT: IBM has acknowledged multiple vulnerabilities REFERENCE LINKS: IBM Reference #:1626264 Secunia Advisory SA52764 CVE-2008-4033 CVE-2012-4431 CVE-2012-5081 CVE-2013-0473 CVE-2013-0474 CVE-2013-0510 CVE-2013-0511 CVE-2013-0512 CVE-2013-0513 CVE-2013-0532 IMPACT ASSESSMENT: Medium DISCUSSION: 1) The application allows users to perform certain actions via HTTP requests without performing proper validity checks to verify the requests. This can be exploited to e.g. cause a DoS when a logged-in user visits a

393

V-111: Multiple vulnerabilities have been reported in Puppet | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Multiple vulnerabilities have been reported in Puppet 1: Multiple vulnerabilities have been reported in Puppet V-111: Multiple vulnerabilities have been reported in Puppet March 14, 2013 - 12:12am Addthis PROBLEM: Multiple vulnerabilities have been reported in Puppet PLATFORM: Puppet 2.x Puppet 3.x Puppet Enterprise 1.x Puppet Enterprise 2.x ABSTRACT: Puppet Multiple Vulnerabilities REFERENCE LINKS: Puppet Blog Secunia Advisory SA52596 CVE-2013-1640 CVE-2013-1652 CVE-2013-1653 CVE-2013-1654 CVE-2013-1655 CVE-2013-2274 CVE-2013-2275 IMPACT ASSESSMENT: High DISCUSSION: 1) An unspecified error exists when invoking the "template" or "inline_template" functions while responding to a catalog request and can be exploited to execute arbitrary code via a specially crafted catalog request. 2) An input validation error exists in the application and can be exploited

394

V-092: Pidgin Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Pidgin Multiple Vulnerabilities 2: Pidgin Multiple Vulnerabilities V-092: Pidgin Multiple Vulnerabilities February 15, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Pidgin PLATFORM: Vulnerabilities are reported in version 2.10.6. Prior versions may also be affected. ABSTRACT: Multiple vulnerabilities have been reported in Pidgin, which can be exploited by malicious people to manipulate certain data, cause a DoS (Denial of Service), and compromise a user's system. REFERENCE LINKS: Secunia Advisory SA52178 Pidgin CVE-2013-0271 CVE-2013-0272 CVE-2013-0273 CVE-2013-0274 IMPACT ASSESSMENT: High DISCUSSION: 1) An error within the MXit protocol plugin when saving images can be exploited to overwrite certain files. 2) A boundary error within the "mxit_cb_http_read()" function

395

V-022: Attachmate Reflection Products Java Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Attachmate Reflection Products Java Multiple Vulnerabilities 2: Attachmate Reflection Products Java Multiple Vulnerabilities V-022: Attachmate Reflection Products Java Multiple Vulnerabilities November 13, 2012 - 1:00am Addthis PROBLEM: Attachmate Reflection Products Java Multiple Vulnerabilities PLATFORM: Reflection X 2011 Reflection Suite for X 2011 Reflection for Secure IT Server for Windows Reflection for Secure IT Client and Server for UNIX ABSTRACT: Security issues related to Reflection PKI Services Manager REFERENCE LINKS: PKI Services Manager Technical Note 2560 Secunia Advisory SA51256 CVE-2012-0551 CVE-2012-1711 CVE-2012-1713 CVE-2012-1716 CVE-2012-1717 CVE-2012-1718 CVE-2012-1719 CVE-2012-1720 CVE-2012-1721 CVE-2012-1722 CVE-2012-1723 CVE-2012-1724 CVE-2012-1725 CVE-2012-1726 IMPACT ASSESSMENT: High DISCUSSION: Attachmate has acknowledged multiple vulnerabilities in some Reflection

396

U-013: HP Data Protector Multiple Unspecified Vulnerabilities | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: HP Data Protector Multiple Unspecified Vulnerabilities 3: HP Data Protector Multiple Unspecified Vulnerabilities U-013: HP Data Protector Multiple Unspecified Vulnerabilities October 18, 2011 - 9:00am Addthis PROBLEM: HP Data Protector Multiple Unspecified Vulnerabilities. PLATFORM: HP Data Protector Notebook Extension 6.20; HP Data Protector for Personal Computers 7.0 ABSTRACT: Multiple vulnerabilities were reported in HP Data Protector. A remote user can execute arbitrary code on the target system. reference LINKS: HP Security Document ID: c03054543 SecurityTracker Alert ID: 1026195 Secunia Advisory: SA46468 CVE-2011-3156 CVE-2011-3157 CVE-2011-3158 CVE-2011-3159 CVE-2011-3160 CVE-2011-3161 CVE-2011-3162 IMPACT ASSESSMENT: High Discussion: Potential security vulnerabilities has been identified with HP Data Protector Notebook Extension. These vulnerabilities could be remotely

397

U-162: Drupal Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

62: Drupal Multiple Vulnerabilities 62: Drupal Multiple Vulnerabilities U-162: Drupal Multiple Vulnerabilities May 4, 2012 - 7:00am Addthis PROBLEM: Drupal Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in 7.x versions prior to 7.13. ABSTRACT: Several vulnerabilities were reported in Drupal: Denial of Service, Access bypass, and Unvalidated form redirect reference LINKS: Security Advisory: DRUPAL-SA-CORE-2012-002 Bugtraq ID: 53359 Secunia Advisory SA49012 CVE-2012-1588 CVE-2012-1589 CVE-2012-1590 CVE-2012-1591 CVE-2012-2153 MPACT ASSESSMENT: High Discussion: A weakness, a security issue, and multiple vulnerabilities have been reported in Drupal, which can be exploited by malicious users to disclose sensitive information, bypass certain security restrictions, and cause a DoS (Denial of Service).

398

Reverse Auction Bidding - Multiple Group Study  

E-Print Network (OSTI)

Reverse Auction Bidding is a recently developed auction method. In this form of bidding process, the roles of the bidders and the owner are interchanged in terms of the form of the economic transaction. The owner's objective is to drive the unit rates down and the bidder's objective is to maintain an acceptable profit level. A study into Reverse Auction Bidding commenced at Texas A&M University in 2004 and continues to this time, with this the eighteenth study in the series. This study is the second multi-group study in the research. In this study, a multiple group comparison was made between different numbers of bidders, with Games One, Two and Three having three, four and ten bidders respectively. All participants were faculty and students from the Department of Construction Science. The critical requirement for the participants is that they should have no prior experience using the Reverse Auction Bidding system. The eighteen studies have concentrated on new players, with future studies planned for repeat participants. A number of the recent case studies have shown personality has an impact on the performance of the bidders. However, this work was not controlled for personality, as the research objective was to determine the impact of a different number of bidders in a game. The Keirsey Temperament Sorter test was completed by all participants so that the results could be understood in terms of personality impact on the level of return to each participant. The results showed the number of bidders has a significant impact on the individual returns confirming the earlier work on varying the number of bidders. An increase in the number of bidders was shown to lead to a more competitive economic environment, which given usual economic circumstances lead to a reduction in the number of firms interested in bidding, for the self-evident economic reasons. This work points to the need to investigate a bidding group size of five or six, which is likely to be the self-constrained upper limit in a real economic system. Some interesting observations on the personality types suggest that further work is required in this area.

Zhou, Xun

2012-08-01T23:59:59.000Z

399

Multiple pass and multiple layer friction stir welding and material enhancement processes  

DOE Patents (OSTI)

Processes for friction stir welding, typically for comparatively thick plate materials using multiple passes and multiple layers of a friction stir welding tool. In some embodiments a first portion of a fabrication preform and a second portion of the fabrication preform are placed adjacent to each other to form a joint, and there may be a groove adjacent the joint. The joint is welded and then, where a groove exists, a filler may be disposed in the groove, and the seams between the filler and the first and second portions of the fabrication preform may be friction stir welded. In some embodiments two portions of a fabrication preform are abutted to form a joint, where the joint may, for example, be a lap joint, a bevel joint or a butt joint. In some embodiments a plurality of passes of a friction stir welding tool may be used, with some passes welding from one side of a fabrication preform and other passes welding from the other side of the fabrication preform.

Feng, Zhili (Knoxville, TN); David, Stan A. (Knoxville, TN); Frederick, David Alan (Harriman, TN)

2010-07-27T23:59:59.000Z

400

Distant Observer Tool Quickly Identifies Costly Flaws in CSP...  

NLE Websites -- All DOE Office Websites (Extended Search)

combined to accurately define optical efficiency problems in concentrating solar power (CSP) plants. In a typical 100-megawatt (MW) CSP plant, an optical efficiency gain or loss...

