National Library of Energy BETA

Sample records for remote code execution

  1. U-236: Microsoft JScript and VBScript Engine Integer Overflow Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Execution of arbitrary code via network A remote user can cause arbitrary code to be executed on the target

  2. T-725: Cisco Unified Service Monitor and Cisco Unified Operations Manager Remote Code Execution Vulnerabilitiry Code

    Broader source: Energy.gov [DOE]

    Successful exploitation of these vulnerabilities could allow an unauthenticated, remote attacker to execute arbitrary code on affected servers.

  3. T-573: Windows Remote Desktop Client DLL Loading Error Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Windows Remote Desktop Client. A remote user can cause arbitrary code to be executed on the target user's system.

  4. T-613: Microsoft Excel Axis Properties Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Microsoft Excel is prone to a remote code-execution vulnerability because the applications fails to sufficiently validate user-supplied input. Attackers can exploit this issue by enticing an unsuspecting user to open a specially crafted Excel file. Successful exploits can allow attackers to execute arbitrary code with the privileges of the user running the application. Failed exploit attempts will result in a denial-of-service condition.

  5. U-140: HP-UX Unspecified Flaw in DCE Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can execute arbitrary code on the target system. A remote user can send specially crafted data to execute arbitrary code on the target system. The code will run with the privileges of the target service.

  6. V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code March 18, 2013 - 1:53am Addthis PROBLEM: Apple Safari...

  7. V-095: Oracle Java Flaws Let Remote Users Execute Arbitrary Code...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: Oracle Java Flaws Let Remote Users Execute Arbitrary Code V-095: Oracle Java Flaws Let Remote Users Execute Arbitrary Code February 20, 2013 - 12:38am Addthis PROBLEM: Oracle...

  8. U-208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in HP Operations Agent. A remote user can execute arbitrary code on the target system

  9. U-161: Citrix Provisioning Services Unspecified Flaw Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Citrix Provisioning Services. A remote user can execute arbitrary code on the target system.

  10. V-006: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in CA ARCserve Backup. A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions.

  11. U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can cause arbitrary code to be executed on the target user's system. A remote user can conduct cross-site scripting attacks. A remote user can obtain potentially sensitive information.

  12. T-695: Avaya Aura Application Server Buffer Overflow in 'cstore.exe' Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Avaya Aura Application Server Buffer Overflow in 'cstore.exe' Lets Remote Users Execute Arbitrary Code.

  13. T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks

  14. U-093: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting.

  15. T-560: Cisco Security Advisory: Management Center for Cisco Security Agent Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    The Management Center for Cisco Security Agent is affected by a vulnerability that may allow an unauthenticated attacker to perform remote code execution on the affected device.

  16. U-136: Adobe Flash Player Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system.

  17. T-718:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system.

  18. U-079: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system.

  19. U-166: Adobe Shockwave Player Memory Corruption Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Adobe Shockwave Player. A remote user can cause arbitrary code to be executed on the target user's system.

  20. U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Apple QuickTime. A remote user can cause arbitrary code to be executed on the target user's system.

  1. U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create content that, when loaded by the target user, will execute arbitrary code on or obtain potentially sensitive information from the target user's system.

  2. U-080: Linux Kernel XFS Heap Overflow May Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in the Linux Kernel. A remote user can cause arbitrary code to be executed on the target user's system.

  3. T-538: HP OpenView Storage Data Protector Bug Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in HP OpenView Storage Data Protector. A remote user can execute arbitrary code on the target system.

  4. U-133: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system.

  5. U-143: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system.

  6. U-041: Google Chrome Out-of-Bounds Write Error Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

  7. U-004:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

  8. U-160: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system

  9. U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...

    Energy Savers [EERE]

    iOS. A remote user can cause arbitrary code to be executed on the target user's system. ... A remote user can create a specially crafted file that, when loaded by the target user, ...

  10. T-652: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Mozilla Thunderbird. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can obtain cookies from another domain in certain cases.

  11. U-118: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can obtain potentially information.

  12. U-063: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can cause the target application to execute arbitrary code on the target user's system.

  13. U-163: PHP Command Parameter Bug Lets Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in PHP. A remote user can obtain potentially sensitive information. A remote user can execute arbitrary code on the target system.

  14. U-088: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in Symantec pcAnywhere. A remote user can execute arbitrary code on the target system. A local user can obtain elevated privileges on the target system.

  15. T-557: Microsoft Office Excel Office Art Object Parsing Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Office Excel. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

  16. T-526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Microsoft Internet Explorer is prone to a remote code-execution vulnerability. Successful exploits will allow an attacker to run arbitrary code in the context of the user running the application. Failed attacks will cause denial-of-service conditions. Microsoft Internet Explorer 8.0.7600.16385 is vulnerable; other versions may also be affected.

  17. T-554: Race condition in Google Chrome before 9.0.597.84 allows remote attackers to execute arbitrary code

    Broader source: Energy.gov [DOE]

    Race condition in Google Chrome before 9.0.597.84 allows remote attackers to execute arbitrary code via vectors related to audio.

  18. U-119: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system

  19. U-007: IBM Rational AppScan Import/Load Function Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in IBM Rational AppScan. A remote user can cause arbitrary code to be executed on the target user's system.

  20. V-058: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Microsoft Internet Explorer. A remote user can cause arbitrary code to be executed on the target user's system.

  1. U-177: Lotus Quickr for Domino ActiveX Control Buffer Overflow Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Lotus Quickr for Domino. A remote user can cause arbitrary code to be executed on the target user's system.

  2. U-155: WebCalendar Access Control and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code

    Office of Energy Efficiency and Renewable Energy (EERE)

    Two vulnerabilities were reported in WebCalendar. A remote user may be able to execute arbitrary PHP code on the target system.

  3. U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in Apple iOS. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can spoof the address bar URL.

  4. U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote Users Execute Arbitrary Code and Deny Service

    Broader source: Energy.gov [DOE]

    A remote user can create a Java applet or Java Web Start application that, when loaded by the target user, will access or modify data or execute arbitrary code on the target user's system.

  5. U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges

    Office of Energy Efficiency and Renewable Energy (EERE)

    Several vulnerabilities were reported in Apple OS X. A remote user can execute arbitrary code on the target system. A remote user can obtain a password hash in certain cases. A local user can obtain elevated privileges on the target system. A local user can obtain password keystrokes.

  6. U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code September 18, 2012 -...

  7. T-609: Adobe Acrobat/Reader Memory Corruption Error in CoolType Library Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create a specially crafted PDF file that, when loaded by the target user, will trigger a memory corruption error in the CoolType library and execute arbitrary code on the target system. The code will run with the privileges of the target user.

  8. V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system CVE-2013-1009,...

  9. V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    PROBLEM: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code

  10. U-081: McAfee SaaS 'myCIOScn.dll' ActiveX Control Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

  11. U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system CVE-2011-3016, CVE-2011-3021,...

  12. T-541: Citrix Provisioning Services Unspecified Flaw Let's Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability has been identified in Citrix Provisioning Services that could result in arbitrary code execution. This vulnerability can be triggered by an attacker sending a specially crafted packet to the Provisioning Services server. This vulnerability is present in all supported versions of Citrix Provisioning Services up to and including version 5.6.

  13. T-570: HP Security Bulletin- HP-UX Running OpenSSL, Remote Execution of Arbitrary Code, Denial of Service (DoS), Authentication Bypass

    Broader source: Energy.gov [DOE]

    A potential security vulnerability has been identified with HP-UX OpenSSL. This vulnerability could be exploited remotely to execute arbitrary code or create a Denial of Service (DoS) or an authentication bypass.

  14. T-529: Apple Mac OS PackageKit Distribution Script Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    A format string issue exists in PackageKit's handling of distribution scripts. A man-in-the-middle attacker may be able to cause an unexpected application termination or arbitrary code execution when Software Update checks for new updates. This issue is addressed through improved validation of distribution scripts. This issue does not affect systems prior to Mac OS X v10.6.

  15. T-574: Google Chrome Multiple Flaws Let Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    4: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code T-574: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code March 10, 2011 - 3:05pm Addthis...

  16. T-635: Cisco AnyConnect Secure Mobility Client Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    Cisco AnyConnect Secure Mobility Client contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on a targeted system. The vulnerability exists due to improper validation of program executables downloaded by the Cisco AnyConnect Secure Mobility Client. An unauthenticated, remote attacker could exploit the vulnerability by convincing the targeted user to view a malicious website. If successful, the attacker could execute arbitrary code on the system with the privileges of the user. Cisco confirmed the vulnerability in a security advisory and released software updates.

  17. U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    79: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code ...

  18. U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain...

  19. U-110: Samba Bug Lets Remote Users Execute Arbitrary Code | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    code on the target system. reference LINKS: Vendor Advisory Security Tracker ID 1026739 CVE-2012-0870 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Samba....

  20. T-532: Vulnerability in Graphics Rendering Engine Could Allow Remote Code Execution

    Broader source: Energy.gov [DOE]

    Microsoft is investigating new public reports of a vulnerability in the Windows Graphics Rendering Engine. An attacker who successfully exploited this vulnerability could run arbitrary code in the security context of the logged-on user.

  1. U-277: Google Chrome Multiple Flaws Let Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 22.0.1229.92 ABSTRACT: Several vulnerabilities were...

  2. V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code November 9, 2012 - 6:00am...

  3. V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code March 13, 2013 - 12:04am Addthis PROBLEM:...

  4. V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code April 25, 2013 - 12:14am...

  5. T-619: Skype for Mac Message Processing Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    A remote user can send a specially crafted message to a Skype user to execute arbitrary code on the target user's system. The code will run with the privileges of the target user.

  6. U-069: Telnet code execution vulnerability: FreeBSD and Kerberos

    Broader source: Energy.gov [DOE]

    Vulnerability was reported in FreeBSD Telnet. A remote user can execute arbitrary code on the target system.

  7. U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Arbitrary Code and Deny Service | Department of Energy 79: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service October 11, 2012 - 6:00am Addthis PROBLEM: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service PLATFORM: Version(s): prior to 4.1(9) ABSTRACT: Several vulnerabilities were reported in Cisco Firewall

  8. T-539: Adobe Acrobat, Reader, and Flash Player Arbitrary Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    An unauthenticated, remote attacker could exploit this vulnerability to execute arbitrary code with the privileges of the user. If the user holds elevated privileges, the attacker could execute arbitrary code that results in complete system compromise.

  9. T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request Forgery Attacks and Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Mozilla developers identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and Mozilla presume that with enough effort at least some of these could be exploited to run arbitrary code.

  10. T-656: Microsoft Office Visio DXF File Handling Arbitrary Code Execution Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE)

    Microsoft Office Visio contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on a targeted system.

