National Library of Energy BETA

Sample records for remote users inject

  1. U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated Privileges, Inject SQL Commands, and Spoof Certificates

    Broader source: Energy.gov [DOE]

    A remote authenticated user can gain elevated privileges. A remote authenticated user can inject SQL commands. A remote user can spoof connections in certain cases.

  2. U-049: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users Inject

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Commands on the Target System | Department of Energy 49: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users Inject Commands on the Target System U-049: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users Inject Commands on the Target System December 1, 2011 - 9:00am Addthis PROBLEM: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users Inject Commands on the Target System. PLATFORM: IBM Tivoli Netcool Reporter prior to 2.2.0.8 ABSTRACT: A vulnerability was reported in IBM Tivoli Netcool

  3. U-026: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject Commands

    Broader source: Energy.gov [DOE]

    A remote user can create a URL that, when loaded by the target authenticated administrative user, will execute arbitrary commands on the target system.

  4. U-048: HP LaserJet Printers Unspecified Flaw Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    T-699: EMC AutoStart Buffer Overflows Let Remote Users Execute Arbitrary Code U-049: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users Inject Commands on the Target System...

  5. T-606: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data

    Broader source: Energy.gov [DOE]

    Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data.

  6. T-704: RSA enVision Lets Remote Users View Files and Remote Authentica...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain...

  7. U-074: Microsoft.NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users

    Broader source: Energy.gov [DOE]

    A remote user can execute arbitrary commands on the target system. A remote user can access a target user's account. A remote user can redirect users to arbitrary sites.

  8. V-202: Cisco Video Surveillance Manager Bugs Let Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Video Surveillance Manager Bugs Let Remote Users Obtain Potentially Sensitive Information V-202: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain Potentially Sensitive...

  9. V-155: Apache Tomcat FORM Authenticator Lets Remote Users Conduct...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks V-155: Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks...

  10. U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code September 18, 2012 -...

  11. U-047: Siemens Automation License Manager Bugs Let Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or...

  12. T-636: Wireshark Multiple Flaws Let Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions.

  13. U-203: HP Photosmart Bug Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in HP Photosmart. A remote user can cause denial of service conditions.

  14. U-176: Wireshark Multiple Bugs Let Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions.

  15. T-573: Windows Remote Desktop Client DLL Loading Error Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Windows Remote Desktop Client. A remote user can cause arbitrary code to be executed on the target user's system.

  16. T-574: Google Chrome Multiple Flaws Let Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    4: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code T-574: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code March 10, 2011 - 3:05pm Addthis...

  17. V-127: Samba Bug Lets Remote Authenticated Users Modify Files...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7: Samba Bug Lets Remote Authenticated Users Modify Files V-127: Samba Bug Lets Remote Authenticated Users Modify Files April 5, 2013 - 6:00am Addthis PROBLEM: A vulnerability was...

  18. V-218: HP Service Manager Unspecified Flaw Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    U-010:HP Onboard Administrator Unspecified Flaw Lets Remote Users Gain Access U-029: TCPIP Services for OpenVMS POPIMAP Service Bug Lets Remote Users Gain Unauthorized Access...

  19. U-010:HP Onboard Administrator Unspecified Flaw Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0:HP Onboard Administrator Unspecified Flaw Lets Remote Users Gain Access U-010:HP Onboard Administrator Unspecified Flaw Lets Remote Users Gain Access October 13, 2011 - 8:15am...

  20. U-277: Google Chrome Multiple Flaws Let Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 22.0.1229.92 ABSTRACT: Several vulnerabilities were...

  1. V-183: Cisco TelePresence TC and TE Bugs Let Remote Users Deny...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Remote Users Deny Service and Remote Adjacent Authenticated Users Gain Root Shell Access V-183: Cisco TelePresence TC and TE Bugs Let Remote Users Deny Service and Remote Adjacent...

  2. V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload...

    Energy Savers [EERE]

    Users Upload Files and Let Remote Users Conduct Cross-Site Scripting Attacks V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and Let Remote Users ...

  3. U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can cause arbitrary code to be executed on the target user's system. A remote user can conduct cross-site scripting attacks. A remote user can obtain potentially sensitive information.