Note: This page contains sample records for the topic "quicktime multiple flaws" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

U-175: Linux Kernel KVM Memory Slot Management Flaw  

Energy.gov (U.S. Department of Energy (DOE))

A vulnerability was reported in the Linux Kernel. A local user on the guest operating system can cause denial of service conditions on the host operating system.

402

V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

or userGrant) can send specially crafted data via the web interface or XMLRPC API to gain additional administrative privileges. IMPACT: A remote authenticated user can...

403

Impedance sensing of flaws in non-homogenous materials  

DOE Patents (OSTI)

An apparatus and method for sensing impedances of materials placed in contact therewith. The invention comprises a plurality of drive electrodes and one or more sense electrodes. Both rotating electric fields and differently shaped electric fields are provided for, as are analysis of structure and composition at different orientations and depths.

Novak, James L. (Albuquerque, NM)

1997-01-01T23:59:59.000Z

404

U-238: HP Service Manager Input Validation Flaw Permits Cross...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9.21, 9.30 ABSTRACT: Cross-site scripting (XSS) vulnerability in HP Service Manager Web Tier 7.11, 9.21, and 9.30, and HP Service Center Web Tier 6.28, allows remote attackers...

405

T-663: Cisco Content Services Gateway ICMP Processing Flaw Lets...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

device. Note: The Cisco Gateway GPRS Support Node (GGSN), the Cisco Mobile Wireless Home Agent (HA), the Cisco Wireless Security Gateway (WSG), the Cisco Broadband Wireless...

406

Analyzing websites for user-visible security design flaws  

Science Conference Proceedings (OSTI)

An increasing number of people rely on secure websites to carry out their daily business. A survey conducted by Pew Internet states 42% of all internet users bank online. Considering the types of secure transactions being conducted, businesses are rigorously ...

Laura Falk; Atul Prakash; Kevin Borders

2008-07-01T23:59:59.000Z

407

IMAGES REVEAL TINY FLAWS IN FILMS FOR SOLAR ...  

Science Conference Proceedings (OSTI)

... over large surfaces. Such films are used in making solar energy panels and large flat-panel displays. The efficiency of the ...

408

Method and apparatus for detecting flaws in conductive material  

Science Conference Proceedings (OSTI)

The present invention uses a magnet in relative motion to a conductive material, and a coil that is stationary with respect to the magnet to measure perturbation or variation in the magnetic field in the presence of an inclusion. The magnet and coil sensor may be on the same side of the conductive material. 18 figs.

Hockey, R.L.; Riechers, D.M.

1998-07-07T23:59:59.000Z

409

T-649: Red Hat Network Satellite Server Request Validation Flaw...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

of Red Hat Network Satellite 5.4.1 are advised to upgrade to these updated spacewalk-java packages, which resolve this issue. For this update to take effect, Red Hat Network...

410

Fatal Flaw Analysis of Utility-Scale Wind Turbine Generators...  

NLE Websites -- All DOE Office Websites (Extended Search)

Agreement IAG-08-0719 and Task No. WFD3.1001. Technical Report NRELTP-7A30-58768 August 2013 NREL is a national laboratory of the U.S. Department of Energy Office of...

411

Method and apparatus for detecting flaws in conductive material  

DOE Patents (OSTI)

The present invention uses a magnet in relative motion to a conductive material, and a coil that is stationary with respect to the magnet to measure perturbation or variation in the magnetic field in the presence of an inclusion. The magnet and coil sensor may be on the same side of the conductive material.

Hockey, Ronald L. (Richland, WA); Riechers, Douglas M. (Richland, WA)

1998-01-01T23:59:59.000Z

412

Multiple prey traits, multiple predators: keys to understanding complex species interactions  

E-Print Network (OSTI)

Species interactions generate both natural selection and ecological community structure. Among the more interesting species interactions are those that create adaptive tradeoffs-where phenotypes conferring improved performance in interactions with one species decrease performance with another. Such tradeoffs create divergent natural selection and favor the evolution of strategies such as phenotypic plasticity. Functional tradeoffs may also provide little "enemy-free space" for a focal species in complex communities, resulting in emergent ecological impacts. Emergent community properties arise when community patterns are not predicted based on additive knowledge of pairwise interactions. These emergent impacts typically result from indirect effects, where interactions between two species depend on intermediary species. In this thesis, I examined constraints on the evolution of phenotypic plasticity and addressed its potential significance in community dynamics. I further reviewed concepts and issues related to linking functional and community studies to elucidate mechanisms underlying community structure. I proposed an integrative approach to the subject, emphasizing four major areas of promise, by combining perspectives of ecology and evolution. Freshwater physid snails induce defensive phenotypes in the presence of specialized molluscivorous sunfish. While predator-induced shells reduce predation from shell-crushing fish, I examined whether non-predatory fish induced unnecessary responses. I raised freshwater snails, Physella virgata, with either molluscivorous or non-molluscivorous sunfish species. Regardless of the predator class with which they were raised, snails exhibited two induced responses: reduced growth, and development of rotund shells. Although induced responses are adaptive in the presence of molluscivorous species, responding unnecessarily to non-molluscivores is maladaptive. Both growth reduction and rotund shells entail substantial costs without compensatory benefits in the absence of predatory fish. A pluralistic approach to studying ecological interactions shaping community dynamics should prove profitable in revealing details of complex interactions. I primarily illustrate these principles with case studies involving predation ecology in the freshwater snail-fish-crayfish model system. The system illustrates how predator impacts on prey are mediated by multiple prey traits, correlations between traits, functional tradeoffs in predator defense, interactions between predators, and interactions with other community members. These case studies demonstrate the importance of a multiple-trait and multiple-environment perspective in functional ecological studies.

Langerhans, Randall Brian

2002-01-01T23:59:59.000Z

413

Delaware River Basin Commission (Multiple States) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Delaware River Basin Commission (Multiple States) Delaware River Basin Commission (Multiple States) Delaware River Basin Commission (Multiple States) < Back Eligibility Utility Commercial Agricultural Investor-Owned Utility State/Provincial Govt Industrial Construction Municipal/Public Utility Local Government Installer/Contractor Rural Electric Cooperative Tribal Government Systems Integrator Savings Category Water Buying & Making Electricity Home Weatherization Program Info Start Date 1961 State Delaware Program Type Environmental Regulations Siting and Permitting Provider Project Review Section The Delaware River Basin Commission (DRBC) is a federal-interstate compact government agency that was formed by concurrent legislation enacted in 1961 by the United States and the four basin states (Pennsylvania, New York, New

414

Midwest Independent System Operator (Multiple States) | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Independent System Operator (Multiple States) Independent System Operator (Multiple States) Midwest Independent System Operator (Multiple States) < Back Eligibility Developer Savings Category Alternative Fuel Vehicles Hydrogen & Fuel Cells Buying & Making Electricity Water Home Weatherization Solar Wind Program Info State Montana Program Type Interconnection Provider Midwest Independent System Operator Midwest Independent Transmission System Operator (MISO) is a Regional Transmission Organization, which administers wholesale electricity markets in all or parts of 11 U.S. states and the Canadian province of Manitoba. MISO administers electricity transmission grids across the Midwest and into Canada, and provides tools, transmission planning strategies, and integration for utilities in those markets.

415

Western Interstate Nuclear Compact State Nuclear Policy (Multiple States) |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Western Interstate Nuclear Compact State Nuclear Policy (Multiple Western Interstate Nuclear Compact State Nuclear Policy (Multiple States) Western Interstate Nuclear Compact State Nuclear Policy (Multiple States) < Back Eligibility Agricultural Commercial Construction Fed. Government Fuel Distributor Industrial Institutional Investor-Owned Utility Local Government Municipal/Public Utility Nonprofit Retail Supplier Rural Electric Cooperative State/Provincial Govt Systems Integrator Transportation Tribal Government Utility Savings Category Alternative Fuel Vehicles Hydrogen & Fuel Cells Buying & Making Electricity Water Home Weatherization Solar Wind Program Info State Arizona Program Type Siting and Permitting Provider Western Interstate Energy Board Legislation authorizes states' entrance into the Western Interstate Nuclear Compact, which aims to undertake the cooperation of participating states in

416

Southern States Energy Compact (Multiple States) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Southern States Energy Compact (Multiple States) Southern States Energy Compact (Multiple States) Southern States Energy Compact (Multiple States) < Back Eligibility Agricultural Commercial Construction Developer Fed. Government Fuel Distributor General Public/Consumer Industrial Installer/Contractor Institutional Investor-Owned Utility Local Government Low-Income Residential Multi-Family Residential Municipal/Public Utility Nonprofit Residential Retail Supplier Rural Electric Cooperative Schools State/Provincial Govt Systems Integrator Transportation Tribal Government Utility Savings Category Alternative Fuel Vehicles Hydrogen & Fuel Cells Buying & Making Electricity Water Home Weatherization Solar Wind Program Info State Alabama Program Type Environmental Regulations Industry Recruitment/Support Provider Southern States Energy Board

417

Stator for a rotating electrical machine having multiple control windings  

DOE Patents (OSTI)

A rotating electric machine is provided which includes multiple independent control windings for compensating for rotor imbalances and for levitating/centering the rotor. The multiple independent control windings are placed at different axial locations along the rotor to oppose forces created by imbalances at different axial locations along the rotor. The multiple control windings can also be used to levitate/center the rotor with a relatively small magnetic field per unit area since the rotor and/or the main power winding provides the bias field.