  11. T-654: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary

    Broader source: Energy.gov [DOE]

    A remote user can create a specially crafted file that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user.

  12. V-209:Cisco WAAS (Wide Area Application Services) Arbitrary Code Execution Vulnerabilities

    Broader source: Energy.gov [DOE]

    Cisco Wide Area Application Services (WAAS) when configured as Central Manager (CM), contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on the affected system.

  13. T-559: Stack-based buffer overflow in oninit in IBM Informix Dynamic Server (IDS) 11.50 allows remote execution

    Broader source: Energy.gov [DOE]

    Stack-based buffer overflow in oninit in IBM Informix Dynamic Server (IDS) 11.50 allows remote execution attackers to execute arbitrary code via crafted arguments in the USELASTCOMMITTED session environment option in a SQL SET ENVIRONMENT statement

  14. V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code June...

  15. V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities December 21, 2012 - ...

  16. V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets May 2, 2013 - 6:00am Addthis...

  17. Remote-Handled Transuranic Content Codes

    SciTech Connect (OSTI)

    Washington TRU Solutions

    2006-12-01

    The Remote-Handled Transuranic (RH-TRU) Content Codes (RH-TRUCON) document describes the inventory of RH-TRU waste within the transportation parameters specified by the Remote-Handled Transuranic Waste Authorized Methods for Payload Control (RH-TRAMPAC).1 The RH-TRAMPAC defines the allowable payload for the RH-TRU 72-B. This document is a catalog of RH-TRU 72-B authorized contents by site. A content code is defined by the following components: A two-letter site abbreviation that designates the physical location of the generated/stored waste (e.g., ID for Idaho National Laboratory [INL]). The site-specific letter designations for each of the sites are provided in Table 1. A three-digit code that designates the physical and chemical form of the waste (e.g., content code 317 denotes TRU Metal Waste). For RH-TRU waste to be transported in the RH-TRU 72-B, the first number of this three-digit code is 3. The second and third numbers of the three-digit code describe the physical and chemical form of the waste. Table 2 provides a brief description of each generic code. Content codes are further defined as subcodes by an alpha trailer after the three-digit code to allow segregation of wastes that differ in one or more parameter(s). For example, the alpha trailers of the subcodes ID 322A and ID 322B may be used to differentiate between waste packaging configurations. As detailed in the RH-TRAMPAC, compliance with flammable gas limits may be demonstrated through the evaluation of compliance with either a decay heat limit or flammable gas generation rate (FGGR) limit per container specified in approved content codes. As applicable, if a container meets the watt*year criteria specified by the RH-TRAMPAC, the decay heat limits based on the dose-dependent G value may be used as specified in an approved content code. If a site implements the administrative controls outlined in the RH-TRAMPAC and Appendix 2.4 of the RH-TRU Payload Appendices, the decay heat or FGGR limits

  18. How Effective is SIMD in Case of Divergent Code Execution?

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    How Effective is SIMD in Case of Divergent Code Execution? BoF: Exploiting SIMD-Parallelism - Today & Tomorrow wende@zib.de ISC 2015, BoF: Exploiting SIMD-Parallelism - Today & Tomorrow (Divergent Code Execution) 1/4 Divergences within SIMD loops Caused by, e.g.,  branching: if-elseif-...-else How to address?  vector masking [ + control logic ]  code restructuring, e.g., loop permutation for nested loops false wende@zib.de ISC 2015, BoF: Exploiting SIMD-Parallelism - Today &

  19. T-607: Update: Adobe Acrobat, Reader, and Flash Player SWF File Processing Arbitrary Code Execution Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE)

    Update: Adobe Acrobat, Reader, and Flash Player SWF File Processing Arbitrary Code Execution Vulnerability.

  20. V-149: Microsoft Internet Explorer Object Access Bug Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    9: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code V-149: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary...

  1. System for loading executable code into volatile memory in a downhole tool

    DOE Patents [OSTI]

    Hall, David R.; Bartholomew, David B.; Johnson, Monte L.

    2007-09-25

    A system for loading an executable code into volatile memory in a downhole tool string component comprises a surface control unit comprising executable code. An integrated downhole network comprises data transmission elements in communication with the surface control unit and the volatile memory. The executable code, stored in the surface control unit, is not permanently stored in the downhole tool string component. In a preferred embodiment of the present invention, the downhole tool string component comprises boot memory. In another embodiment, the executable code is an operating system executable code. Preferably, the volatile memory comprises random access memory (RAM). A method for loading executable code to volatile memory in a downhole tool string component comprises sending the code from the surface control unit to a processor in the downhole tool string component over the network. A central processing unit writes the executable code in the volatile memory.

  2. T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system - CVE-2010-1823,...

  3. U-074: Microsoft.NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users

    Broader source: Energy.gov [DOE]

    A remote user can execute arbitrary commands on the target system. A remote user can access a target user's account. A remote user can redirect users to arbitrary sites.

  4. V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Vulnerabilities | Department of Energy 2: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities December 21, 2012 - 12:15am Addthis PROBLEM: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities PLATFORM: Drupal 6.x versions prior to 6.27 Drupal 7.x versions prior to 7.18 ABSTRACT: Drupal Core Multiple vulnerabilities REFERENCE LINKS: SA-CORE-2012-004 - Drupal core

  5. U-047: Siemens Automation License Manager Bugs Let Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or...

  6. U-015: CiscoWorks Common Services Home Page Input Validation Flaw Lets Remote Users Execute Arbitrary Commands

    Broader source: Energy.gov [DOE]

    Successful exploitation of this vulnerability may allow an authenticated, remote attacker to execute arbitrary commands on the affected system with the privileges of a system administrator.

  7. V-203: HP LoadRunner Multiple Bugs Let Remote Users Deny Service...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code...

  8. T-593: Microsoft Internet Explorer unspecified code execution

    Broader source: Energy.gov [DOE]

    Unspecified vulnerability in Microsoft Internet Explorer 8 on Windows 7 allows remote attackers to bypass Protected Mode and create arbitrary files by leveraging access to a Low integrity process.

  9. V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code V-076: Cisco Wireless LAN ...

  10. The role of the PIRT process in identifying code improvements and executing code development

    SciTech Connect (OSTI)

    Wilson, G.E.; Boyack, B.E.

    1997-07-01

    In September 1988, the USNRC issued a revised ECCS rule for light water reactors that allows, as an option, the use of best estimate (BE) plus uncertainty methods in safety analysis. The key feature of this licensing option relates to quantification of the uncertainty in the determination that an NPP has a {open_quotes}low{close_quotes} probability of violating the safety criteria specified in 10 CFR 50. To support the 1988 licensing revision, the USNRC and its contractors developed the CSAU evaluation methodology to demonstrate the feasibility of the BE plus uncertainty approach. The PIRT process, Step 3 in the CSAU methodology, was originally formulated to support the BE plus uncertainty licensing option as executed in the CSAU approach to safety analysis. Subsequent work has shown the PIRT process to be a much more powerful tool than conceived in its original form. Through further development and application, the PIRT process has shown itself to be a robust means to establish safety analysis computer code phenomenological requirements in their order of importance to such analyses. Used early in research directed toward these objectives, PIRT results also provide the technical basis and cost effective organization for new experimental programs needed to improve the safety analysis codes for new applications. The primary purpose of this paper is to describe the generic PIRT process, including typical and common illustrations from prior applications. The secondary objective is to provide guidance to future applications of the process to help them focus, in a graded approach, on systems, components, processes and phenomena that have been common in several prior applications.

  11. V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code | Department of Energy 6: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code January 24, 2013 - 6:00am Addthis PROBLEM: Several vulnerabilities were reported in

  12. U-089:Apache Struts ParameterInterceptor() Flaw Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Apache Struts ParameterInterceptor() Flaw Lets Remote Users Execute Arbitrary Commands PLATFORM: Struts 2.0.0 - Struts 2.3.1.1 ABSTRACT: A remote user can execute arbitrary code...

  13. Preliminary Project Execution Plan for the Remote-Handled Low-Level Waste Disposal Project

    SciTech Connect (OSTI)

    David Duncan

    2011-05-01

    This preliminary project execution plan (PEP) defines U.S. Department of Energy (DOE) project objectives, roles and responsibilities of project participants, project organization, and controls to effectively manage acquisition of capital funds for construction of a proposed remote-handled low-level waste (LLW) disposal facility at the Idaho National Laboratory (INL). The plan addresses the policies, requirements, and critical decision (CD) responsibilities identified in DOE Order 413.3B, 'Program and Project Management for the Acquisition of Capital Assets.' This plan is intended to be a 'living document' that will be periodically updated as the project progresses through the CD process to construction and turnover for operation.

  14. U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic...

    Office of Environmental Management (EM)

    59: RSA BSAFE SSL-C Lets Remote Users Decrypt SSLTLS Traffic and SSL Buffer Overflow Lets Remote Users Execute Arbitrary Code U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL...

  15. U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Buffer Overflow Lets Remote Users Execute Arbitrary Code | Department of Energy 59: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL Buffer Overflow Lets Remote Users Execute Arbitrary Code U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL Buffer Overflow Lets Remote Users Execute Arbitrary Code September 13, 2012 - 6:00am Addthis PROBLEM: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL Buffer Overflow Lets Remote Users Execute

  16. Remote-Handled Low-Level Waste (RHLLW) Disposal Project Code of Record

    SciTech Connect (OSTI)

    S.L. Austad, P.E.; L.E. Guillen, P.E.; C. W. McKnight, P.E.; D. S. Ferguson, P.E.

    2010-10-01

    The Remote-Handled Low-Level Waste Disposal Project addresses an anticipated shortfall in remote-handled LLW disposal capability following cessation of operations at the existing facility, which will continue until it is full or until it must be closed in preparation for final remediation of the Subsurface Disposal Area (approximately at the end of fiscal year 2015). Development of a new onsite disposal facility, the highest ranked alternative, will provide necessary remote handled LLW disposal capability and will ensure continuity of operations that generate remote-handled LLW. This report documents the Code of Record for design of a new LLW disposal capability.

  17. U-233: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Articles U-083:Oracle Critical Patch Update Advisory - January 2012 V-067: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code T-576: Oracle Solaris Adobe Flash Player...

  18. T-545: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets Remote Users

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Execute Arbitrary Code | Department of Energy 5: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets Remote Users Execute Arbitrary Code T-545: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets Remote Users Execute Arbitrary Code January 28, 2011 - 7:21am Addthis PROBLEM: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets Remote Users Execute Arbitrary Code. PLATFORM: RealPlayer 14.0.1 and prior versions ABSTRACT: A vulnerability was reported in RealPlayer. A remote user can

  19. U-201: HP System Management Homepage Bugs Let Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    The vulnerabilities could be exploited remotely resulting in unauthorized access, disclosure of information, data modification, Denial of Service (DoS), and execution of arbitrary code.