  4. U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic...

    Office of Environmental Management (EM)

    59: RSA BSAFE SSL-C Lets Remote Users Decrypt SSLTLS Traffic and SSL Buffer Overflow Lets Remote Users Execute Arbitrary Code U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL...

  5. U-231: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in Cisco ASA. A remote or remote authenticated user can cause denial of service conditions.

  6. U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    79: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code ...

  7. V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code V-076: Cisco Wireless LAN ...

  8. V-172: ISC BIND RUNTIME_CHECK Error Lets Remote Users Deny Service...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ISC BIND RUNTIMECHECK Error Lets Remote Users Deny Service Against Recursive Resolvers V-172: ISC BIND RUNTIMECHECK Error Lets Remote Users Deny Service Against Recursive...

  9. U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain...

  10. V-006: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in CA ARCserve Backup. A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions.

  11. U-005: Apache mod_proxy Pattern Matching Bug Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: Apache modproxy Pattern Matching Bug Lets Remote Users Access Internal Servers U-005: Apache modproxy Pattern Matching Bug Lets Remote Users Access Internal Servers October 6,...

  12. U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks U-142: HP Onboard Administrator Bugs Let Remote Users Gain...

  13. U-046: Apache mod_proxy/mod_rewrite Bug Lets Remote Users Access...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6: Apache modproxymodrewrite Bug Lets Remote Users Access Internal Servers U-046: Apache modproxymodrewrite Bug Lets Remote Users Access Internal Servers November 28, 2011 -...

  14. U-049: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    LaserJet Printers Unspecified Flaw Lets Remote Users Update Firmware with Arbitrary Code U-053: Linux kexec Bugs Let Local and Remote Users Obtain Potentially Sensitive Information

  15. U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...

    Energy Savers [EERE]

    iOS. A remote user can cause arbitrary code to be executed on the target user's system. ... A remote user can create a specially crafted file that, when loaded by the target user, ...

  16. T-678: Red Hat Enterprise Virtualization Hypervisor VLAN Packet Processing Flaw Lets Remote Users Deny Service

    Office of Energy Efficiency and Renewable Energy (EERE)

    Red Hat Enterprise Virtualization Hypervisor VLAN Packet Processing Flaw Lets Remote Users Deny Service.

  17. U-233: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote Authenticated Users Gain Elevated Privileges

    Office of Energy Efficiency and Renewable Energy (EERE)

    A remote authenticated user with 'Create Table' privileges can gain 'SYS' privileges on the target system.

  18. T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass Authentication or Obtain Information

    Broader source: Energy.gov [DOE]

    Apache Tomcat AJP protocol processing bug lets remote users bypass authentication or obtain information.

  19. T-718:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system.

  20. U-079: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system.

  1. U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create content that, when loaded by the target user, will execute arbitrary code on or obtain potentially sensitive information from the target user's system.

  2. U-041: Google Chrome Out-of-Bounds Write Error Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

  3. U-004:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

  4. V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Let Remote Users Conduct Cross-Site Scripting Attacks | Department of Energy 51: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and Let Remote Users Conduct Cross-Site Scripting Attacks V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and Let Remote Users Conduct Cross-Site Scripting Attacks May 8, 2013 - 12:06am Addthis PROBLEM: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and Let Remote Users Conduct Cross-Site Scripting Attacks

  5. User Guide for Remote Access to VDI/Workplace Using PIV | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy User Guide for Remote Access to VDI/Workplace Using PIV User Guide for Remote Access to VDI/Workplace Using PIV User guide for remote access to VDI/Workplace using a PIV card . VDI_WP_PIV_Remote_Guide_Final.pdf (1.39 MB) More Documents & Publications User guide for remote access to VDI and Workplace using RSA token Remote Access Options Instructions for using HSPD-12 Authenticated Outlook Web Access (OWA)

  6. V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code | Department of Energy 6: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code January 24, 2013 - 6:00am Addthis PROBLEM: Several vulnerabilities were reported in

  7. T-652: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Mozilla Thunderbird. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can obtain cookies from another domain in certain cases.