Shah, Manoj R. (Latham, NY); Lewandowski, Chad R. (Amsterdam, NY)

2001-07-17T23:59:59.000Z

418

Stator for Rotating Electrical Machine Having Multiple Controlwindings  

DOE Patents (OSTI)

A rotating electric machine is provided which includes multiple independent control windings for compensating for rotor imbalances and for levitating/centering the rotor. The multiple independent control windings are placed at different axial locations along the rotor to oppose forces created by imbalances at different axial locations along the rotor. The multiple control windings can also be used to levitate/center the rotor with a relatively small magnetic field per unit area since the rotor and/or the main power winding provides the biasfield.

Shah, Manoj R.; Lewandowski, Chad R.

1999-05-05T23:59:59.000Z

419

Interstate Commission on the Potomac River Basin (Multiple States) |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Interstate Commission on the Potomac River Basin (Multiple States) Interstate Commission on the Potomac River Basin (Multiple States) Interstate Commission on the Potomac River Basin (Multiple States) < Back Eligibility Commercial Construction Industrial Investor-Owned Utility Local Government Municipal/Public Utility Rural Electric Cooperative Systems Integrator Tribal Government Utility Savings Category Water Buying & Making Electricity Home Weatherization Program Info State District of Columbia Program Type Environmental Regulations Siting and Permitting Provider Interstate Commission on the Potomac River Basin The Interstate Commission on the Potomac River Basin's (ICPRB) mission is to enhance, protect, and conserve the water and associated land resources of the Potomac River and its tributaries through regional and interstate

420

Method for improving the steam splits in a multiple steam injection process using multiple steam headers  

SciTech Connect

This patent describes a method for enhancing the uniformity of steam distribution in a multiple steam injection system comprising a steam generator, a primary steam header, at least one secondary steam header, a primary steam line connecting the generator to the primary header, at lease one secondary steam line connecting the primary header to the secondary steam header, and a plurality of tertiary steam lines connecting the secondary steam header to a plurality of stem injection wells. It comprises injecting a surfactant into the primary steam line, mixing the surfactant and steam in the primary steam line sufficiently so that the surfactant and the steam enter the primary steam header as a foam, and mixing the surfactant and steam in the secondary steam lines sufficiently so that the surfactant and the steam enter the secondary steam header as a foam.

Stowe, G.R.

1991-03-19T23:59:59.000Z

Note: This page contains sample records for the topic "quicktime multiple flaws" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

V-131: Adobe Shockwave Player Multiple Vulnerabilities | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Adobe Shockwave Player Multiple Vulnerabilities 1: Adobe Shockwave Player Multiple Vulnerabilities V-131: Adobe Shockwave Player Multiple Vulnerabilities April 11, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Adobe Shockwave Player PLATFORM: The vulnerabilities are reported in versions 12.0.0.112 and prior ABSTRACT: This update addresses vulnerabilities that could allow an attacker to run malicious code on the affected system REFERENCE LINKS: Secunia Advisory: SA52981 Adobe Security Bulletin CVE-2013-1383 CVE-2013-1384 CVE-2013-1385 CVE-2013-1386 IMPACT ASSESSMENT: High DISCUSSION: This update resolves : 1) A buffer overflow vulnerability that could lead to code execution 2) Memory corruption vulnerabilities that could lead to code execution 3) Memory leakage vulnerability that could be exploited to reduce the

422

V-125: Cisco Connected Grid Network Management System Multiple  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Cisco Connected Grid Network Management System Multiple 5: Cisco Connected Grid Network Management System Multiple Vulnerabilities V-125: Cisco Connected Grid Network Management System Multiple Vulnerabilities April 3, 2013 - 1:44am Addthis PROBLEM: Cisco Connected Grid Network Management System Multiple Vulnerabilities PLATFORM: Cisco Connected Grid Network Management System 2.x ABSTRACT: Some vulnerabilities have been reported in Cisco Connected Grid Network Management System. REFERENCE LINKS: Cisco Security Notice CVE-2013-1163 Cisco Security Notice CVE-2013-1171 Secunia Advisory SA52834 SecurityTracker Alert ID: 1028374 SecurityTracker Alert ID: 1028373 CVE-2013-1163 CVE-2013-1171 IMPACT ASSESSMENT: Medium DISCUSSION: 1) Certain input related to the element list component is not properly sanitised before being returned to the user. This can be exploited to

423

V-122: IBM Tivoli Application Dependency Discovery Manager Java Multiple  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: IBM Tivoli Application Dependency Discovery Manager Java 2: IBM Tivoli Application Dependency Discovery Manager Java Multiple Vulnerabilities V-122: IBM Tivoli Application Dependency Discovery Manager Java Multiple Vulnerabilities March 29, 2013 - 6:00am Addthis PROBLEM: IBM has acknowledged multiple vulnerabilities in IBM Tivoli Application Dependency Discovery Manager PLATFORM: The vulnerabilities are reported in version 7.2.0.0 through 7.2.1.3 ABSTRACT: Multiple security vulnerabilities exist in the Java Runtime Environments (JREs) that can affect the security of IBM Tivoli Application Dependency Discovery Manager. REFERENCE LINKS: Secunia Advisory SA52829 IBM Security Bulletin 1631786 CVE-2012-1531 CVE-2012-3143 CVE-2012-3216 CVE-2012-4820 CVE-2012-4822 CVE-2012-5069 CVE-2012-5071 CVE-2012-5073 CVE-2012-5075 CVE-2012-5079

424

V-152: Cisco Unified Customer Voice Portal (CVP) Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Cisco Unified Customer Voice Portal (CVP) Multiple 2: Cisco Unified Customer Voice Portal (CVP) Multiple Vulnerabilities V-152: Cisco Unified Customer Voice Portal (CVP) Multiple Vulnerabilities May 9, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Cisco Unified Customer Voice Portal (CVP) PLATFORM: The vulnerabilities are reported in versions prior to 9.0.1 ES 11 ABSTRACT: Various components of Cisco Unified CVP are affected. These vulnerabilities can be exploited independently; however, more than one vulnerability could be exploited on the same device. REFERENCE LINKS: Secunia Advisory SA53306 Cisco Advisory ID cisco-sa-20130508-cvp Cisco Applied Mitigation Bulletin CVE-2013-1220 CVE-2013-1221 CVE-2013-1222 CVE-2013-1223 CVE-2013-1224 CVE-2013-1225 IMPACT ASSESSMENT: Medium DISCUSSION:

425

U-187: Adobe Flash Player Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Adobe Flash Player Multiple Vulnerabilities 7: Adobe Flash Player Multiple Vulnerabilities U-187: Adobe Flash Player Multiple Vulnerabilities June 11, 2012 - 7:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Adobe Flash Player PLATFORM: Adobe Flash Player 11.2.202.235 and earlier for Windows, Macintosh and Linux Adobe Flash Player 11.1.115.8 and earlier for Android 4.x Adobe Flash Player 11.1.111.9 and earlier for Android 3.x and 2.x Adobe AIR 3.2.0.2070 and earlier for Windows, Macintosh and Android ABSTRACT: Adobe released security updates for Adobe Flash Player 11.2.202.235 and earlier versions for Windows, Macintosh and Linux, Adobe Flash Player 11.1.115.8 and earlier versions for Android 4.x, and Adobe Flash Player 11.1.111.9 and earlier versions for Android 3.x and 2.x. These updates