  20. U-082: McAfee SaaS 'myCIOScn.dll' ActiveX Control Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Lets Remote Users Execute Arbitrary Code January 17, 2012 - 1:00pm Addthis PROBLEM: PHP Null Pointer Dereference in zendstrndup() Lets Local Users Deny Service PLATFORM: PHP...

  1. Remote-Handled Low-Level Waste Disposal Project Code of Record

    SciTech Connect (OSTI)

    Austad, S. L.; Guillen, L. E.; McKnight, C. W.; Ferguson, D. S.

    2015-04-01

    The Remote-Handled Low-Level Waste (LLW) Disposal Project addresses an anticipated shortfall in remote-handled LLW disposal capability following cessation of operations at the existing facility, which will continue until it is full or until it must be closed in preparation for final remediation of the Subsurface Disposal Area (approximately at the end of Fiscal Year 2017). Development of a new onsite disposal facility will provide necessary remote-handled LLW disposal capability and will ensure continuity of operations that generate remote-handled LLW. This report documents the Code of Record for design of a new LLW disposal capability. The report is owned by the Design Authority, who can authorize revisions and exceptions. This report will be retained for the lifetime of the facility.

  2. Remote-Handled Low-Level Waste Disposal Project Code of Record

    SciTech Connect (OSTI)

    S.L. Austad, P.E.; L.E. Guillen, P.E.; C. W. McKnight, P.E.; D. S. Ferguson, P.E.

    2012-06-01

    The Remote-Handled Low-Level Waste (LLW) Disposal Project addresses an anticipated shortfall in remote-handled LLW disposal capability following cessation of operations at the existing facility, which will continue until it is full or until it must be closed in preparation for final remediation of the Subsurface Disposal Area (approximately at the end of Fiscal Year 2017). Development of a new onsite disposal facility will provide necessary remote-handled LLW disposal capability and will ensure continuity of operations that generate remote-handled LLW. This report documents the Code of Record for design of a new LLW disposal capability. The report is owned by the Design Authority, who can authorize revisions and exceptions. This report will be retained for the lifetime of the facility.

  3. Remote-Handled Low-Level Waste Disposal Project Code of Record

    SciTech Connect (OSTI)

    S.L. Austad, P.E.; L.E. Guillen, P.E.; C. W. McKnight, P.E.; D. S. Ferguson, P.E.

    2014-06-01

    The Remote-Handled Low-Level Waste (LLW) Disposal Project addresses an anticipated shortfall in remote-handled LLW disposal capability following cessation of operations at the existing facility, which will continue until it is full or until it must be closed in preparation for final remediation of the Subsurface Disposal Area (approximately at the end of Fiscal Year 2017). Development of a new onsite disposal facility will provide necessary remote-handled LLW disposal capability and will ensure continuity of operations that generate remote-handled LLW. This report documents the Code of Record for design of a new LLW disposal capability. The report is owned by the Design Authority, who can authorize revisions and exceptions. This report will be retained for the lifetime of the facility.

  4. Remote-Handled Low-Level Waste Disposal Project Code of Record

    SciTech Connect (OSTI)

    S.L. Austad, P.E.; L.E. Guillen, P.E.; C. W. McKnight, P.E.; D. S. Ferguson, P.E.

    2012-04-01

    The Remote-Handled Low-Level Waste (LLW) Disposal Project addresses an anticipated shortfall in remote-handled LLW disposal capability following cessation of operations at the existing facility, which will continue until it is full or until it must be closed in preparation for final remediation of the Subsurface Disposal Area (approximately at the end of Fiscal Year 2017). Development of a new onsite disposal facility will provide necessary remote-handled LLW disposal capability and will ensure continuity of operations that generate remote-handled LLW. This report documents the Code of Record for design of a new LLW disposal capability. The report is owned by the Design Authority, who can authorize revisions and exceptions. This report will be retained for the lifetime of the facility.

  5. Remote-Handled Low-Level Waste Disposal Project Code of Record

    SciTech Connect (OSTI)

    S.L. Austad, P.E.; L.E. Guillen, P.E.; C. W. McKnight, P.E.; D. S. Ferguson, P.E.

    2011-04-01

    The Remote-Handled Low-Level Waste (LLW) Disposal Project addresses an anticipated shortfall in remote-handled LLW disposal capability following cessation of operations at the existing facility, which will continue until it is full or until it must be closed in preparation for final remediation of the Subsurface Disposal Area (approximately at the end of Fiscal Year 2017). Development of a new onsite disposal facility, the highest ranked alternative, will provide necessary remote-handled LLW disposal capability and will ensure continuity of operations that generate remote-handled LLW. This report documents the Code of Record for design of a new LLW disposal capability. The report is owned by the Design Authority, who can authorize revisions and exceptions. This report will be retained for the lifetime of the facility.

  6. Remote-Handled Low-Level Waste Disposal Project Code of Record

    SciTech Connect (OSTI)

    S.L. Austad, P.E.; L.E. Guillen, P.E.; C. W. McKnight, P.E.; D. S. Ferguson, P.E.

    2011-01-01

    The Remote-Handled Low-Level Waste (LLW) Disposal Project addresses an anticipated shortfall in remote-handled LLW disposal capability following cessation of operations at the existing facility, which will continue until it is full or until it must be closed in preparation for final remediation of the Subsurface Disposal Area (approximately at the end of Fiscal Year 2017). Development of a new onsite disposal facility, the highest ranked alternative, will provide necessary remote-handled LLW disposal capability and will ensure continuity of operations that generate remote-handled LLW. This report documents the Code of Record for design of a new LLW disposal capability. The report is owned by the Design Authority, who can authorize revisions and exceptions. This report will be retained for the lifetime of the facility.

  7. V-066: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6: Adobe AcrobatReader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges V-066: Adobe AcrobatReader Multiple Flaws Lets Remote...

  8. U-048: HP LaserJet Printers Unspecified Flaw Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    T-699: EMC AutoStart Buffer Overflows Let Remote Users Execute Arbitrary Code U-049: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users Inject Commands on the Target System...

  9. U-239: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or ...

  10. V-049: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Execute Arbitrary Code | Department of Energy 9: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users Execute Arbitrary Code V-049: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users Execute Arbitrary Code December 18, 2012 - 1:30am Addthis PROBLEM: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users Execute Arbitrary Code PLATFORM: Windows RealPlayer 15.0.6.14 and prior. ABSTRACT: Two vulnerabilities were reported in RealPlayer. REFERENCE

  11. V-228: RealPlayer Buffer Overflow and Memory Corruption Error Let Remote

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Users Execute Arbitrary Code | Department of Energy 8: RealPlayer Buffer Overflow and Memory Corruption Error Let Remote Users Execute Arbitrary Code V-228: RealPlayer Buffer Overflow and Memory Corruption Error Let Remote Users Execute Arbitrary Code August 27, 2013 - 6:00am Addthis PROBLEM: Two vulnerabilities were reported in RealPlayer PLATFORM: RealPlayer 16.0.2.32 and prior ABSTRACT: A remote user can cause arbitrary code to be executed on the target user's system REFERENCE LINKS:

  12. Project Execution Plan for the Remote Handled Low-Level Waste Disposal Project

    SciTech Connect (OSTI)

    Danny Anderson

    2014-07-01

    As part of ongoing cleanup activities at the Idaho National Laboratory (INL), closure of the Radioactive Waste Management Complex (RWMC) is proceeding under the Comprehensive Environmental Response, Compensation, and Liability Act (42 USC 9601 et seq. 1980). INL-generated radioactive waste has been disposed of at RWMC since 1952. The Subsurface Disposal Area (SDA) at RWMC accepted the bulk of INL’s contact and remote-handled low-level waste (LLW) for disposal. Disposal of contact-handled LLW and remote-handled LLW ion-exchange resins from the Advanced Test Reactor in the open pit of the SDA ceased September 30, 2008. Disposal of remote-handled LLW in concrete disposal vaults at RWMC will continue until the facility is full or until it must be closed in preparation for final remediation of the SDA (approximately at the end of fiscal year FY 2017). The continuing nuclear mission of INL, associated ongoing and planned operations, and Naval spent fuel activities at the Naval Reactors Facility (NRF) require continued capability to appropriately dispose of contact and remote handled LLW. A programmatic analysis of disposal alternatives for contact and remote-handled LLW generated at INL was conducted by the INL contractor in Fiscal Year 2006; subsequent evaluations were completed in Fiscal Year 2007. The result of these analyses was a recommendation to the Department of Energy (DOE) that all contact-handled LLW generated after September 30, 2008, be disposed offsite, and that DOE proceed with a capital project to establish replacement remote-handled LLW disposal capability. An analysis of the alternatives for providing replacement remote-handled LLW disposal capability has been performed to support Critical Decision-1. The highest ranked alternative to provide this required capability has been determined to be the development of a new onsite remote-handled LLW disposal facility to replace the existing remote-handled LLW disposal vaults at the SDA. Several offsite DOE

  13. U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    overflow CVE-2012-0670. A specially crafted '.pict' file can trigger a memory corruption error CVE-2012-0671. Impact: A remote user can create a file that, when loaded by...

  14. U-149: Apache OFBiz Cross-Site Scripting and Code Execution Vulnerabil...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    code in a user's browser session in context of an affected site. 2) Certain input ... code in a user's browser session in context of an affected site. 3) Certain input ...

  15. U-064: Adobe Acrobat/Reader PRC Memory Corruption Error Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Adobe Acrobat/Reader, this vulnerability is being actively exploited against Windows-based systems.

  16. U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ID: 1026774 Apple Security Updates About the security content of iOS 5.1 Software Update CVE-2012-0641, CVE-2012-0642, CVE-2012-0643, CVE-2011-3453, CVE-2012-0644, CVE-2012-0585,...

  17. T-574: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact while others can be exploited by malicious people bypass certain security restrictions, disclose system information, and compromise a user's system.

  18. U-055: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Two vulnerabilities exploited by the Intevydis vd_adobe_fp module in VulnDisco Step Ahead were reported in Adobe Flash Player.

  19. T-569: Adobe Flash SWF File Processing Memory Corruption Remote Code Execution Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE)

    Critical vulnerabilities have been identified in Adobe Flash Player 10.1.102.64 and earlier versions for Windows, Macintosh, Linux, and Solaris. These vulnerabilities could cause the application to crash and could potentially allow an attacker to take control of the affected system.

  20. U-119: Blackberry PlayBook Unspecified WebKit Bug Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7.1, and BlackBerry PlayBook tablet software ABSTRACT: A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's...