  8. U-118: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can obtain potentially information.

  9. U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges

    Office of Energy Efficiency and Renewable Energy (EERE)

    Several vulnerabilities were reported in Apple OS X. A remote user can execute arbitrary code on the target system. A remote user can obtain a password hash in certain cases. A local user can obtain elevated privileges on the target system. A local user can obtain password keystrokes.

  10. T-563: Red Hat Directory Server Bugs Let Local Users Gain Elevated Privileges and Remote and Local Users Deny Service

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in Red Hat Directory Server. A local user can obtain elevated privileges on the target system. A remote user can cause denial of service conditions. A local user can cause denial of service conditions.

  11. U-136: Adobe Flash Player Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system.

  12. U-166: Adobe Shockwave Player Memory Corruption Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Adobe Shockwave Player. A remote user can cause arbitrary code to be executed on the target user's system.

  13. U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Apple QuickTime. A remote user can cause arbitrary code to be executed on the target user's system.

  14. U-080: Linux Kernel XFS Heap Overflow May Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in the Linux Kernel. A remote user can cause arbitrary code to be executed on the target user's system.

  15. U-133: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system.

  16. U-143: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system.

  17. T-692: VMware vFabric tc Server Lets Remote Users Login Using...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    A remote user can login using an obfuscated version of their password. PLATFORM: ... user can use the password in obfuscated form (or in plain text form) to authenticate. ...

  18. U-160: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system

  19. U-107: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    07: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny Service U-107: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny Service February 21, 2012 - 6:00am ...

  20. T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls ...

  1. V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code March 18, 2013 - 1:53am Addthis PROBLEM: Apple Safari...

  2. V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code November 9, 2012 - 6:00am...

  3. V-184: Google Chrome Flash Plug-in Lets Remote Users Conduct...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    4: Google Chrome Flash Plug-in Lets Remote Users Conduct Clickjacking Attacks V-184: Google Chrome Flash Plug-in Lets Remote Users Conduct Clickjacking Attacks June 24, 2013 -...

  4. V-212: Samba smbd CPU Processing Loop Lets Remote Users Deny...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: Samba smbd CPU Processing Loop Lets Remote Users Deny Service V-212: Samba smbd CPU Processing Loop Lets Remote Users Deny Service August 6, 2013 - 6:00am Addthis PROBLEM: A...

  5. U-140: HP-UX Unspecified Flaw in DCE Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can execute arbitrary code on the target system. A remote user can send specially crafted data to execute arbitrary code on the target system. The code will run with the privileges of the target service.

  6. V-066: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6: Adobe AcrobatReader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges V-066: Adobe AcrobatReader Multiple Flaws Lets Remote...

  7. U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service September 12, 2012 - 6:00am Addthis...

  8. V-203: HP LoadRunner Multiple Bugs Let Remote Users Deny Service...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code...

  9. V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code March 13, 2013 - 12:04am Addthis PROBLEM:...

  10. V-095: Oracle Java Flaws Let Remote Users Execute Arbitrary Code...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: Oracle Java Flaws Let Remote Users Execute Arbitrary Code V-095: Oracle Java Flaws Let Remote Users Execute Arbitrary Code February 20, 2013 - 12:38am Addthis PROBLEM: Oracle...

  11. V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code April 25, 2013 - 12:14am...

  12. V-144: HP Printers Let Remote Users Access Files on the Printer...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    4: HP Printers Let Remote Users Access Files on the Printer V-144: HP Printers Let Remote Users Access Files on the Printer April 29, 2013 - 12:27am Addthis PROBLEM: HP Printers...

  13. V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets May 2, 2013 - 6:00am Addthis...

  14. T-575: OpenLDAP back-ndb Lets Remote Users Authenticate Without...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Remote Users Authenticate Without a Valid Password T-575: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid Password March 11, 2011 - 3:05pm Addthis PROBLEM: A ...

  15. U-089:Apache Struts ParameterInterceptor() Flaw Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Apache Struts ParameterInterceptor() Flaw Lets Remote Users Execute Arbitrary Commands PLATFORM: Struts 2.0.0 - Struts 2.3.1.1 ABSTRACT: A remote user can execute arbitrary code...

  16. U-239: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or ...

  17. U-208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in HP Operations Agent. A remote user can execute arbitrary code on the target system

  18. U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in RSA Access Manager. A remote user can gain access to the target system.