426

V-125: Cisco Connected Grid Network Management System Multiple  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Cisco Connected Grid Network Management System Multiple 5: Cisco Connected Grid Network Management System Multiple Vulnerabilities V-125: Cisco Connected Grid Network Management System Multiple Vulnerabilities April 3, 2013 - 1:44am Addthis PROBLEM: Cisco Connected Grid Network Management System Multiple Vulnerabilities PLATFORM: Cisco Connected Grid Network Management System 2.x ABSTRACT: Some vulnerabilities have been reported in Cisco Connected Grid Network Management System. REFERENCE LINKS: Cisco Security Notice CVE-2013-1163 Cisco Security Notice CVE-2013-1171 Secunia Advisory SA52834 SecurityTracker Alert ID: 1028374 SecurityTracker Alert ID: 1028373 CVE-2013-1163 CVE-2013-1171 IMPACT ASSESSMENT: Medium DISCUSSION: 1) Certain input related to the element list component is not properly sanitised before being returned to the user. This can be exploited to

427

U-002:Adobe Photoshop Elements Multiple Memory Corruption Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

02:Adobe Photoshop Elements Multiple Memory Corruption 02:Adobe Photoshop Elements Multiple Memory Corruption Vulnerabilities U-002:Adobe Photoshop Elements Multiple Memory Corruption Vulnerabilities October 4, 2011 - 11:00am Addthis PROBLEM: Adobe Photoshop Elements Multiple Memory Corruption Vulnerabilities. PLATFORM: Adobe Photoshop Elements 8.0 and earlier versions for Windows. ABSTRACT: A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system. reference LINKS: Adobe Advisory: APSA11-03 SecurityTracker Alert ID: 1026132 SecurityFocus: CVE-2011-2443 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Adobe Photoshop Elements. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a specially crafted '.grd' or '.abr' file that,

428

U-179: IBM Java 7 Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: IBM Java 7 Multiple Vulnerabilities 9: IBM Java 7 Multiple Vulnerabilities U-179: IBM Java 7 Multiple Vulnerabilities May 30, 2012 - 7:00am Addthis PROBLEM: IBM has acknowledged multiple vulnerabilities in IBM Java PLATFORM: IBM Java 7.x ABSTRACT: Vulnerabilities can be exploited by malicious users to disclose certain information and by malicious people to disclose potentially sensitive information, hijack a user's session, conduct DNS cache poisoning attacks, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system. Reference Links: Secunia Advisory 49333 CVE-2011-3389 Vendor Advisory IMPACT ASSESSMENT: High Discussion: IBM released a patch to address vulerabilities in IBM Java 7. IBM 7 SR1 is available for download. Impact: Hijacking Manipulation of data Exposure of sensitive information

429

T-694: IBM Tivoli Federated Identity Manager Products Multiple  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: IBM Tivoli Federated Identity Manager Products Multiple 4: IBM Tivoli Federated Identity Manager Products Multiple Vulnerabilities T-694: IBM Tivoli Federated Identity Manager Products Multiple Vulnerabilities August 16, 2011 - 3:30pm Addthis PROBLEM: Multiple vulnerabilities have been reported in IBM Tivoli Federated Identity Manager and IBM Tivoli Federated Identity Manager Business Gateway, where some have an unknown impact while one can be exploited by malicious people to cause a DoS (Denial of Service). PLATFORM: IBM Tivoli Federated Identity Manager 6.x, IBM Tivoli Federated Identity Manager Business Gateway 6.x ABSTRACT: This Security Alert addresses a serious security issue CVE-2010-4476 (Java Runtime Environment hangs when converting "2.2250738585072012e-308" to a binary floating-point number). This vulnerability might cause the Java

430

Multiple instances and symbolic variables in executable sequence charts  

Science Conference Proceedings (OSTI)

We extend live sequence charts (LSCs), a highly expressive variant of sequence diagrams, and provide the extension with an executable semantics. The extension involves support for instances that can bind to multiple objects and symbolic variables that ...

Rami Marelly; David Harel; Hillel Kugler

2002-11-01T23:59:59.000Z

431

Signal selective DOA tracking for multiple moving targets  

Science Conference Proceedings (OSTI)

A new algorithm for signal selective tracking of the directions-of-arrival (DOAs) of multiple moving targets with an array of passive sensors is presented. A new method based on the principles of maximum likelihood estimation and cyclostationarity is ...

J. Riba; J. Goldberg; G. Vazquez; M. A. Lagunas

1996-05-01T23:59:59.000Z

432

V-122: IBM Tivoli Application Dependency Discovery Manager Java Multiple  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: IBM Tivoli Application Dependency Discovery Manager Java 2: IBM Tivoli Application Dependency Discovery Manager Java Multiple Vulnerabilities V-122: IBM Tivoli Application Dependency Discovery Manager Java Multiple Vulnerabilities March 29, 2013 - 6:00am Addthis PROBLEM: IBM has acknowledged multiple vulnerabilities in IBM Tivoli Application Dependency Discovery Manager PLATFORM: The vulnerabilities are reported in version 7.2.0.0 through 7.2.1.3 ABSTRACT: Multiple security vulnerabilities exist in the Java Runtime Environments (JREs) that can affect the security of IBM Tivoli Application Dependency Discovery Manager. REFERENCE LINKS: Secunia Advisory SA52829 IBM Security Bulletin 1631786 CVE-2012-1531 CVE-2012-3143 CVE-2012-3216 CVE-2012-4820 CVE-2012-4822 CVE-2012-5069 CVE-2012-5071 CVE-2012-5073 CVE-2012-5075 CVE-2012-5079

433

U-191: Oracle Java Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

91: Oracle Java Multiple Vulnerabilities 91: Oracle Java Multiple Vulnerabilities U-191: Oracle Java Multiple Vulnerabilities June 14, 2012 - 7:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Oracle Java, which can be exploited by malicious local users PLATFORM: Oracle Java JDK 1.7.x / 7.x Oracle Java JRE 1.7.x / 7.x Sun Java JDK 1.5.x Sun Java JDK 1.6.x / 6.x Sun Java JRE 1.4.x Sun Java JRE 1.5.x / 5.x Sun Java JRE 1.6.x / 6.x Sun Java SDK 1.4.x ABSTRACT: The Critical Patch Update for Java SE also includes non-security fixes. Critical Patch Updates are cumulative and each advisory describes only the security fixes added since the previous Critical Patch Update. Thus, prior Critical Patch Update Advisories should be reviewed for information regarding earlier accumulated security fixes.

434

U-035: Adobe Flash Player Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

35: Adobe Flash Player Multiple Vulnerabilities 35: Adobe Flash Player Multiple Vulnerabilities U-035: Adobe Flash Player Multiple Vulnerabilities November 14, 2011 - 10:15am Addthis PROBLEM: Adobe Flash Player Multiple Vulnerabilities. PLATFORM: Adobe Flash Player 11.0.1.152 and earlier versions for Windows, Macintosh, Linux and Solaris operating systems Adobe Flash Player 11.0.1.153 and earlier versions for Android Adobe AIR 3.0 and earlier versions for Windows, Macintosh, and Android ABSTRACT: Adobe recommends users of Adobe Flash Player 11.0.1.152 and earlier versions for Windows, Macintosh, Linux and Solaris update to Adobe Flash Player 11.1.102.55. Users of Adobe Flash Player 11.0.1.153 and earlier versions for Android should update to Adobe Flash Player 11.1.102.59 for Android. Users of Adobe AIR 3.0 for Windows, Macintosh, and Android should

435

V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

61: IBM Maximo Asset Management Products Java Multiple 61: IBM Maximo Asset Management Products Java Multiple Vulnerabilities V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilities May 22, 2013 - 12:46am Addthis PROBLEM: IBM Maximo Asset Management Products Java Multiple Vulnerabilities PLATFORM: IBM Maximo Asset Management 6.x IBM Maximo Asset Management 7.x IBM Maximo Asset Management Essentials 7.x ABSTRACT: Asset and Service Mgmt Products - Potential security exposure when using JavaTM based applications due to vulnerabilities in Java Software Developer Kits. REFERENCE LINKS: IBM Reference #:1638135 Secunia Advisory SA53451 CVE-2013-0401 CVE-2013-2433 CVE-2013-2434 CVE-2013-0402 CVE-2013-1488 CVE-2013-1491 CVE-2013-1518 CVE-2013-1537 CVE-2013-1540 CVE-2013-1557 CVE-2013-1558 CVE-2013-1561 CVE-2013-1563 CVE-2013-1564 CVE-2013-1569