  1. V-109: Google Chrome WebKit Type Confusion Error Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Google Chrome WebKit Type Confusion Error Lets Remote Users Execute Arbitrary Code PLATFORM: Google Chrome prior to 25.0.1364.160 ABSTRACT: A vulnerability was reported in...

  2. U-148: ActiveScriptRuby GRScript18.dll ActiveX Control Ruby Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to an error in GRScript18.dll and can be exploited to execute arbitrary Ruby commands.

  3. T-615: IBM Rational System Architect ActiveBar ActiveX Control Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    There is a high risk security vulnerability with the ActiveBar ActiveX controls used by IBM Rational System Architect.

  4. V-220: Juniper Security Threat Response Manager Lets Remote Authentica...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Threat Response Manager Lets Remote Authenticated Users Execute Arbitrary Commands V-220: Juniper Security Threat Response Manager Lets Remote Authenticated Users Execute...

  5. Executive Summary

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Executive Positions Our executive corps is comprised of members of our Senior Executive Service and Pay Band V of the Excepted Service. Our executives use their extensive experience in scientific, engineering, program management or administrative leadership to make decisions that touch the lives of Americans every day. Senior Executive Service Other Executive Positions Learn More Senior Executive Service Other Executive Positions

    Executive Secretariat Executive Secretariat The Office of the

  6. SES Executive Development

    Broader source: Energy.gov [DOE]

    Development continues once an individual enters into the SES. Faced with constant challenges, changing technologies and a fluid environment, executives need to pursue ongoing professional executive development. It is crucial that executives continue to strengthen and reinforce their Executive Core Qualifications (ECQs), skills and knowledge. http://www.opm.gov/ses/executive_development/index.asp Federal agencies are required by law (Title 5, U.S. Code, Section 3396) to establish programs for the continuing development of senior executives. DOE’s Office of Learning & Workforce Development is available to assist you in determining a course of action your executive development. They have a guidebook that “contains descriptions of over 350 courses, offered by 56 colleges and universities throughout the continental United States as well as by the Office of Personnel Management.”

  7. Executive Summary: Executive Summary

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Executive Summary - On the Path to SunShot Executive Summary - On the Path to SunShot The halfway mark of the SunShot Initiative's 2020 target date is a good time to take stock: How much progress has been made? What have we learned? What barriers and opportunities must still be addressed to ensure that solar technologies achieve cost parity in 2020 and realize their full potential in the decades beyond? To answer these questions, the Solar Energy Technology Office launched the On the Path to

  8. Executive Director

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Executive Director Dave Lyons, Executive Director, leads institutional initiatives and provides oversight for numerous Laboratory organizations. Contact Operator Los Alamos National Laboratory (505) 667-5061 David C. Lyons Dave Lyons, Executive Director David C. Lyons became Los Alamos National Laboratory Executive Director in April 2016. He leads institutional initiatives and provides oversight for several Laboratory organizations, including Chief Financial Officer Chief Information Officer

  9. Securing mobile code.

    SciTech Connect (OSTI)

    Link, Hamilton E.; Schroeppel, Richard Crabtree; Neumann, William Douglas; Campbell, Philip LaRoche; Beaver, Cheryl Lynn; Pierson, Lyndon George; Anderson, William Erik

    2004-10-01

    If software is designed so that the software can issue functions that will move that software from one computing platform to another, then the software is said to be 'mobile'. There are two general areas of security problems associated with mobile code. The 'secure host' problem involves protecting the host from malicious mobile code. The 'secure mobile code' problem, on the other hand, involves protecting the code from malicious hosts. This report focuses on the latter problem. We have found three distinct camps of opinions regarding how to secure mobile code. There are those who believe special distributed hardware is necessary, those who believe special distributed software is necessary, and those who believe neither is necessary. We examine all three camps, with a focus on the third. In the distributed software camp we examine some commonly proposed techniques including Java, D'Agents and Flask. For the specialized hardware camp, we propose a cryptographic technique for 'tamper-proofing' code over a large portion of the software/hardware life cycle by careful modification of current architectures. This method culminates by decrypting/authenticating each instruction within a physically protected CPU, thereby protecting against subversion by malicious code. Our main focus is on the camp that believes that neither specialized software nor hardware is necessary. We concentrate on methods of code obfuscation to render an entire program or a data segment on which a program depends incomprehensible. The hope is to prevent or at least slow down reverse engineering efforts and to prevent goal-oriented attacks on the software and execution. The field of obfuscation is still in a state of development with the central problem being the lack of a basis for evaluating the protection schemes. We give a brief introduction to some of the main ideas in the field, followed by an in depth analysis of a technique called 'white-boxing'. We put forth some new attacks and improvements

  10. Executive Summary

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Executive Summary September 2015 Quadrennial Technology Review ES Executive Summary ES Executive Summary Introduction The United States is in the midst of an energy revolution. Over the last decade, the United States has slashed net petroleum imports, dramatically increased shale gas production, scaled up wind and solar power, and cut the growth in electricity consumption to nearly zero through widespread efficiency measures. Emerging advanced energy technologies provide a rich set of options to

  11. Executive Summary

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Executive Orders Defining Tribal Relationships Executive Orders Defining Tribal Relationships Executive Order 13592 Improving American Indian and Alaska Native Educational Opportunities and Strengthening Tribal Colleges and Universities (2011). Superseded EO 13021 to ensure that all American Indian students, regardless of which institution they attend, receive support from the federal government at elementary through college levels. This EO also creates an Interagency Working Group on AI/AN

  12. T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    An attacker can exploit this issue by enticing an unsuspecting victim into visiting a malicious website.

  13. T-660: OpenSSH on FreeBSD Has Buffer Overflow in pam_thread() That Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    The module does not adequately validate user input leading to an cross-site scripting (XSS) possibility in certain circumstances.

  14. Self-assembled software and method of overriding software execution

    DOE Patents [OSTI]

    Bouchard, Ann M.; Osbourn, Gordon C.

    2013-01-08

    A computer-implemented software self-assembled system and method for providing an external override and monitoring capability to dynamically self-assembling software containing machines that self-assemble execution sequences and data structures. The method provides an external override machine that can be introduced into a system of self-assembling machines while the machines are executing such that the functionality of the executing software can be changed or paused without stopping the code execution and modifying the existing code. Additionally, a monitoring machine can be introduced without stopping code execution that can monitor specified code execution functions by designated machines and communicate the status to an output device.

  15. EXECUTIVE SUMMARY

    National Nuclear Security Administration (NNSA)

    FUSION ENERGY SCIENCE ADVISORY COMMITTEE Panel on High Energy Density Laboratory Plasmas ADVANCING THE SCIENCE OF HIGH ENERGY DENSITY LABORATORY PLASMAS January 2009 UNITED STATES DEPARTMENT OF ENERGY 1 TABLE OF CONTENTS EXECUTIVE SUMMARY.......................................................................................... 5 1 HIGH ENERGY DENSITY LABORATORY PLASMA SCIENCE .................................... 15 2 THE CHARGE TO FESAC

  16. Compiling Codes on Cori

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    wrappers will automatically link codes with MPI libraries and other Cray system software. ... NOTE: The intention is that programs are compiled on the login nodes and executed on the ...

  17. Compiling Codes on Hopper

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    wrappers will automatically link codes with MPI libraries and other Cray system software. ... NOTE: The intention is that programs are compiled on the login nodes and executed on the ...

  18. U-137: HP Performance Manager Unspecified Bug Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    vulnerability has been identified with HP Performance Manager running on HP-UX, Linux, Solaris, and Windows. The vulnerability could be exploited remotely to execute...

  19. Senior Executive Service | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Senior Executive Service

  20. Implementing Executive Order 13423

    Broader source: Energy.gov [DOE]

    Guide describes the instructions on the requirements and how fleets should implement the Executive Order 13423.

  1. U-049: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    LaserJet Printers Unspecified Flaw Lets Remote Users Update Firmware with Arbitrary Code U-053: Linux kexec Bugs Let Local and Remote Users Obtain Potentially Sensitive Information

  2. Sample Project Execution Plan

    Office of Energy Efficiency and Renewable Energy (EERE)

    The project execution plan (PEP) is the governing document that establishes the means to execute, monitor, and control projects.  The plan serves as the main communication vehicle to ensure that...

  3. Writing Effective Executive Accomplishment Narratives Executive...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    you overcame * Use first person, past tense and non-jargon terms; PRB members may not ... it is an executive who: o Demonstrates the high level of performance expected and actions ...

  4. Tabled Execution in Scheme

    SciTech Connect (OSTI)

    Willcock, J J; Lumsdaine, A; Quinlan, D J

    2008-08-19

    Tabled execution is a generalization of memorization developed by the logic programming community. It not only saves results from tabled predicates, but also stores the set of currently active calls to them; tabled execution can thus provide meaningful semantics for programs that seemingly contain infinite recursions with the same arguments. In logic programming, tabled execution is used for many purposes, both for improving the efficiency of programs, and making tasks simpler and more direct to express than with normal logic programs. However, tabled execution is only infrequently applied in mainstream functional languages such as Scheme. We demonstrate an elegant implementation of tabled execution in Scheme, using a mix of continuation-passing style and mutable data. We also show the use of tabled execution in Scheme for a problem in formal language and automata theory, demonstrating that tabled execution can be a valuable tool for Scheme users.

  5. U-026: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject Commands

    Broader source: Energy.gov [DOE]

    A remote user can create a URL that, when loaded by the target authenticated administrative user, will execute arbitrary commands on the target system.

  6. Shared prefetching to reduce execution skew in multi-threaded...

    Office of Scientific and Technical Information (OSTI)

    of data into a shared memory of a computing device that is shared by a plurality of threads that execute on the computing device. A memory stream of a portion of code ...

  7. Remote Access

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Remote Access Remote Access Laboratory employees can access Research Library databases and products from offsite using our EZproxy service. This service is limited to LANL employees with active Z numbers and cryptocards. Access Electronic Collections with EZproxy Remote Access Journals - Books - Standards - Databases (WOK, etc) How to use EZproxy: From this page: Click on the icon above. From external site: Select "OFFSITE LANL Employee". Enter your Z number and Cryptocard passcode.