  19. U-153: EMC Data Protection Advisor Server and Collector Bugs Let Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in EMC Data Protection Advisor. A remote user can cause denial of service conditions.

  20. U-134: Apache Traffic Server Host Header Processing Flaw Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Apache Traffic Server. A remote user can cause denial of service conditions.

  1. U-161: Citrix Provisioning Services Unspecified Flaw Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Citrix Provisioning Services. A remote user can execute arbitrary code on the target system.

  2. U-135: HP WBEM Discloses Diagnostic Data to Remote and Local Users

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in HP WBEM. A remote or local user can gain access to diagnostic data.

  3. T-719:Apache mod_proxy_ajp HTTP Processing Error Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    A remote user can cause the backend server to remain in an error state until the retry timeout expires.

  4. U-236: Microsoft JScript and VBScript Engine Integer Overflow Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Execution of arbitrary code via network A remote user can cause arbitrary code to be executed on the target

  5. U-130: JBoss Operations Network LDAP Authentication Bug Lets Remote Users Bypass Authentication

    Office of Energy Efficiency and Renewable Energy (EERE)

    A vulnerability was reported in JBoss Operations Network. A remote user can login with an arbitrary password in certain cases.

  6. U-217: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site Scripting and Denial of Service Attacks

    Office of Energy Efficiency and Renewable Energy (EERE)

    Two vulnerabilities were reported in Red Hat Certificate System. A remote user can conduct cross-site scripting attacks. A remote authenticated user can revoke the CA certificate.

  7. U-163: PHP Command Parameter Bug Lets Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in PHP. A remote user can obtain potentially sensitive information. A remote user can execute arbitrary code on the target system.

  8. T-654: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary

    Broader source: Energy.gov [DOE]

    A remote user can create a specially crafted file that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user.

  9. U-063: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can cause the target application to execute arbitrary code on the target user's system.

  10. User guide for remote access to VDI and Workplace using RSA token |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy User guide for remote access to VDI and Workplace using RSA token User guide for remote access to VDI and Workplace using RSA token User guide for remote access to VDI and Workplace using RSA token VDI_WP_RSA_Remote_Guide_Final.pdf (1.22 MB) More Documents & Publications User Guide for Remote Access to VDI/Workplace Using PIV Microsoft Word - Citrix_2FA_Authentication_12_3_2009.doc Citrix_2FA_Authentication_09.09

  11. T-695: Avaya Aura Application Server Buffer Overflow in 'cstore.exe' Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Avaya Aura Application Server Buffer Overflow in 'cstore.exe' Lets Remote Users Execute Arbitrary Code.

  12. T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks

  13. U-119: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system

  14. U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Buffer Overflow Lets Remote Users Execute Arbitrary Code | Department of Energy 59: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL Buffer Overflow Lets Remote Users Execute Arbitrary Code U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL Buffer Overflow Lets Remote Users Execute Arbitrary Code September 13, 2012 - 6:00am Addthis PROBLEM: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL Buffer Overflow Lets Remote Users Execute

  15. V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information V-140: Apache ActiveMQ Bugs Let Remote...

  16. V-135: Cisco ASA Multiple Bugs Let Remote Users Deny Service | Department

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    of Energy 5: Cisco ASA Multiple Bugs Let Remote Users Deny Service V-135: Cisco ASA Multiple Bugs Let Remote Users Deny Service April 16, 2013 - 12:21am Addthis PROBLEM: Cisco ASA Multiple Bugs Let Remote Users Deny Service PLATFORM: Cisco ASA Software for Cisco ASA 5500 Series Adaptive Security Appliances, Cisco ASA Services Module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers, and Cisco ASA 1000V Cloud Firewall are affected by multiple vulnerabilities. Affected

  17. U-053: Linux kexec Bugs Let Local and Remote Users Obtain Potentially

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Sensitive Information | Department of Energy 53: Linux kexec Bugs Let Local and Remote Users Obtain Potentially Sensitive Information U-053: Linux kexec Bugs Let Local and Remote Users Obtain Potentially Sensitive Information December 7, 2011 - 7:30am Addthis PROBLEM: Linux kexec Bugs Let Local and Remote Users Obtain Potentially Sensitive Information . PLATFORM: Red Hat Enterprise Linux Desktop (v. 6) Red Hat Enterprise Linux HPC Node (v. 6) Red Hat Enterprise Linux Server (v. 6) Red Hat