436

V-187: Mozilla Firefox Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Mozilla Firefox Multiple Vulnerabilities 7: Mozilla Firefox Multiple Vulnerabilities V-187: Mozilla Firefox Multiple Vulnerabilities June 27, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Mozilla Firefox PLATFORM: Mozilla Firefox 21.x ABSTRACT: These vulnerabilities can be exploited by malicious people to conduct cross-site scripting and spoofing attacks, disclose potentially sensitive information, bypass certain security restrictions, and compromise a user's system. REFERENCE LINKS: Secunia Advisory SA53970 Secunia Advisory SA53953 Mozilla Advisory mfsa2013-49 Mozilla Advisory mfsa2013-50 Mozilla Advisory mfsa2013-51 Mozilla Advisory mfsa2013-53 Mozilla Advisory mfsa2013-55 Mozilla Advisory mfsa2013-56 Mozilla Advisory mfsa2013-59 CVE-2013-1682 CVE-2013-1683 CVE-2013-1684 CVE-2013-1685

437

V-208: Google Chrome Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Google Chrome Multiple Vulnerabilities 8: Google Chrome Multiple Vulnerabilities V-208: Google Chrome Multiple Vulnerabilities August 1, 2013 - 2:32am Addthis PROBLEM: Multiple unspecified vulnerabilities in Google Chrome before 28.0.1500.95 allow attackers to cause a denial of service or possibly have other impact via unknown vectors. PLATFORM: Google Chrome 28.x ABSTRACT: Some vulnerabilities have been reported in Google Chrome which allows attackers to access and compromise a user's system. REFERENCE LINKS: Secunia Advisory SA54325 CVE-2013-2881 CVE-2013-2882 CVE-2013-2883 CVE-2013-2884 CVE-2013-2885 CVE-2013-2886 IMPACT ASSESSMENT: High DISCUSSION: Several vulnerabilities have been reported in Google Chrome, where some have an unknown impact and others can be exploited by malicious people to

438

U-173: Symantec Web Gateway Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Symantec Web Gateway Multiple Vulnerabilities 3: Symantec Web Gateway Multiple Vulnerabilities U-173: Symantec Web Gateway Multiple Vulnerabilities May 21, 2012 - 7:00am Addthis PROBLEM: Symantec Web Gateway Multiple Vulnerabilities PLATFORM: 5.0.x prior to 5.0.3 ABSTRACT: Several vulnerabilities were reported in Symantec Web Gateway. A remote user can include and execute arbitrary code on the target system. A remote user can conduct cross-site scripting attacks. A remote user can view/delete/upload files on the target system. Reference Links: SecurityTracker Alert ID: 1027078 CVE-2012-0296 CVE-2012-0297 CVE-2012-0298 CVE-2012-0299 IMPACT ASSESSMENT: Medium Discussion: The management interface does not properly authenticate remote users and does not properly validate user-supplied input. A remote user can cause arbitrary scripting code to be executed by the

439

V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: IBM Maximo Asset Management Products Java Multiple 1: IBM Maximo Asset Management Products Java Multiple Vulnerabilities V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilities May 22, 2013 - 12:46am Addthis PROBLEM: IBM Maximo Asset Management Products Java Multiple Vulnerabilities PLATFORM: IBM Maximo Asset Management 6.x IBM Maximo Asset Management 7.x IBM Maximo Asset Management Essentials 7.x ABSTRACT: Asset and Service Mgmt Products - Potential security exposure when using JavaTM based applications due to vulnerabilities in Java Software Developer Kits. REFERENCE LINKS: IBM Reference #:1638135 Secunia Advisory SA53451 CVE-2013-0401 CVE-2013-2433 CVE-2013-2434 CVE-2013-0402 CVE-2013-1488 CVE-2013-1491 CVE-2013-1518 CVE-2013-1537 CVE-2013-1540 CVE-2013-1557 CVE-2013-1558 CVE-2013-1561 CVE-2013-1563 CVE-2013-1564 CVE-2013-1569

440

U-179: IBM Java 7 Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: IBM Java 7 Multiple Vulnerabilities 9: IBM Java 7 Multiple Vulnerabilities U-179: IBM Java 7 Multiple Vulnerabilities May 30, 2012 - 7:00am Addthis PROBLEM: IBM has acknowledged multiple vulnerabilities in IBM Java PLATFORM: IBM Java 7.x ABSTRACT: Vulnerabilities can be exploited by malicious users to disclose certain information and by malicious people to disclose potentially sensitive information, hijack a user's session, conduct DNS cache poisoning attacks, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system. Reference Links: Secunia Advisory 49333 CVE-2011-3389 Vendor Advisory IMPACT ASSESSMENT: High Discussion: IBM released a patch to address vulerabilities in IBM Java 7. IBM 7 SR1 is available for download. Impact: Hijacking Manipulation of data Exposure of sensitive information

Note: This page contains sample records for the topic "quicktime multiple flaws" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

T-540: Sybase EAServer Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

40: Sybase EAServer Multiple Vulnerabilities 40: Sybase EAServer Multiple Vulnerabilities T-540: Sybase EAServer Multiple Vulnerabilities January 24, 2011 - 6:16am Addthis PROBLEM: Sybase EAServer Multiple Vulnerabilities PLATFORM: Sybase EAServer versions 6.3 and prior ABSTRACT: Sybase EAServer is prone to a security-bypass vulnerability and a directory-traversal vulnerability. Attackers may exploit these issues to execute arbitrary code within the context of the application or to disclose sensitive information. Sybase EAServer versions 6.3 and prior are affected. reference LINKS: Bugtraq ID: 45809 SyBase Advisory IMPACT ASSESSMENT: Medium Discussion: Remote exploitation of a design vulnerability in Sybase EAServer could allow an attacker to install arbitrary web services, this condition can result in arbitrary code execution allowing attacker to gain control over

442

Integrating automobile multiple intelligent warning systems : performance and policy implications  

E-Print Network (OSTI)

Intelligent driver warning systems can be found in many high-end vehicles on the road today, which will likely rapidly increase as they become standard equipment. However, introducing multiple warning systems into vehicles ...

Ho, Angela Wei Ling

2006-01-01T23:59:59.000Z

443

Practical rendering of multiple scattering effects in participating media  

Science Conference Proceedings (OSTI)

Volumetric light transport effects are significant for many materials like skin, smoke, clouds, snow or water. In particular, one must consider the multiple scattering of light within the volume. While it is possible to simulate such media using volumetric ...

Simon Premoe; Michael Ashikhmin; Jerry Tessendorf; Ravi Ramamoorthi; Shree Nayar

2004-06-01T23:59:59.000Z

444

Multiple Convection Patterns and Thermohaline Flow in an Idealized OGCM  

Science Conference Proceedings (OSTI)

This paper investigates how multiple steady states arise in an ocean general circulation model, caused by the fact that many different convection patterns can be stable under the same surface boundary conditions. Two alternative boundary ...

Stefan Rahmstorf

1995-12-01T23:59:59.000Z

445

A Bulk Microphysics Parameterization with Multiple Ice Precipitation Categories  

Science Conference Proceedings (OSTI)

A single-moment bulk microphysics scheme with multiple ice precipitation categories is described. It has 2 liquid hydrometeor categories (cloud droplets and rain) and 10 ice categories that are characterized by habit, size, and densitytwo ice ...

Jerry M. Straka; Edward R. Mansell

2005-04-01T23:59:59.000Z

446

Higher Moments of Net Proton Multiplicity Distributions at RHIC  

E-Print Network (OSTI)

We report the first measurements of the kurtosis (? [kappa]), skewness (S), and variance (? [sigma] [superscript 2]) of net-proton multiplicity (N [subscript p]-N [subscript p?] ) distributions at midrapidity for Au+Au ...

Balewski, Jan T.

447

A Common Theory of Information Fusion from Multiple Text Sources  

E-Print Network (OSTI)

A Common Theory of Information Fusion from Multiple Text Sources Step One: Cross-Document Structure families in the Northeast hit hard by this year's cold weather and the soaring cost of home heating oil

448

Multiple Aircraft Tracking System for Coordinated Research Missions  

Science Conference Proceedings (OSTI)

The Multiple Aircraft Position System (MAPS) was developed by the Convective Storms Division of the National Center for Atmospheric Research, in response to the need for aircraft position in the coordination of large field projects involving ...

Peter N. Johnson; Jack L. Fink

1982-05-01T23:59:59.000Z

449

Multiple Instrument Distributed Aperture Sensor (MIDAS) For Planetary Remote Sensing  

E-Print Network (OSTI)

Multiple Instrument Distributed Aperture Sensor (MIDAS) For Planetary Remote Sensing Joe Pitman An innovative approach that enables greatly increased return from planetary science remote sensing missions as the primary remote sensing science payload, thereby reducing the cost, resources, complexity, integration

Marcus, Philip S.