  8. Users' Executive Committee

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Users' Executive Committee Print The ALS Users' Executive Committee (UEC) is responsible for conveying the concerns and interests of users to ALS management. Members are elected annually by ALS users. To contact a member of the UEC, please email This e-mail address is being protected from spambots. You need JavaScript enabled to view it . ALS Users' Executive Committee Web Site ALS Users' Association Charter The current members of the committee (with terms), as of January 1, 2016, are David

  9. Users' Executive Committee

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Users' Executive Committee Print The ALS Users' Executive Committee (UEC) is responsible for conveying the concerns and interests of users to ALS management. Members are elected annually by ALS users. To contact a member of the UEC, please email This e-mail address is being protected from spambots. You need JavaScript enabled to view it . ALS Users' Executive Committee Web Site ALS Users' Association Charter The current members of the committee (with terms), as of January 1, 2016, are David

  10. LTS Execution - Hanford Site

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Execution About Us Hanford Cultural Resources LTS Home Page LTS Project Management LTS Transition and Timeline LTS Execution LTS Background LTS Information Management LTS Fact Sheets / Briefings LTS In The News LTS Related Links LTS Contact Us LTS Execution Email Email Page | Print Print Page | Text Increase Font Size Decrease Font Size The Hanford LTS Program is described in the Hanford LTS Program Plan and includes two distinct elements: Transition process is a disciplined process that is used

  11. CBECS 1995 - Executive Summary

    U.S. Energy Information Administration (EIA) Indexed Site

    Executive Summary The Commercial Buildings Energy Consumption Survey (CBECS) collects information on physical characteristics of commercial buildings, building use and occupancy...

  12. Stopping executions, saving computers with new malware detection tool

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Saving computers with new malware detection tool Stopping executions, saving computers with new malware detection tool A computer tool that allows the machine to identify malicious executable files without being exposed to their harmful actions. October 21, 2009 Los Alamos National Laboratory sits on top of a once-remote mesa in northern New Mexico with the Jemez mountains as a backdrop to research and innovation covering multi-disciplines from bioscience, sustainable energy sources, to plasma

  13. JC3 Bulletin Archive | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    a critical vulnerability that allows for remote code execution June 12, 2013 V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code A...

  14. JC3 | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    a critical vulnerability that allows for remote code execution June 12, 2013 V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code A...

  15. Executive Branch Management Scorecard | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Branch Management Scorecard Executive Branch Management Scorecard PDF icon Executive Branch Management Scorecard More Documents & Publications Executive Branch Management Scorecard ...

  16. Executive Resources | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Services » Executive Resources Executive Resources Executive Resources provides integrated executive policy and operational personnel support services in a centralized location to the Senior Executive Service (SES), Senior-Level (SL), Scientific and Professional (ST), Excepted Service and political appointees. Click the "Contacts" Link to find a list of HR Specialist by the organizations they service. HR Contacts The Senior Executive Service (SES) Excepted Service Authorities

  17. Budget Formulation & Execution

    Broader source: Energy.gov [DOE]

    The mission of the Office of Budget (CF-30) is to plan for, formulate, execute, analyze, and defend the Department of Energy's budget; to manage the corporate funds control process; and to serve as...

  18. Infrastructure Security Executive Summary

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Executive Summary Energy, Climate, and Infrastructure Executive Summary / 3 Message from the VP Rick Stulen, Vice President Energy, Climate, & Infrastructure Security SMU Access to reliable, affordable, and sustainable sources of energy is essential for all modern economies. Since the late 1950s, we Americans have not been energy self-sufficient. Our addiction to foreign oil and fossil fuels puts our economy, our environment, and ultimately our national security at risk. Furthermore, there

  19. Data processing with microcode designed with source coding

    DOE Patents [OSTI]

    McCoy, James A; Morrison, Steven E

    2013-05-07

    Programming for a data processor to execute a data processing application is provided using microcode source code. The microcode source code is assembled to produce microcode that includes digital microcode instructions with which to signal the data processor to execute the data processing application.

  20. T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    execute arbitrary code. 4) An error within the internal memory mapping of non-local JavaScript variables can be exploited to cause a buffer overflow and potentially execute...

  1. Executive Order 13423 Implementing Instructions

    Broader source: Energy.gov [DOE]

    INSTRUCTIONS FOR IMPLEMENTING EXECUTIVE ORDER 13423“Strengthening Federal Environmental, Energy, and Transportation Management”

  2. STEP Participant Survey Executive Summary

    Broader source: Energy.gov [DOE]

    STEP Participant Survey Executive Summary, from the Tool Kit Framework: Small Town University Energy Program (STEP).

  3. Shared prefetching to reduce execution skew in multi-threaded systems

    DOE Patents [OSTI]

    Eichenberger, Alexandre E; Gunnels, John A

    2013-07-16

    Mechanisms are provided for optimizing code to perform prefetching of data into a shared memory of a computing device that is shared by a plurality of threads that execute on the computing device. A memory stream of a portion of code that is shared by the plurality of threads is identified. A set of prefetch instructions is distributed across the plurality of threads. Prefetch instructions are inserted into the instruction sequences of the plurality of threads such that each instruction sequence has a separate sub-portion of the set of prefetch instructions, thereby generating optimized code. Executable code is generated based on the optimized code and stored in a storage device. The executable code, when executed, performs the prefetches associated with the distributed set of prefetch instructions in a shared manner across the plurality of threads.

  4. Detection of malicious computer executables

    DOE Patents [OSTI]

    Cai, Dongming M.; Gokhale, Maya

    2009-04-14

    A method of detecting malicious binary executable files is accomplished by inputting a binary executable file; converting the binary executable file to byte hexadecimal text strings; calculating the frequency of each byte pattern in the byte hexadecimal text strings; selecting characteristic byte pattern frequencies as discriminating features; classifying the discriminating features as malicious or benign; labeling the binary executable file as malicious or benign; and outputting the labeled malicious or benign binary executable file.

  5. Executive Energy Leadership Academy Alumni

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Executive Committee Meeting Executive Committee Meeting September 7, 2016 6:00PM to 7:30PM EDT The Oak Ridge Site Specific Advisory Board's Executive Committee meeting is open

    Executive Energy Leadership Academy Alumni Since its inception in 2007, decision-makers throughout the country have participated in NREL's Executive Energy Leadership Academy. The following is a list of alumni sorted by program and year. Leadership Program 2015 Participants * Samuel Anderson, Colorado Department of

  6. Tandem Mirror Reactor Systems Code (Version I)

    SciTech Connect (OSTI)

    Reid, R.L.; Finn, P.A.; Gohar, M.Y.; Barrett, R.J.; Gorker, G.E.; Spampinaton, P.T.; Bulmer, R.H.; Dorn, D.W.; Perkins, L.J.; Ghose, S.

    1985-09-01

    A computer code was developed to model a Tandem Mirror Reactor. Ths is the first Tandem Mirror Reactor model to couple, in detail, the highly linked physics, magnetics, and neutronic analysis into a single code. This report describes the code architecture, provides a summary description of the modules comprising the code, and includes an example execution of the Tandem Mirror Reactor Systems Code. Results from this code for two sensitivity studies are also included. These studies are: (1) to determine the impact of center cell plasma radius, length, and ion temperature on reactor cost and performance at constant fusion power; and (2) to determine the impact of reactor power level on cost.

  7. Compiling Codes

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    wrappers will automatically provide the necessary MPI include files and libraries. For Fortran source code use mpif90: % mpif90 -o example.x example.f90 For C source code use...

  8. Business Model Guide Executive Summary

    Broader source: Energy.gov [DOE]

    The Business Model Guide Executive Summary by the U.S. Department of Energy's Better Buildings Neighborhood Program.

  9. STEP Participant Survey Executive Summary

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Executive S ummary 1 Executive S ummary 2 Executive Summary of Findings July 26th, 2013 Prepared by Jeff Henn Executive S ummary 3 Background information on Baltimore Research Founded in 1960, Baltimore Research is a 53-year old, full service marketing research firm and focus facility located in Towson, MD. We provide research consultation, research design, data collection, analysis, field management, and recruiting and focus facilities. The company offers both qualitative and quantitative

  10. NUG Executive Committee (NUGEX)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    NUGEX NUG Executive Committee (NUGEX) NUGEX is the voice of the user community to NERSC and DOE. While all NUG events are open to all NERSC users, NUGEX members regularly participate in the monthly teleconferences and the annual face-to-face meeting. NUGEX is consulted on many NERSC policy issues, e.g., batch configurations, disk quotas, services and training offerings. Members of NUGEX also participate in their office's NERSC Requirements Reviews of High Performance Computing and Storage. There

  11. Integrating Program Component Executables

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Integrating Program Component Executables on Distributed Memory Architectures via MPH Chris Ding and Yun He Computational Research Division, Lawrence Berkeley National Laboratory University of California, Berkeley, CA 94720, USA chqding@lbl.gov, yhe@lbl.gov Abstract A growing trend in developing large and complex ap- plications on today's Teraflop computers is to integrate stand-alone and/or semi-independent program components into a comprehensive simulation package. One example is the climate

  12. Office of the Executive Secretariat

    Energy Savers [EERE]

    the Executive Secretariat, MA-70 Acting Director Carol A. Matthews Special Projects Security Policy and Analysis Group Programmatic Expertise High-level Review and Analysis Correspondence Management Group Correspondence Control & Assignment Correspondence Support FOIA Management Special Projects Receiving and Delivery Administration and Executive Commitments Group eDOCS Executive Commitments Information Management Budget Personnel Administration Office of History and Heritage Resources

  13. V-177: VMware vCenter Chargeback Manager File Upload Handling Vulnerability

    Broader source: Energy.gov [DOE]

    The vCenter Chargeback Manager contains a critical vulnerability that allows for remote code execution

  14. U-122 Google Chrome Two Code Execution Vulnerabilities

    Broader source: Energy.gov [DOE]

    Two vulnerabilities have been reported in Google Chrome, which can be exploited by malicious people to compromise a user's system.

  15. Executive Order 13423: Strengthening Federal Environmental, Energy...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Executive Order 13423: Strengthening Federal Environmental, Energy, and Transportation Management Executive Order 13423: Strengthening Federal Environmental, Energy, and ...

  16. National Ignition Facility project execution plan

    SciTech Connect (OSTI)

    Paisner, J., LLNL

    1997-08-01

    This project execution plan covers: Justification of Mission Need; Project Description; Management Roles and Responsibilities; Project Execution; Method of Accomplishment.