  18. U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Arbitrary Code and Deny Service | Department of Energy 79: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service October 11, 2012 - 6:00am Addthis PROBLEM: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service PLATFORM: Version(s): prior to 4.1(9) ABSTRACT: Several vulnerabilities were reported in Cisco Firewall

  19. V-235: Cisco Mobility Services Engine Configuration Error Lets Remote Users

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Login Anonymously | Department of Energy 5: Cisco Mobility Services Engine Configuration Error Lets Remote Users Login Anonymously V-235: Cisco Mobility Services Engine Configuration Error Lets Remote Users Login Anonymously September 5, 2013 - 12:33am Addthis PROBLEM: A vulnerability was reported in Cisco Mobility Services Engine. A remote user can login anonymously. PLATFORM: Cisco Mobility Services Engine ABSTRACT: A vulnerability in Cisco Mobility Services Engine could allow an

  20. T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security Controls | Department of Energy 36: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls January 18, 2011 - 2:30pm Addthis PROBLEM: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls. PLATFORM: Cisco 5500 Series Adaptive Security Appliances (ASA) ABSTRACT: Cisco ASA 5500 Series Adaptive Security Appliances are affected by multiple

  1. U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in Apple iOS. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can spoof the address bar URL.

  2. U-091: cURL Lets Remote Users Decrypt SSL/TLS Traffic | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy 91: cURL Lets Remote Users Decrypt SSL/TLS Traffic U-091: cURL Lets Remote Users Decrypt SSL/TLS Traffic January 30, 2012 - 6:45am Addthis PROBLEM: A vulnerability was reported in cURL. PLATFORM: Linux (Any), UNIX (Any), Windows (Any) : Version(s): 7.10.6 through 7.23.1 ABSTRACT: A remote user can decrypt SSL/TLS sessions in certain cases. reference LINKS: CVE-2011-3389 SecurityTracker Alert ID: 1026587 Vendor Advisory IMPACT ASSESSMENT: Moderate Discussion: A remote user with the

  3. U-107: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny Service

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    | Department of Energy 07: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny Service U-107: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny Service February 21, 2012 - 6:00am Addthis PROBLEM: A vulnerability was reported in Cisco NX-OS. A remote user can cause denial of service conditions. PLATFORM: Nexus 1000v, 5000, and 7000 Series Switches ABSTRACT: A remote user can send a specially crafted IP packet to cause the target device to reload. reference LINKS: Cisco

  4. U-239: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Addresses | Department of Energy 39: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source Addresses U-239: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source Addresses August 20, 2012 - 7:00am Addthis PROBLEM: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source Addresses PLATFORM: Version(s): 6 beta 4 and prior versions ABSTRACT: A remote user can spoof SMS source addresses. Reference LINKS: SecurityTracker Alert ID: 1027410 Apple.com PCMag.com

  5. T-598: Apache Tomcat HTTP BIO Connector Error Discloses Information From Different Requests to Remote Users

    Broader source: Energy.gov [DOE]

    When using HTTP pipelining, the system may return information from a different request to a remote user. The vulnerability resides in the HTTP BIO connector.

  6. U-168: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in EMC Documentum Information Rights Management Server. A remote authenticated user can cause denial of service conditions.

  7. U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Red Hat Enterprise MRG Messaging. A remote user can access cluster messages and view the internal configuration.

  8. U-053: Linux kexec Bugs Let Local and Remote Users Obtain Potentially...

    Office of Environmental Management (EM)

    Linux kexec Bugs Let Local and Remote Users Obtain Potentially Sensitive Information . PLATFORM: Red Hat Enterprise Linux Desktop (v. 6) Red Hat Enterprise Linux HPC Node (v. 6) ...