450

Performance of multiple cabin optimization methods in airline revenue management  

E-Print Network (OSTI)

Although many airlines offer seats in multiple cabins (economy vs. premium classes) with different service quality, previous work on airline revenue management has focused on treating the cabins separately. In this thesis, ...

Lepage, Pierre-Olivier

2013-01-01T23:59:59.000Z

451

An Object Oriented Framework for Parallel Multiple Optimizations  

Science Conference Proceedings (OSTI)

This report presents a general Objected-Oriented Framework for Parallel and Multiple Optimizations. We designed a general Objected-Oriented Class Library for Parallel Numerical Optimization. All optimization problems are considered: Unconstrained, Constrained, ...

Beidi Hamma

2000-06-01T23:59:59.000Z

452

Climate Determinism Revisited: Multiple Equilibria in a Complex Climate Model  

E-Print Network (OSTI)

Multiple equilibria in a coupled oceanatmospheresea ice general circulation model (GCM) of an aquaplanet with many degrees of freedom are studied. Three different stable states are found for exactly the same set of ...

Ferreira, David

453

Multiple Equilibrium States in Combined Thermal and Saline Circulation  

Science Conference Proceedings (OSTI)

Structure and stability of the multiple equilibria of the thermohaline circulation am studied using 2 2 and 3 2 box models. Thermohaline catastrophe is a shallow phenomenon and its time evolution consists of three stages: the search stage, ...

Rui Xin Huang; James R. Luyten; Henry M. Stommel

1992-03-01T23:59:59.000Z

454

Wind Power Forecasting Error Distributions over Multiple Timescales: Preprint  

DOE Green Energy (OSTI)

In this paper, we examine the shape of the persistence model error distribution for ten different wind plants in the ERCOT system over multiple timescales. Comparisons are made between the experimental distribution shape and that of the normal distribution.

Hodge, B. M.; Milligan, M.

2011-03-01T23:59:59.000Z

455

Characteristics of Maximum Concentrations from Multiple Point Sources  

Science Conference Proceedings (OSTI)

A simple quasi-Newton numerical scheme is applied to determine the hypothetical worst-case meteorology that will result in the maximum combined concentrations at any receptor location in air quality modeling over short distances for multiple ...

N. M. Zoumakis

1998-07-01T23:59:59.000Z

456

Characterizations of Image Acquisition and Epipolar Geometry of Multiple Panoramas  

Science Conference Proceedings (OSTI)

Recently multiple panoramic images have emerged and received increasingly interests in applications of 3D scene visualization and reconstruction. There is a need to characterize and clarify their common natures and differences so that a more general ...

Shou Kang Wei; Fay Huang; Reinhard Klette

2001-09-01T23:59:59.000Z

457

Adaptive multiple description mode selection for error resilient video communications  

E-Print Network (OSTI)

Streaming video applications must be able to withstand the potentially harsh conditions present on best-effort networks like the Internet, including variations in available bandwidth, packet losses, and delay. Multiple ...

Heng, Brian A., 1977-

2005-01-01T23:59:59.000Z

458

Global Transport on a Spherical Multiple-Cell Grid  

Science Conference Proceedings (OSTI)

Second- and third-order upstream nonoscillatory (UNO) advection schemes are applied on a spherical multiple-cell (SMC) grid for global transport. Similar to the reduced grid, the SMC grid relaxes the CourantFriedrichsLewy (CFL) restriction of ...

Jian-Guo Li

2011-05-01T23:59:59.000Z

459

Low-multiplicity Burst Search at the Sudbury Neutrino Observatory  

E-Print Network (OSTI)

Results are reported from a search for low-multiplicity neutrino bursts in the Sudbury Neutrino Observatory. Such bursts could indicate the detection of a nearby core-collapse supernova explosion. The data were taken from ...

Chen, Min

460

V-132: IBM Tivoli System Automation Application Manager Multiple...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3.1, 3.2, 3.2.1, and 3.2.2 ABSTRACT: Multiple security vulnerabilities exist in the IBM Java Runtime Environment component of IBM Tivoli System Automation Application Manager which...

Note: This page contains sample records for the topic "quicktime multiple flaws" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

A Single-Product Inventory Model for Multiple Demand Classes  

E-Print Network (OSTI)

We consider a single-product inventory system that serves multiple demand classes, which differ in their shortage costs or service level requirements. We assume a critical-level control policy, and show the equivalence ...

Arslan, Hasan

2005-05-27T23:59:59.000Z

462

Application of the multiple image radiography method to breast imaging  

Science Conference Proceedings (OSTI)

The Multiple Image Radiography (MIR) method is new imaging modality that extends the capability of conventional absorption based radiography by adding the additional contrast mechanisms of x-ray refraction and ultra-small angle scatter. In order to design ...

Christopher Parham; Etta Pisano; Chad Livasy; Laura Faulconer; Miles Wernick; Jovan Brankov; Miklos Kiss; Dean Connor; Jeddy Chen; Ann Wu; Zhong Zhong; Dean Chapman

2006-06-01T23:59:59.000Z

463

Mesoscale Mapping Capabilities of Multiple-Satellite Altimeter Missions  

Science Conference Proceedings (OSTI)

The purpose of this paper is to quantify the contribution of merging multiple-satellite altimeter missions to the mesoscale mapping of sea level anomaly (H), and zonal (U) and meridional (V) geostrophic velocities. A space/time suboptimal ...

P. Y. Le Traon; G. Dibarboure

1999-09-01T23:59:59.000Z

464

Efficient partitioning of fragment shaders for multiple-output hardware  

Science Conference Proceedings (OSTI)

Partitioning fragment shaders into multiple rendering passes is an effective technique for virtualizing shading resource limits in graphics hardware. The Recursive Dominator Split (RDS) algorithm is a polynomial-time algorithm for partitioning fragment ...

Tim Foley; Mike Houston; Pat Hanrahan

2004-08-01T23:59:59.000Z

465

STUDY OF CORRELATIONS IN MOLECULAR MOTION BY MULTIPLE QUANTUM NMR  

E-Print Network (OSTI)

VoId and R. R. VoId, Prog. in NMR Spectroscopy, vol. 12. ed.1950). III MULTIPLE QUANTUM NMR SPECTROSCOPY IntroductionThe conventional NMR spectra are usually obtained by a

Tang, J-H.

2008-01-01T23:59:59.000Z

466

T-694: IBM Tivoli Federated Identity Manager Products Multiple  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

94: IBM Tivoli Federated Identity Manager Products Multiple 94: IBM Tivoli Federated Identity Manager Products Multiple Vulnerabilities T-694: IBM Tivoli Federated Identity Manager Products Multiple Vulnerabilities August 16, 2011 - 3:30pm Addthis PROBLEM: Multiple vulnerabilities have been reported in IBM Tivoli Federated Identity Manager and IBM Tivoli Federated Identity Manager Business Gateway, where some have an unknown impact while one can be exploited by malicious people to cause a DoS (Denial of Service). PLATFORM: IBM Tivoli Federated Identity Manager 6.x, IBM Tivoli Federated Identity Manager Business Gateway 6.x ABSTRACT: This Security Alert addresses a serious security issue CVE-2010-4476 (Java Runtime Environment hangs when converting "2.2250738585072012e-308" to a binary floating-point number). This vulnerability might cause the Java

467

V-145: IBM Tivoli Federated Identity Manager Products Java Multiple  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: IBM Tivoli Federated Identity Manager Products Java Multiple 5: IBM Tivoli Federated Identity Manager Products Java Multiple Vulnerabilities V-145: IBM Tivoli Federated Identity Manager Products Java Multiple Vulnerabilities April 30, 2013 - 12:09am Addthis PROBLEM: IBM Tivoli Federated Identity Manager Products Java Multiple Vulnerabilities PLATFORM: IBM Tivoli Federated Identity Manager versions 6.1, 6.2.0, 6.2.1, and 6.2.2. IBM Tivoli Federated Identity Manager Business Gateway versions 6.1.1, 6.2.0, 6.2.1 and 6.2.2. ABSTRACT: IBM has acknowledged a weakness and two vulnerabilities in IBM Tivoli Federated Identity Manager and IBM Tivoli Federated Identity Manager Business Gateway REFERENCE LINKS: IBM Reference #:1634544 Secunia Advisory SA53233 CVE-2013-0169 CVE-2013-0440 CVE-2013-0443 IMPACT ASSESSMENT: Medium DISCUSSION: CVE-2013-0440 - Unspecified vulnerability in IBM Java

468

Multiple Motivations Institutional Change Principle | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Multiple Motivations Institutional Change Principle Multiple Motivations Institutional Change Principle Multiple Motivations Institutional Change Principle October 8, 2013 - 11:02am Addthis The multiple motivations principle suggests that a portfolio approach-rather than a single strategy-may be required to achieve change. Research demonstrates that people and institutions adopt new behaviors for many reasons. They likely need more than one reason for changing their current behavior. Therefore, people may shift to more sustainable, energy-efficient behaviors in the workplace because those actions are part of the agency's mission, lower costs, make work life easier or healthier, and are the "right thing to do." Methods Because individuals have different motivations, a variety of approaches should be used to change behavior. Such approaches can range widely, from

469

Geophysical Applications of Partial Wavelet Coherence and Multiple Wavelet Coherence  

Science Conference Proceedings (OSTI)

In this paper, the application of partial wavelet coherence (PWC) and multiple wavelet coherence (MWC) to geophysics is demonstrated. PWC is a technique similar to partial correlation that helps identify the resulting wavelet coherence (WTC) ...