  17. Writing Effective Executive Accomplishment Narratives Executive Accomplishment Narrative (EAN)

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Executive Accomplishment Narratives Executive Accomplishment Narrative (EAN) At the end of the performance cycle, all career and limited term SES members who have been on a performance plan for a minimum of 90 days must provide an EAN that highlights the results achieved as it relates to the performance requirements and organizational results in ePerformance. While the completion of an Executive Accomplishment Narrative is optional for non-career SES members, it is strongly recommended. This

  18. South Dakota PrairieWinds Project Executive Summary Executive Summary

    Office of Environmental Management (EM)

    PrairieWinds Project Executive Summary Executive Summary This executive summary is included in the beginning of the Draft Environmental Impact Statement (DEIS) for the South Dakota PrairieWinds Project (Proposed Project) and is also intended to serve as a stand-alone document to provide a summary of the information contained within the full text version of the DEIS. For additional information on the topics contained within this summary please see the DEIS. S.1 INTRODUCTION Basin Electric Power

  19. Multiple node remote messaging

    DOE Patents [OSTI]

    Blumrich, Matthias A.; Chen, Dong; Gara, Alan G.; Giampapa, Mark E.; Heidelberger, Philip; Ohmacht, Martin; Salapura, Valentina; Steinmacher-Burow, Burkhard; Vranas, Pavlos

    2010-08-31

    A method for passing remote messages in a parallel computer system formed as a network of interconnected compute nodes includes that a first compute node (A) sends a single remote message to a remote second compute node (B) in order to control the remote second compute node (B) to send at least one remote message. The method includes various steps including controlling a DMA engine at first compute node (A) to prepare the single remote message to include a first message descriptor and at least one remote message descriptor for controlling the remote second compute node (B) to send at least one remote message, including putting the first message descriptor into an injection FIFO at the first compute node (A) and sending the single remote message and the at least one remote message descriptor to the second compute node (B).

  20. Executive Secretariat | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Executive Secretariat Executive Secretariat The Office of the Executive Secretariat manages the Department's top-level written communications, such as letters, information, action, and decision memos, and Congressional Reports. These form a key component of the Department's interaction with the White House, Congress, other governmental agencies, and the public. Every communication that leaves DOE is an opportunity to promote this Department's and this Administration's strategic mission. Items

  1. About the Senior Executive Service

    Broader source: Energy.gov [DOE]

    The Senior Executive Service (SES) was established by Title IV of the Civil Service Reform Act (CSRA) of 1978 [P.L. 95-454, October 13, 1978] and became effective on July 13, 1979. The CSRA envisioned a Senior Executive Service whose members shared values, a broad perspective of Government, and solid executive skills. Members of a “corporate SES” respected and embraced the dynamics of American democracy - an approach to governance that provided a continuing vehicle for change.

  2. Boise State University: Executive Summary

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Executive Summary With record growth in the wind energy industry and the increasing discussion of ... but also to educate our younger population about the benefits and utility of ...

  3. Risk Code?

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Identify the Task Risk Code >2 Determine if a Work Control Document is needed What is the Unmitigated Risk Code? Rev.1 09/05/14 Read and Agree to Comply with appropriate mitigation and sign Work Control Documents Is there an approved Work Control Document (WCD)? WORK PLANNING, CONTROL AND AUTHORIZATION FLOW DIAGRAM 1. Define Scope of Work 2. Analyze Hazards 3. Develop and Implement Hazard Controls 4. Perform Work Within Controls 5. Feedback and Continuous Improvement Analyze Hazards and

  4. Executive Summary | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Executive Summary Executive Summary How clean energy investments can be used to spur local economic development. Spurring Local Economic Development with Clean Energy Investments: Lessons from the Field (683.52 KB) More Documents & Publications Spurring Local Economic Development with Clean Energy Investments spurring_local_economic_development_clean_energy_programs.doc Pennsylvania Recovery Act State Memo

  5. Speech coding

    SciTech Connect (OSTI)

    Ravishankar, C., Hughes Network Systems, Germantown, MD

    1998-05-08

    Speech is the predominant means of communication between human beings and since the invention of the telephone by Alexander Graham Bell in 1876, speech services have remained to be the core service in almost all telecommunication systems. Original analog methods of telephony had the disadvantage of speech signal getting corrupted by noise, cross-talk and distortion Long haul transmissions which use repeaters to compensate for the loss in signal strength on transmission links also increase the associated noise and distortion. On the other hand digital transmission is relatively immune to noise, cross-talk and distortion primarily because of the capability to faithfully regenerate digital signal at each repeater purely based on a binary decision. Hence end-to-end performance of the digital link essentially becomes independent of the length and operating frequency bands of the link Hence from a transmission point of view digital transmission has been the preferred approach due to its higher immunity to noise. The need to carry digital speech became extremely important from a service provision point of view as well. Modem requirements have introduced the need for robust, flexible and secure services that can carry a multitude of signal types (such as voice, data and video) without a fundamental change in infrastructure. Such a requirement could not have been easily met without the advent of digital transmission systems, thereby requiring speech to be coded digitally. The term Speech Coding is often referred to techniques that represent or code speech signals either directly as a waveform or as a set of parameters by analyzing the speech signal. In either case, the codes are transmitted to the distant end where speech is reconstructed or synthesized using the received set of codes. A more generic term that is applicable to these techniques that is often interchangeably used with speech coding is the term voice coding. This term is more generic in the sense that the

  6. Executive Order 13673 | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    673 Executive Order 13673 Executive Order 13673, proposed Federal Acquisition Regulation rule, and proposed Department of Labor guidance are available at: Executive Order 13673 Proposed Federal Acquisition Regulation Rule Proposed Department of Labor Guidance Informational slides about the Executive Order are available below: Executive Order 13673 (176.38 KB)

  7. Compiling Codes

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Compiling Codes Compiling Codes Overview Open Mpi is the the only MPI library available on Euclid. This implementation of MPI-2 is described at Open MPI: Open Source High Performance Computing. The default compiler suite is from the Portland Group which is loaded by default at login, along with the PGI compiled Open MPI environment. % module list Currently Loaded Modulefiles: 1) pgi/10.8 2) openmpi/1.4.2 Basic Example Open MPI provides a convenient set of wrapper commands which you should use in

  8. Executive Committee meeting | Department of Energy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Executive Committee meeting Executive Committee meeting February 3, 2016 6:00PM to 7:00PM EST The Oak Ridge Site Specific Advisory Board's Executive Committee meeting is open...

  9. Executive Committee Meeting | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Executive Committee Meeting Executive Committee Meeting September 7, 2016 6:00PM to 7:30PM EDT The Oak Ridge Site Specific Advisory Board's Executive Committee meeting is open

  10. Executive Order 12123 | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2123 Executive Order 12123 Document covers the extracted pages of Executive Order 12123. PDF icon eo13123.pdf More Documents & Publications EO 13123-Greening the Government Through ...

  11. Implementation of Executive Order 12114 Environmental Effects...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Implementation of Executive Order 12114 Environmental Effects Abroad of Major Federal Actions: Final Guideline (DOE, 1981) Implementation of Executive Order 12114 Environmental ...

  12. Executive Energy Leadership Academy | NREL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Executive Energy Leadership Academy NREL's Executive Energy Leadership Academy provides non-technical business, governmental, and community leaders throughout the country an opportunity to learn about renewable energy and energy efficiency technologies, analytical tools, and financing to guide their organizations and communities in energy-related decisions and planning. A group of NREL Energy Execs gather around the bottom of a wind turbine with blue skies and fields in the foreground.

  13. Executive Summary | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Executive Summary Executive Summary Introduction The United States is in the midst of an energy revolution. Over the last decade, the United States has slashed net petroleum imports, dramatically increased shale gas production, scaled up wind and solar power, and cut the growth in electricity consumption to nearly zero through widespread efficiency measures. Emerging advanced energy technologies provide a rich set of options to address our energy challenges, but their large-scale deployment

  14. NIF User Group Executive Board

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    executive board NIF User Group Executive Board Professor Don Lamb (Chair) University of Chicago Professor Farhat Beg (Vice Chair) University of California, San Diego Professor Justin Wark (Past Chair) University of Oxford Dr. Riccardo Betti University of Rochester Dr. Kirk Flippo Los Alamos National Laboratory Professor Gianluca Gregori University of Oxford Professor Michel Koenig École Polytechnique Dr. Chikang Li Massachusetts Institute of Technology Dr. Jena Meinecke Young Researcher:

  15. code release

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    code release - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Energy Defense Waste Management Programs Advanced Nuclear Energy

  16. Identification coding schemes for modulated reflectance systems

    DOE Patents [OSTI]

    Coates, Don M.; Briles, Scott D.; Neagley, Daniel L.; Platts, David; Clark, David D.

    2006-08-22

    An identifying coding apparatus employing modulated reflectance technology involving a base station emitting a RF signal, with a tag, located remotely from the base station, and containing at least one antenna and predetermined other passive circuit components, receiving the RF signal and reflecting back to the base station a modulated signal indicative of characteristics related to the tag.

  17. DOE Executive Staffing and Recruitment | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    DOE Executive Staffing and Recruitment DOE Executive Staffing and Recruitment DOCUMENTS AVAILABLE FOR DOWNLOAD

  18. Business Development Executive (BDE) Program

    SciTech Connect (OSTI)

    Rice, E.J. "Woody"; Frederick, W. James

    2005-12-05

    The IPST BDE (Institute of Paper Science and Technology Business Development Executive) program was initiated in 1997 to make the paper industry better aware of the new manufacturing technologies being developed at IPST for the U.S. pulp and paper industry's use. In April 2000, the BDE program management and the 20 BDEs, all retired senior level industry manufacturing and research executives, were asked by Ms. Denise Swink of OIT at DOE to take the added responsibility of bringing DOE developed energy conservation technology to the paper industry. This project was funded by a DOE grant of $950,000.

  19. Building Energy Code

    Office of Energy Efficiency and Renewable Energy (EERE)

    The Bureau of Construction Codes is responsible for the administration of the State Construction Code Act (1972 PA 230), also known as the Uniform Construction Code.

  20. Building Energy Code

    Broader source: Energy.gov [DOE]

    Georgia's Department of Community Affairs periodically reviews, amends and/or updates the state minimum standard codes. Georgia has "mandatory" and "permissive" codes. Georgia State Energy Code...

  1. A PVM Executive Program for Use with RELAP5-3D

    SciTech Connect (OSTI)

    Weaver, Walter Leslie; Tomlinson, E. T.; Aumiller, D. L.

    2002-04-01

    A PVM executive program has been developed for use with the RELAP5-3D computer program. The PVM executive allows RELAP5-3D to be coupled with any number of other computer programs to perform integrated analyses of nuclear power reactor systems and related experimental facilities. The executive program manages all phases of a coupled computation. It starts up and configures a virtual machine, spawns all of the coupled processes, coordinates the time step size between the coupled codes, manages the production of printed and plotable output, and shuts the virtual machine down at the end of the computation. The executive program also monitors that status of the coupled computation, repeating time steps as needed and terminating a coupled computation gracefully if one of the coupled processes is terminated by the computational node on which it is executing.

  2. GridRun: A lightweight packaging and execution environment forcompact, multi-architecture binaries

    SciTech Connect (OSTI)

    Shalf, John; Goodale, Tom

    2004-02-01

    GridRun offers a very simple set of tools for creating and executing multi-platform binary executables. These ''fat-binaries'' archive native machine code into compact packages that are typically a fraction the size of the original binary images they store, enabling efficient staging of executables for heterogeneous parallel jobs. GridRun interoperates with existing distributed job launchers/managers like Condor and the Globus GRAM to greatly simplify the logic required launching native binary applications in distributed heterogeneous environments.