  9. T-545: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets Remote Users

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Execute Arbitrary Code | Department of Energy 5: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets Remote Users Execute Arbitrary Code T-545: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets Remote Users Execute Arbitrary Code January 28, 2011 - 7:21am Addthis PROBLEM: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets Remote Users Execute Arbitrary Code. PLATFORM: RealPlayer 14.0.1 and prior versions ABSTRACT: A vulnerability was reported in RealPlayer. A remote user can

  10. U-096: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    A remote user can send a series of specially crafted TCP packets to trigger a kernel panic on the target system.

  11. T-538: HP OpenView Storage Data Protector Bug Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in HP OpenView Storage Data Protector. A remote user can execute arbitrary code on the target system.

  12. T-575: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Password | Department of Energy 5: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid Password T-575: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid Password March 11, 2011 - 3:05pm Addthis PROBLEM: A vulnerability was reported in OpenLDAP. A remote user can authenticate without a valid password. PLATFORM: Open LDAP version(s) 2.4.12 - 2.2.24 ABSTRACT: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid Password. reference LINKS: SecurityTracker

  13. T-648: Avaya IP Office Manager TFTP Server Lets Remote Users Traverse the Directory

    Broader source: Energy.gov [DOE]

    The software does not properly validate user-supplied input. A remote user can supply a specially crafted request to view files on target system running the IP Office Manager software.

  14. U-088: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in Symantec pcAnywhere. A remote user can execute arbitrary code on the target system. A local user can obtain elevated privileges on the target system.

  15. User Guide Remote Access to VDI/Workplace Using PIV

    Broader source: Energy.gov (indexed) [DOE]

    ......... 3 1.1 Web Browsers ......with remote PIV with VDI. 1.1 Web Browsers Browser Version Functions with ...

  16. U-007: IBM Rational AppScan Import/Load Function Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in IBM Rational AppScan. A remote user can cause arbitrary code to be executed on the target user's system.

  17. V-058: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Microsoft Internet Explorer. A remote user can cause arbitrary code to be executed on the target user's system.

  18. U-177: Lotus Quickr for Domino ActiveX Control Buffer Overflow Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Lotus Quickr for Domino. A remote user can cause arbitrary code to be executed on the target user's system.

  19. U-012: BlackBerry Enterprise Server Collaboration Service Bug Lets Remote Users Impersonate Intra-organization Messages

    Office of Energy Efficiency and Renewable Energy (EERE)

    A vulnerability was reported in BlackBerry Enterprise Server. A remote user can impersonate another messaging user within the same organization.

  20. V-049: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Execute Arbitrary Code | Department of Energy 9: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users Execute Arbitrary Code V-049: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users Execute Arbitrary Code December 18, 2012 - 1:30am Addthis PROBLEM: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users Execute Arbitrary Code PLATFORM: Windows RealPlayer 15.0.6.14 and prior. ABSTRACT: Two vulnerabilities were reported in RealPlayer. REFERENCE

  1. V-165: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote Users

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Spoof the Server | Department of Energy 65: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote Users Spoof the Server V-165: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote Users Spoof the Server May 28, 2013 - 12:46am Addthis PROBLEM: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote Users Spoof the Server PLATFORM: Cisco WebEx for iOS 4.1, Other versions may also be affected. ABSTRACT: A vulnerability was reported in Cisco WebEx for iOS. REFERENCE LINKS:

  2. T-692: VMware vFabric tc Server Lets Remote Users Login Using Obfuscated

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Passwords | Department of Energy 92: VMware vFabric tc Server Lets Remote Users Login Using Obfuscated Passwords T-692: VMware vFabric tc Server Lets Remote Users Login Using Obfuscated Passwords August 12, 2011 - 3:47pm Addthis PROBLEM: A vulnerability was reported in VMware vFabric tc Server. A remote user can login using an obfuscated version of their password. PLATFORM: Version(s): vFabric tc Server 2.0.0.RELEASE to 2.0.5.SR01, 2.1.0.RELEASE to 2.1.1.SR01 ABSTRACT: VMware vFabric tc

  3. T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Sessions | Department of Energy 7:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions September 27, 2011 - 8:00am Addthis PROBLEM: Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions. PLATFORM: Windows XP Service Pack 3 Windows XP Professional x64 Edition Service Pack 2 Windows Server 2003 Service Pack 2 Windows Server 2003 x64 Edition Service Pack 2 Windows

  4. U-137: HP Performance Manager Unspecified Bug Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    vulnerability has been identified with HP Performance Manager running on HP-UX, Linux, Solaris, and Windows. The vulnerability could be exploited remotely to execute...