Eric K. W. Ng; Johnny C. L. Chan

2012-12-01T23:59:59.000Z

470

Topic Extraction from Text Documents Using Multiple-Cause Networks  

Science Conference Proceedings (OSTI)

This paper presents an approach to the topic extraction from text documents using probabilistic graphical models. Multiple-cause networks with latent variables are used and the Helmholtz machines are utilized to ease the learning and inference. The learning ...

Jeong-Ho Chang; Jae Won Lee; Yuseop Kim; Byoung-Tak Zhang

2002-08-01T23:59:59.000Z

471

Climate Determinism Revisited: Multiple Equilibria in a Complex Climate Model  

Science Conference Proceedings (OSTI)

Multiple equilibria in a coupled oceanatmospheresea ice general circulation model (GCM) of an aquaplanet with many degrees of freedom are studied. Three different stable states are found for exactly the same set of parameters and external ...

David Ferreira; John Marshall; Brian Rose

2011-02-01T23:59:59.000Z

472

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

51 - 20160 of 28,905 results. 51 - 20160 of 28,905 results. Article DOE Issues Notice of Proposed Rulemaking to Improve Energy Efficiency Enforcement Process Today, the Department of Energy announced a Notice of Proposed Rulemaking seeking comment on proposed reforms designed to improve its energy efficiency certification and enforcement regulations. http://energy.gov/gc/articles/doe-issues-notice-proposed-rulemaking-improve-energy-efficiency-enforcement-process Article U-202: Apple QuickTime Multiple Stack Overflow Vulnerabilities Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. http://energy.gov/cio/articles/u-202-apple-quicktime-multiple-stack-overflow-vulnerabilities Article U-185: OpenLDAP May Ignore TLSCipherSuite Setting in Some Cases

473

MULTIPLE SULFUR ISOTOPE FRACTIONATIONS IN BIOLOGICAL SYSTEMS: A CASE STUDY WITH SULFATE REDUCERS  

E-Print Network (OSTI)

MULTIPLE SULFUR ISOTOPE FRACTIONATIONS IN BIOLOGICAL SYSTEMS: A CASE STUDY WITH SULFATE REDUCERS*, DONALD E. CANFIELD**, and KIRSTEN S. HABICHT** ABSTRACT. Multiple sulfur isotope measurements of sulfur disproportionation indicate that different types of metabolic processes impart differ- ent multiple isotope

Kaufman, Alan Jay

474

V-083: Oracle Java Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Oracle Java Multiple Vulnerabilities 3: Oracle Java Multiple Vulnerabilities V-083: Oracle Java Multiple Vulnerabilities February 4, 2013 - 12:42am Addthis PROBLEM: Oracle Java Multiple Vulnerabilities PLATFORM: Oracle Java JDK 1.5.x / 5.x Oracle Java JDK 1.7.x / 7.x Oracle Java JRE 1.7.x / 7.x Oracle Java SDK 1.4.x / 4.x Sun Java JDK 1.4.x Sun Java JDK 1.6.x / 6.x Sun Java JRE 1.4.x / 4.x Sun Java JRE 1.5.x / 5.x Sun Java JRE 1.6.x / 6.x ABSTRACT: A Critical Patch Update is a collection of patches for multiple security vulnerabilities. The Critical Patch Update for Java SE also includes non-security fixes. Critical Patch Updates are cumulative and each advisory describes only the security fixes added since the previous Critical Patch Update and Security Alert. REFERENCE LINKS: Oracle Security Advisory February 2013

475

V-083: Oracle Java Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Oracle Java Multiple Vulnerabilities 3: Oracle Java Multiple Vulnerabilities V-083: Oracle Java Multiple Vulnerabilities February 4, 2013 - 12:42am Addthis PROBLEM: Oracle Java Multiple Vulnerabilities PLATFORM: Oracle Java JDK 1.5.x / 5.x Oracle Java JDK 1.7.x / 7.x Oracle Java JRE 1.7.x / 7.x Oracle Java SDK 1.4.x / 4.x Sun Java JDK 1.4.x Sun Java JDK 1.6.x / 6.x Sun Java JRE 1.4.x / 4.x Sun Java JRE 1.5.x / 5.x Sun Java JRE 1.6.x / 6.x ABSTRACT: A Critical Patch Update is a collection of patches for multiple security vulnerabilities. The Critical Patch Update for Java SE also includes non-security fixes. Critical Patch Updates are cumulative and each advisory describes only the security fixes added since the previous Critical Patch Update and Security Alert. REFERENCE LINKS: Oracle Security Advisory February 2013

476

V-107: Wireshark Multiple Denial of Service Vulnerabilities | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Wireshark Multiple Denial of Service Vulnerabilities 7: Wireshark Multiple Denial of Service Vulnerabilities V-107: Wireshark Multiple Denial of Service Vulnerabilities March 8, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Wireshark PLATFORM: Wireshark 1.6.x and 1.8.x ABSTRACT: Multiple vulnerabilities have been reported in Wireshark, which can be exploited by malicious people to cause a DoS (Denial of Service). REFERENCE LINKS: Secunia Advisory SA52471 Wireshark Release Notes 1.8.6 Wireshark Release Notes 1.6.1.4 CVE-2013-2475 CVE-2013-2476 CVE-2013-2477 CVE-2013-2478 CVE-2013-2479 CVE-2013-2480 CVE-2013-2481 CVE-2013-2482 CVE-2013-2483 CVE-2013-2484 CVE-2013-2485 CVE-2013-2486 CVE-2013-2487 CVE-2013-2488 IMPACT ASSESSMENT: Medium DISCUSSION: 1) An error in the TCP dissector when processing certain packets can be

477

V-107: Wireshark Multiple Denial of Service Vulnerabilities | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Wireshark Multiple Denial of Service Vulnerabilities 7: Wireshark Multiple Denial of Service Vulnerabilities V-107: Wireshark Multiple Denial of Service Vulnerabilities March 8, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Wireshark PLATFORM: Wireshark 1.6.x and 1.8.x ABSTRACT: Multiple vulnerabilities have been reported in Wireshark, which can be exploited by malicious people to cause a DoS (Denial of Service). REFERENCE LINKS: Secunia Advisory SA52471 Wireshark Release Notes 1.8.6 Wireshark Release Notes 1.6.1.4 CVE-2013-2475 CVE-2013-2476 CVE-2013-2477 CVE-2013-2478 CVE-2013-2479 CVE-2013-2480 CVE-2013-2481 CVE-2013-2482 CVE-2013-2483 CVE-2013-2484 CVE-2013-2485 CVE-2013-2486 CVE-2013-2487 CVE-2013-2488 IMPACT ASSESSMENT: Medium DISCUSSION: 1) An error in the TCP dissector when processing certain packets can be

478

V-051: Oracle Solaris Java Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Oracle Solaris Java Multiple Vulnerabilities 1: Oracle Solaris Java Multiple Vulnerabilities V-051: Oracle Solaris Java Multiple Vulnerabilities December 20, 2012 - 12:15am Addthis PROBLEM: Oracle Solaris Java Multiple Vulnerabilities PLATFORM: Oracle Solaris 11.x ABSTRACT: Oracle has acknowledged multiple vulnerabilities in Java included in Solaris REFERENCE LINKS: Secunia Advisory: SA51618 Secunia Advisory: SA50949 Third Party Vulnerability Resolution Blog in Java 7U9 Third Party Vulnerability Resolution Blog in Java 6U37 CVE-2012-1531 CVE-2012-1532 CVE-2012-1533 CVE-2012-3143 CVE-2012-3159 CVE-2012-3216 CVE-2012-4416 CVE-2012-5067 CVE-2012-5068 CVE-2012-5069 CVE-2012-5070 CVE-2012-5071 CVE-2012-5072 CVE-2012-5073 CVE-2012-5074 CVE-2012-5075 CVE-2012-5076 CVE-2012-5077 CVE-2012-5079 CVE-2012-5081 CVE-2012-5083 CVE-2012-5084

479

EXPERIMENTS ON SELECTIVE EXCITATION OF MULTIPLE-QUANTUM TRANSITIONS IN NMR SPECTROSCOPY  

E-Print Network (OSTI)

M. Mehring, High Resolution NMR Spectroscopy in Solids (sequences for producing quantum NMR spectra. multiple~ InMULTIPLE-QUANTUM TRANSITIONS IN NMR SPECTROSCOPY W.S. Warren

Warren, W.S.