  3. Remote reset circuit

    DOE Patents [OSTI]

    Gritzo, Russell E.

    1987-01-01

    A remote reset circuit acts as a stand-alone monitor and controller by clocking in each character sent by a terminal to a computer and comparing it to a given reference character. When a match occurs, the remote reset circuit activates the system's hardware reset line. The remote reset circuit is hardware based centered around monostable multivibrators and is unaffected by system crashes, partial serial transmissions, or power supply transients.

  4. Remote reset circuit

    DOE Patents [OSTI]

    Gritzo, R.E.

    1985-09-12

    A remote reset circuit acts as a stand-along monitor and controller by clocking in each character sent by a terminal to a computer and comparing it to a given reference character. When a match occurs, the remote reset circuit activates the system's hardware reset line. The remote reset circuit is hardware based centered around monostable multivibrators and is unaffected by system crashes, partial serial transmissions, or power supply transients. 4 figs.

  5. Remote Alaskan Communities Energy

    Broader source: Energy.gov (indexed) [DOE]

    Remote Alaskan Communities Energy Efficiency Competition (RACEE) Technical Assistance ... X Alaska Sea Grant Marine Advisory Program Seafood processor plant energy audits, ...

  6. Remote Monitoring Transparency Program

    SciTech Connect (OSTI)

    Sukhoruchkin, V.K.; Shmelev, V.M.; Roumiantsev, A.N.; Croessmann, C.D.; Horton, R.D.; Matter, J.C.; Czajkowski, A.F.; Sheely, K.B.; Bieniawski, A.J.

    1996-12-31

    The objective of the Remote Monitoring Transparency Program is to evaluate and demonstrate the use of remote monitoring technologies to advance nonproliferation and transparency efforts that are currently being developed by Russia and the US without compromising the national security of the participating parties. Under a lab-to-lab transparency contract between Sandia National Laboratories (SNL) and the Kurchatov Institute (KI RRC), the Kurchatov Institute will analyze technical and procedural aspects of the application of remote monitoring as a transparency measure to monitor inventories of direct-use HEU and plutonium (e.g., material recovered from dismantled nuclear weapons). A goal of this program is to assist a broad range of political and technical experts in learning more about remote monitoring technologies that could be used to implement nonproliferation, arms control, and other security and confidence building measures. Specifically, this program will: (1) begin integrating Russian technologies into remote monitoring systems; (2) develop remote monitoring procedures that will assist in the application of remote monitoring techniques to monitor inventories of HEU and Pu from dismantled nuclear weapons; and (3) conduct a workshop to review remote monitoring fundamentals, demonstrate an integrated US/Russian remote monitoring will have on the national security of participating countries.

  7. Remote Systems Design & Deployment

    SciTech Connect (OSTI)

    Bailey, Sharon A.; Baker, Carl P.; Valdez, Patrick LJ

    2009-08-28

    The Pacific Northwest National Laboratory (PNNL) was tasked by Washington River Protection Solutions, LLC (WRPS) to provide information and lessons learned relating to the design, development and deployment of remote systems, particularly remote arm/manipulator systems. This report reflects PNNL’s experience with remote systems and lays out the most important activities that need to be completed to successfully design, build, deploy and operate remote systems in radioactive and chemically contaminated environments. It also contains lessons learned from PNNL’s work experiences, and the work of others in the national laboratory complex.

  8. Building Energy Code

    Office of Energy Efficiency and Renewable Energy (EERE)

    NOTE: On March 9, 2016, the State Fire Prevention and Building Code Council adopted major updates to the State Uniform Code and the State Energy Code. The State Energy Code has been updated to 2015...

  9. Remote actuated valve implant

    DOE Patents [OSTI]

    McKnight, Timothy E; Johnson, Anthony; Moise, Jr., Kenneth J; Ericson, Milton Nance; Baba, Justin S; Wilgen, John B; Evans, III, Boyd McCutchen

    2014-02-25

    Valve implant systems positionable within a flow passage, the systems having an inlet, an outlet, and a remotely activatable valve between the inlet and outlet, with the valves being operable to provide intermittent occlusion of the flow path. A remote field is applied to provide thermal or magnetic activation of the valves.

  10. Remote I/O : fast access to distant storage.

    SciTech Connect (OSTI)

    Foster, I.; Kohr, D., Jr.; Krishnaiyer, R.; Mogill, J.

    1997-12-17

    As high-speed networks make it easier to use distributed resources, it becomes increasingly common that applications and their data are not colocated. Users have traditionally addressed this problem by manually staging data to and from remote computers. We argue instead for a new remote I/O paradigm in which programs use familiar parallel I/O interfaces to access remote file systems. In addition to simplifying remote execution, remote I/O can improve performance relative to staging by overlapping computation and data transfer or by reducing communication requirements. However, remote I/O also introduces new technical challenges in the areas of portability, performance, and integration with distributed computing systems. We propose techniques designed to address these challenges and describe a remote I/O library called RIO that we have developed to evaluate the effectiveness of these techniques. RIO addresses issues of portability by adopting the quasi-standard MPI-IO interface and by defining a RIO device and RIO server within the ADIO abstract I/O device architecture. It addresses performance issues by providing traditional I/O optimizations such as asynchronous operations and through implementation techniques such as buffering and message forwarding to off load communication overheads. RIO uses the Nexus communication library to obtain access to configuration and security mechanisms provided by the Globus wide area computing tool kit. Microbenchmarks and application experiments demonstrate that our techniques achieve acceptable performance in most situations and can improve turnaround time relative to staging.

  11. Executive Order 13423- Strengthening Federal Environmental, Energy...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Environmental, Energy, and Transportation Management Executive Order 13423- Strengthening Federal Environmental, Energy, and Transportation Management It is the policy of ...

  12. Budget Formulation & Execution | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Budget Formulation & Execution Budget Formulation & Execution The mission of the Office of Budget (CF-30) is to plan for, formulate, execute, analyze, and defend the Department of Energy's budget; to manage the corporate funds control process; and to serve as the external liaison for the Department of Energy on matters related to its budget. Functions: Coordinate and manage the Department's budget formulation, presentation, and execution processes. Provide central administration of

  13. Code Seal v 1.0

    Energy Science and Technology Software Center (OSTI)

    2009-12-11

    CodeSeal is a Sandia National Laboratories developed technology that provides a means of securely obfuscating finite state machines in a mathematically provable way. The technology was developed in order to provide a solution for anti-reverse engineering, assured execution, and integrity of execution. CodeSeal accomplishes these goals with the addition of the concept of a trust anchor, a small piece of trust integrated into the system, to the model of code obfuscation. Code obfuscation is anmore » active area of academic research, but most findings have merely demonstrated that general obfuscation is impossible. By modifying the security model such that we may rely on the presence of a small, tamper-protected device, however, Sandia has developed an effective method for obfuscating code. An open publication describing the technology in more detail can be found at http://eprint.iacr.org/2008/184.pdf.Independent Software/Hardware monitors, Use control, Supervisory Control And Data Acquisition (SCADA), Algorithm obfuscation« less

  14. Carlsbad Area Office Executive Summary

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    June 1998 Carlsbad Area Office Executive Summary The mission of the Carlsbad Area Office (CAO) is to protect human health and the environment by opening and operating the Waste Isolation Pilot Plant (WIPP) for safe disposal of transuranic (TRU) waste and by establishing an effective system for management of TRU waste from generation to disposal. It includes personnel assigned to CAO, WIPP site operations, transportation, and other activities associated with the National TRU Program (NTP). The

  15. Executive Committee Member Roster | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Executive Committee Member Roster Executive Committee Member Roster List of NNMCAB members that serve on the Executive Committee ExCom Roster - June 2016 (277.33 KB) More Documents & Publications Environmental Management and Remediation Committee Roster Waste Management Committee Member Roster NNMCAB Membership Roster

  16. Microsoft PowerPoint - Executive Order13423rbl | Department of...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Executive Order13423rbl Microsoft PowerPoint - Executive Order13423rbl PDF icon Microsoft PowerPoint - Executive Order13423rbl More Documents & Publications OPAM Policy Acquisition ...

  17. FEMA - Executive Order11988 - Floodplain Management 1977 | Open...

    Open Energy Info (EERE)

    Order11988 - Floodplain Management 1977 Jump to: navigation, search OpenEI Reference LibraryAdd to library Legal Document- Executive OrderExecutive Order: FEMA - Executive...

  18. Energy-Positive Water Resource Recovery Workshop Report Executive...

    Office of Environmental Management (EM)

    Report Executive Summary Energy-Positive Water Resource Recovery Workshop Report Executive Summary Executive summary workshop report for the for the Energy-Positive Water Resource ...

  19. Remote Access | The Ames Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Ames Laboratory Information Systems supports VPN for remotely accessing internal computers and network services. These are: Once connected remotely to Ames Laboratory,...

  20. Performing aggressive code optimization with an ability to rollback changes made by the aggressive optimizations

    DOE Patents [OSTI]

    Gschwind, Michael K

    2013-07-23

    Mechanisms for aggressively optimizing computer code are provided. With these mechanisms, a compiler determines an optimization to apply to a portion of source code and determines if the optimization as applied to the portion of source code will result in unsafe optimized code that introduces a new source of exceptions being generated by the optimized code. In response to a determination that the optimization is an unsafe optimization, the compiler generates an aggressively compiled code version, in which the unsafe optimization is applied, and a conservatively compiled code version in which the unsafe optimization is not applied. The compiler stores both versions and provides them for execution. Mechanisms are provided for switching between these versions during execution in the event of a failure of the aggressively compiled code version. Moreover, predictive mechanisms are provided for predicting whether such a failure is likely.