  5. T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    U-033: Microsoft Security Bulletin Summary for November 2011 T-706: Microsoft Fraudulent Digital Certificate Issued by DigiNotar U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt ...

  6. U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    overflow CVE-2012-0670. A specially crafted '.pict' file can trigger a memory corruption error CVE-2012-0671. Impact: A remote user can create a file that, when loaded by...

  7. U-111: IBM AIX ICMP Processing Flaw Lets Remote Users Deny Service...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    aixefixessecurityicmpfix.tar Addthis Related Articles U-096: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny Service V-031: IBM WebSphere DataPower...

  8. U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote Users Execute Arbitrary Code and Deny Service

    Broader source: Energy.gov [DOE]

    A remote user can create a Java applet or Java Web Start application that, when loaded by the target user, will access or modify data or execute arbitrary code on the target user's system.

  9. U-081: McAfee SaaS 'myCIOScn.dll' ActiveX Control Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

  10. U-155: WebCalendar Access Control and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code

    Office of Energy Efficiency and Renewable Energy (EERE)

    Two vulnerabilities were reported in WebCalendar. A remote user may be able to execute arbitrary PHP code on the target system.

  11. U-211: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories

    Office of Energy Efficiency and Renewable Energy (EERE)

    A vulnerability was reported in EMC Celerra/VNX/VNXe. A remote authenticated user can access files and directories on the target file system.

  12. U-008: Symantec Data Loss Prevention Bugs in KeyView Filter Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    A remote user can create a file that, when processed by the target filter, will cause partial denial of service conditions.

  13. U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks

    Office of Energy Efficiency and Renewable Energy (EERE)

    Several vulnerabilities were reported in RSA enVision. A remote user can access the system. A remote authenticated user can conduct cross-site scripting attacks. A remote authenticated user can inject SQL commands. A remote authenticated user can view files on the target system.

  14. U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection...

    Office of Environmental Management (EM)

    can inject SQL commands. A remote authenticated user can view files on the target system. ... A remote authenticated user can view files on the target system. Solution: The vendor has ...

  15. T-609: Adobe Acrobat/Reader Memory Corruption Error in CoolType Library Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create a specially crafted PDF file that, when loaded by the target user, will trigger a memory corruption error in the CoolType library and execute arbitrary code on the target system. The code will run with the privileges of the target user.

  16. T-633: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    A remote DNS server can supply very large RRSIG RRsets in a negative response to trigger an off-by-one error in a buffer size check and cause the target requesting named process to crash. A remote user can cause named to crash.

  17. T-635: Cisco AnyConnect Secure Mobility Client Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    Cisco AnyConnect Secure Mobility Client contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on a targeted system. The vulnerability exists due to improper validation of program executables downloaded by the Cisco AnyConnect Secure Mobility Client. An unauthenticated, remote attacker could exploit the vulnerability by convincing the targeted user to view a malicious website. If successful, the attacker could execute arbitrary code on the system with the privileges of the user. Cisco confirmed the vulnerability in a security advisory and released software updates.

  18. V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    PROBLEM: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code

  19. V-183: Cisco TelePresence TC and TE Bugs Let Remote Users Deny Service and Remote Adjacent Authenticated Users Gain Root Shell Access

    Broader source: Energy.gov [DOE]

    Cisco TelePresence TC and TE Software contain two vulnerabilities in the implementation of the Session Initiation Protocol (SIP) that could allow an unauthenticated remote attacker to cause a denial of service (DoS) condition. Additionally, Cisco TelePresence TC Software contain an adjacent root access vulnerability that could allow an attacker on the same physical or logical Layer-2 network as the affected system to gain an unauthenticated root shell.

  20. U-275: HP IBRIX X9000 Storage Discloses Information to Remote Users

    Broader source: Energy.gov [DOE]

    A potential security vulnerability has been identified with HP IBRIX X9000 Storage. The vulnerability could be remotely exploited to allow disclosure of information.