2013-01-01T23:59:59.000Z

480

Sabine River Compact (Multiple States) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Sabine River Compact (Multiple States) Sabine River Compact (Multiple States) Sabine River Compact (Multiple States) < Back Eligibility Utility Fed. Government Commercial Agricultural Investor-Owned Utility State/Provincial Govt Industrial Construction Municipal/Public Utility Local Government Residential Installer/Contractor Rural Electric Cooperative Tribal Government Low-Income Residential Schools Retail Supplier Institutional Multi-Family Residential Systems Integrator Fuel Distributor Nonprofit General Public/Consumer Transportation Savings Category Water Buying & Making Electricity Home Weatherization Program Info State Texas Program Type Siting and Permitting Provider Sabine River Compact Commission The Sabine River Compact Commission administers the Sabine River Compact to ensure that Texas receives its equitable share of quality water from the

Note: This page contains sample records for the topic "quicktime multiple flaws" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

V-205: IBM Tivoli System Automation for Multiplatforms Java Multiple  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

V-205: IBM Tivoli System Automation for Multiplatforms Java V-205: IBM Tivoli System Automation for Multiplatforms Java Multiple Vulnerabilities V-205: IBM Tivoli System Automation for Multiplatforms Java Multiple Vulnerabilities July 29, 2013 - 4:20am Addthis PROBLEM: IBM has acknowledged a weakness and multiple vulnerabilities in IBM Tivoli System Automation for Multiplatforms, which can be exploited by malicious, local users to disclose certain sensitive information and gain escalated privileges and by malicious people to disclose certain sensitive information, manipulate certain data, bypass certain security restrictions, cause a DoS (Denial of Service), and compromise a vulnerable system. PLATFORM: The weakness and the vulnerabilities are reported in versions 3.1 through 3.2.2 running on AIX, Linux, Solaris, and Windows.

482

V-178: IBM Data Studio Web Console Java Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: IBM Data Studio Web Console Java Multiple Vulnerabilities 8: IBM Data Studio Web Console Java Multiple Vulnerabilities V-178: IBM Data Studio Web Console Java Multiple Vulnerabilities June 14, 2013 - 6:00am Addthis PROBLEM: IBM has acknowledged a weakness and two vulnerabilities in IBM Data Studio PLATFORM: IBM Data Studio 3.x ABSTRACT: IBM Data Studio Web Console uses the IBM Java Runtime Environment (JRE) and might be affected by vulnerabilities in the IBM JRE REFERENCE LINKS: Secunia Advisory SA53778 IBM Flash Alert 1640533 CVE-2013-0169 CVE-2013-0440 CVE-2013-0443 IMPACT ASSESSMENT: High DISCUSSION: An unspecified vulnerability within the JSSE component could allow: 1) A remote attacker to cause a denial of service 2) To statistically observe the time necessary to generate/receive error messages and deduce the plaintext after a relatively small number of

483

CHOS in Production - Multiple Linux Environments on PDSF at NERSC  

NLE Websites -- All DOE Office Websites (Extended Search)

CHOS CHOS in Production Multiple Linux Environments on PDSF at NERSC Larry Pezzaglia National Energy Research Scientific Computing Center Lawrence Berkeley National Laboratory April 2012 A commodity Linux cluster at NERSC serving HEP and NS projects 1GbE and 10GbE interconnect In continuous operation since 1996 ~1500 compute cores on ~200 nodes Over 750 TB shared GPFS storage in 17 filesystems Over 650 TB of XRootD storage Supports SL5 and SL6 environments Projects "buy in" to PDSF and the UGE share tree is adjusted accordingly PDSF at NERSC 2 PDSF has a broad user base (including non-CERN and non-LHC projects) Current projects include ALICE, ATLAS, CUORE, Daya Bay, IceCube, KamLAND, Majorana, and STAR Prior projects include BaBaR, CDF, Planck, SNO, and SNFactory PDSF Workloads 3 PDSF must support multiple applications for multiple projects Many are only tested

484

Chesapeake Bay Preservation Programs (Multiple States) | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Chesapeake Bay Preservation Programs (Multiple States) Chesapeake Bay Preservation Programs (Multiple States) Chesapeake Bay Preservation Programs (Multiple States) < Back Eligibility Agricultural Commercial Construction Developer Fed. Government Fuel Distributor General Public/Consumer Industrial Installer/Contractor Institutional Investor-Owned Utility Local Government Low-Income Residential Multi-Family Residential Municipal/Public Utility Nonprofit Residential Retail Supplier Rural Electric Cooperative Schools State/Provincial Govt Systems Integrator Transportation Tribal Government Utility Savings Category Alternative Fuel Vehicles Hydrogen & Fuel Cells Buying & Making Electricity Water Home Weatherization Solar Wind Program Info State Maryland Program Type Siting and Permitting Provider Chesapeake Bay Program The Chesapeake Bay Program is a unique regional partnership that has led

485

Multiple Ruptures For Long Valley Microearthquakes- A Link To Volcanic  

Open Energy Info (EERE)

Multiple Ruptures For Long Valley Microearthquakes- A Link To Volcanic Multiple Ruptures For Long Valley Microearthquakes- A Link To Volcanic Tremor(Question) Jump to: navigation, search GEOTHERMAL ENERGYGeothermal Home Journal Article: Multiple Ruptures For Long Valley Microearthquakes- A Link To Volcanic Tremor(Question) Details Activities (1) Areas (1) Regions (0) Abstract: Despite several episodes of ground deformation and intense seismic activity starting in 1978, the Long Valley, California, volcanic area has not produced clearly recognized volcanic tremor. Instead, a variety of atypical microearthquakes have been recorded during these episodes, including events dominated by low-frequency (long-period) or mixed high and low-frequency (hybrid) signals. During a 1997 episode, a number of unusual microearthquakes occurred within a temporary 40-station

486

New England Power Pool (Multiple States) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

England Power Pool (Multiple States) England Power Pool (Multiple States) New England Power Pool (Multiple States) < Back Eligibility Developer Savings Category Alternative Fuel Vehicles Hydrogen & Fuel Cells Buying & Making Electricity Water Home Weatherization Solar Wind Program Info State Maine Program Type Interconnection Independent System Operator (ISO) New England helps protect the health of New England's economy and the well-being of its people by ensuring the constant availability of electricity, today and for future generations. ISO New England meets this obligation in three ways: by ensuring the day-to-day reliable operation of New England's bulk power generation and transmission system, by overseeing and ensuring the fair administration of the region's wholesale electricity markets, and by managing comprehensive, regional

487

T-657: Drupal Prepopulate - Multiple vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Drupal Prepopulate - Multiple vulnerabilities 7: Drupal Prepopulate - Multiple vulnerabilities T-657: Drupal Prepopulate - Multiple vulnerabilities June 29, 2011 - 3:34pm Addthis PROBLEM: Prepopulate module enables pre-populating forms in Drupal using the $_REQUEST vairable. PLATFORM: Prepopulate module for Drupal 6.x versions prior to 6.x-2.2 ABSTRACT: The module does not adequately validate user input leading to an cross-site scripting (XSS) possibility in certain circumstances. reference LINKS: Advisory ID: DRUPAL-SA-CONTRIB-2011-023 Prepopulate module Prepopulate 6.x-2.2 Update IMPACT ASSESSMENT: High Discussion: The Prepopulate module enables pre-populating forms in Drupal using the $_REQUEST vairable. The module does not adequately validate user input leading to an cross-site scripting (XSS) possibility in certain circumstances. Users privileged to

488