  1. Remote Alaskan Communities Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Remote Alaskan Communities Energy Efficiency Competition (RACEE) Technical Assistance Guide March 2016 2 Technical Assistance Table of Contents How to Use this Guide ......................................................... Page 2 Technical Assistance Provider Network ..........................................................Page 2 * Regional Liaisons ..........................................................Page 4 * Regional Liaison Contact List

  2. RH-TRU Waste Content Codes

    SciTech Connect (OSTI)

    Washington TRU Solutions

    2007-07-01

    The Remote-Handled Transuranic (RH-TRU) Content Codes (RH-TRUCON) document describes the inventory of RH-TRU waste within the transportation parameters specified by the Remote-Handled Transuranic Waste Authorized Methods for Payload Control (RH-TRAMPAC).1 The RH-TRAMPAC defines the allowable payload for the RH-TRU 72-B. This document is a catalog of RH-TRU 72-B authorized contents by site. A content code is defined by the following components: A two-letter site abbreviation that designates the physical location of the generated/stored waste (e.g., ID for Idaho National Laboratory [INL]). The site-specific letter designations for each of the sites are provided in Table 1. A three-digit code that designates the physical and chemical form of the waste (e.g., content code 317 denotes TRU Metal Waste). For RH-TRU waste to be transported in the RH-TRU 72-B, the first number of this three-digit code is 3. The second and third numbers of the three-digit code describe the physical and chemical form of the waste. Table 2 provides a brief description of each generic code. Content codes are further defined as subcodes by an alpha trailer after the three-digit code to allow segregation of wastes that differ in one or more parameter(s). For example, the alpha trailers of the subcodes ID 322A and ID 322B may be used to differentiate between waste packaging configurations. As detailed in the RH-TRAMPAC, compliance with flammable gas limits may be demonstrated through the evaluation of compliance with either a decay heat limit or flammable gas generation rate (FGGR) limit per container specified in approved content codes. As applicable, if a container meets the watt*year criteria specified by the RH-TRAMPAC, the decay heat limits based on the dose-dependent G value may be used as specified in an approved content code. If a site implements the administrative controls outlined in the RH-TRAMPAC and Appendix 2.4 of the RH-TRU Payload Appendices, the decay heat or FGGR limits

  3. Building Energy Code

    Office of Energy Efficiency and Renewable Energy (EERE)

    Mississippi's existing state code is based on the 1977 Model Code for Energy Conservation (MCEC). The existing law does not mandate enforcement by localities, and any revised code will probably...

  4. Building Energy Code

    Office of Energy Efficiency and Renewable Energy (EERE)

    The State Building Code Council revised the Washington State Energy Code (WESC) in February 2013, effective July 1, 2013. The WESC is a state-developed code based upon ASHRAE 90.1-2010 and the...

  5. Building Energy Code

    Broader source: Energy.gov [DOE]

    The Kentucky Building Code (KBC) is updated every three years on a cycle one year behind the publication year for the International Building Code. Any changes to the code by the state of Kentucky...

  6. Remote Sensor Placement

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Research Projects Remote Sensor Placement Collaboration between Los Alamos National Laboratory and the University of California at San Diego (UCSD) Jacobs School of Engineering Contact Institute Director Charles Farrar (505) 663-5330 Email UCSD EI Director Michael Todd (858) 534-5951 Professional Staff Assistant Ellie Vigil (505) 667-2818 Email Administrative Assistant Rebecca Duran (505) 665-8899 Email The goal of this work is to develop a new autonomous capability for remotely deploying

  7. Remote electrochemical sensor

    DOE Patents [OSTI]

    Wang, Joseph; Olsen, Khris; Larson, David

    1997-01-01

    An electrochemical sensor for remote detection, particularly useful for metal contaminants and organic or other compounds. The sensor circumvents technical difficulties that previously prevented in-situ remote operations. The microelectrode, connected to a long communications cable, allows convenient measurements of the element or compound at timed and frequent intervals and instrument/sample distances of ten feet to more than 100 feet. The sensor is useful for both downhole groundwater monitoring and in-situ water (e.g., shipboard seawater) analysis.

  8. U-068:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    Vulnerability was reported in FreeBSD Telnet. A remote user can execute arbitrary code on the target system.

  9. U-013: HP Data Protector Multiple Unspecified Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in HP Data Protector. A remote user can execute arbitrary code on the target system.

  10. U-117: Potential security vulnerability has been identified with certain HP printers and HP digital senders

    Broader source: Energy.gov [DOE]

    Remote attackers could execute arbitrary code by using a session on TCP port 9100 to upload a crafted firmware update.

  11. Office of Federal Procurement (OFPP) Determination of Executive...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Federal Procurement (OFPP) Determination of Executive Compensation Benchmark Amount for ... Office of Federal Procurement (OFPP) Determination of Executive Compensation Benchmark ...

  12. 11. CONTRACT ID CODE

    National Nuclear Security Administration (NNSA)

    79120 8. NAME AND ADDRESS OF CONTRACTOR (No., street, county, state, ZIP Code) Babcock & Wilcox Technical Services Pantex, LLC PO Box 30020 Amarillo, TX 79120 CODE I FACILITY ...

  13. Building Energy Code

    Office of Energy Efficiency and Renewable Energy (EERE)

    The Rhode Island Building Code Standards Committee adopts, promulgates and administers the state building code. Compliance is determined through the building permit and inspection process by local...

  14. Building Energy Code

    Broader source: Energy.gov [DOE]

    The North Carolina State Building Code Council is responsible for developing all state codes. By statute, the Commissioner of Insurance has general supervision over the administration and...

  15. Building Energy Code

    Broader source: Energy.gov [DOE]

    The West Virginia State Fire Commission is responsible for adopting and promulgating statewide construction codes. These codes may be voluntarily adopted at the local level. Local jurisdictions...

  16. Building Energy Code

    Broader source: Energy.gov [DOE]

    Public Act 093-0936 (Illinois Energy Conservation Code for Commercial Buildings) was signed into law in August, 2004. The Illinois Energy Conservation Code for Commercial Buildings became...

  17. Building Energy Codes: State and Local Code Implementation Overview

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Mark Lessans Fellow Building Energy Codes: State and Local Code Implementation Overview ... building code regarding energy efficiency to the revised model code and submit a ...

  18. New Code Compliance Briefs Assist in Resolving Codes and Standards...

    Energy Savers [EERE]

    New Code Compliance Briefs Assist in Resolving Codes and Standards Concerns in Energy Innovations New Code Compliance Briefs Assist in Resolving Codes and Standards Concerns in ...

  19. LFRG Execution Plan | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Execution Plan LFRG Execution Plan This Execution Plan (EP) provides guidance for performing Low-Level Waste Disposal Facility Federal Review Group (LFRG) member duties and responsibilities supporting DOE M435.1-1, and subsequent revisions and in fulfilling DOE's Atomic Energy Act (AEA) authority for self-regulation. DOE M435.1-1 and this EP details the framework within which the LFRG performs its regulatory oversight responsibilities. The EP identifies: the qualifications and responsibilities

  20. Remote radiation dosimetry

    DOE Patents [OSTI]

    Braunlich, P.F.; Tetzlaff, W.; Hegland, J.E.; Jones, S.C.

    1991-03-12

    Disclosed are methods and apparatus for remotely measuring radiation levels. Such are particularly useful for measuring relatively high levels or dosages of radiation being administered in radiation therapy. They are also useful for more general radiation level measurements where remote sensing from the remaining portions of the apparatus is desirable. The apparatus uses a beam generator, such as a laser beam, to provide a stimulating beam. The stimulating beam is preferably of wavelengths shorter than 6 microns, or more advantageously less than 2 microns. The stimulating beam is used to stimulate a remote luminescent sensor mounted in a probe which emits stored luminescent energy resulting from exposure of the sensor to ionizing radiation. The stimulating beam is communicated to the remote luminescent sensor via a transmissive fiber which also preferably serves to return the emission from the luminescent sensor. The stimulating beam is advantageously split by a beam splitter to create a detector beam which is measured for power during a reading period during which the luminescent phosphor is read. The detected power is preferably used to control the beam generator to thus produce desired beam power during the reading period. The luminescent emission from the remote sensor is communicated to a suitable emission detector, preferably after filtering or other selective treatment to better isolate the luminescent emission. 8 figures.

  1. Remote radiation dosimetry

    DOE Patents [OSTI]

    Braunlich, Peter F.; Tetzlaff, Wolfgang; Hegland, Joel E.; Jones, Scott C.

    1991-01-01

    Disclosed are methods and apparatus for remotely measuring radiation levels. Such are particularly useful for measuring relatively high levels or dosages of radiation being administered in radiation therapy. They are also useful for more general radiation level measurements where remote sensing from the remaining portions of the apparatus is desirable. The apparatus uses a beam generator, such as a laser beam, to provide a stimulating beam. The stimulating beam is preferably of wavelengths shorter than 6 microns, or more advantageously less than 2 microns. The stimulating beam is used to stimulate a remote luminescent sensor mounted in a probe which emits stored luminescent energy resulting from exposure of the sensor to ionizing radiation. The stimulating beam is communicated to the remote luminescent sensor via transmissive fiber which also preferably serves to return the emission from the luminescent sensor. The stimulating beam is advantageously split by a beam splitter to create a detector beam which is measured for power during a reading period during which the luminescent phosphor is read. The detected power is preferably used to control the beam generator to thus produce desired beam power during the reading period. The luminescent emission from the remote sensor is communicated to a suitable emission detector, preferably after filtering or other selective treatment to better isolate the luminescent emission.

  2. Manually operated coded switch

    DOE Patents [OSTI]

    Barnette, Jon H.

    1978-01-01

    The disclosure relates to a manually operated recodable coded switch in which a code may be inserted, tried and used to actuate a lever controlling an external device. After attempting a code, the switch's code wheels must be returned to their zero positions before another try is made.

  3. NREL: Energy Executive Leadership Academy - Leadership Institute

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Leadership Institute Participants in NREL's Executive Energy Leadership Institute learn about renewable energy and energy efficiency from the experts through this accelerated...

  4. NREL: Energy Executive Leadership Academy - Webmaster

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Your email address: Your message: Send Message Printable Version Energy Executive Leadership Academy Home Leadership Program Leadership Institute Alumni News Did you find what...

  5. NREL: Energy Executive Leadership Academy - Leadership Program

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Leadership Program NREL's Executive Energy Leadership Program is an in-depth training program conducted over five multi-day sessions from May through September. The classroom...

  6. Executive Committee meeting | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    6, 2016 6:00PM to 7:00PM EST The Oak Ridge Site Specific Advisory Board's Executive Committee meeting is open to the public...

  7. Executive Order 13583, Establishing a Coordinated Government...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    13583, Establishing a Coordinated Government-Wide Initiative to Promote Diversity and Inclusion in the Federal Workforce Executive Order 13583, Establishing a Coordinated...

  8. SENIOR EXECUTIVE SERVICE CANDIDATE DEVELOPMENT PROGRAM (SESCDP...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Evaluation Form allows ESE candidates to evaluate assignments in terms of the executive core qualities the assignment was intended to meet, how well it met expectations and ...

  9. Executive Order 13514: Comprehensive Federal Fleet Management...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Handbook offers guidance on meeting the fleet management requirements outlined in section 12 of Executive Order 13514: Federal Leadership in Environmental, Energy, and Economic ...

  10. SSRLUO Executive Committee Meetings | Stanford Synchrotron Radiation...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Users Executive Committee Representatives. Review summary article about the Annual SSRLLCLS Users' Conference & Workshops, October 7-10, 2015. Review previous programs from the...