  1. U-201: HP System Management Homepage Bugs Let Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    The vulnerabilities could be exploited remotely resulting in unauthorized access, disclosure of information, data modification, Denial of Service (DoS), and execution of arbitrary code.

  2. T-608: HP Virtual Server Environment Lets Remote Authenticated Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    A potential security vulnerability has been identified in HP Virtual Server Environment for Windows. The vulnerability could be exploited remotely to elevate privileges.

  3. V-210: HP LaserJet Pro Printer Bug Lets Remote Users Access Data

    Broader source: Energy.gov [DOE]

    A potential security vulnerability has been identified with certain HP LaserJet Pro printers. The vulnerability could be exploited remotely to gain unauthorized access to data.

  4. Users

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ... offered at CAMD's annual user meeting) or by retaking the online CAMD Radiation Safety Test. If your training has expired your access card will not allow access to the ...

  5. U-244: McAfee Email Gateway Lets Remote Users Bypass Authentication...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    McAfee Security Bulletin ID: SB10026 SecurityTracker Alert ID: 1027444 Bugtraq ID: 55184 CVE-2012-4595, CVE-2012-4596, CVE-2012-4597 IMPACT ASSESSMENT: Medium Discussion A remote...

  6. V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system CVE-2013-1009,...

  7. T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system - CVE-2010-1823,...

  8. U-247: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    CTA 7.3.1 and later with Hotfix ESA-2012-034 Addthis Related Articles V-045: Adobe ColdFusion Lets Local Users Bypass Sandbox Restrictions V-036: EMC Smarts Network...

  9. T-574: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact while others can be exploited by malicious people bypass certain security restrictions, disclose system information, and compromise a user's system.

  10. U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system CVE-2011-3016, CVE-2011-3021,...

  11. T-662: ISC BIND Packet Processing Flaw Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    A defect in the affected BIND 9 versions allows an attacker to remotely cause the "named" process to exit using a specially crafted packet. This defect affects both recursive and authoritative servers. The code location of the defect makes it impossible to protect BIND using ACLs configured within named.conf or by disabling any features at compile-time or run-time. A remote attacker would need to be able to send a specially crafted packet directly to a server running a vulnerable version of BIND. There is also the potential for an indirect attack via malware that is inadvertently installed and run, where infected machines have direct access to an organization's nameservers.

  12. U-015: CiscoWorks Common Services Home Page Input Validation Flaw Lets Remote Users Execute Arbitrary Commands

    Broader source: Energy.gov [DOE]

    Successful exploitation of this vulnerability may allow an authenticated, remote attacker to execute arbitrary commands on the affected system with the privileges of a system administrator.

  13. T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AJP Protocol Processing Bug Lets Remote Users Bypass Authentication or Obtain Information T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass Authentication...

  14. V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Apache VCL Input Validation Flaw Lets Remote Authenticated Users Gain Elevated Privileges V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated Users Gain Elevated...

  15. V-220: Juniper Security Threat Response Manager Lets Remote Authentica...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Threat Response Manager Lets Remote Authenticated Users Execute Arbitrary Commands V-220: Juniper Security Threat Response Manager Lets Remote Authenticated Users Execute...

  16. V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code June...

  17. V-149: Microsoft Internet Explorer Object Access Bug Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    9: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code V-149: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary...

  18. Multiple node remote messaging

    DOE Patents [OSTI]

    Blumrich, Matthias A.; Chen, Dong; Gara, Alan G.; Giampapa, Mark E.; Heidelberger, Philip; Ohmacht, Martin; Salapura, Valentina; Steinmacher-Burow, Burkhard; Vranas, Pavlos

    2010-08-31

    A method for passing remote messages in a parallel computer system formed as a network of interconnected compute nodes includes that a first compute node (A) sends a single remote message to a remote second compute node (B) in order to control the remote second compute node (B) to send at least one remote message. The method includes various steps including controlling a DMA engine at first compute node (A) to prepare the single remote message to include a first message descriptor and at least one remote message descriptor for controlling the remote second compute node (B) to send at least one remote message, including putting the first message descriptor into an injection FIFO at the first compute node (A) and sending the single remote message and the at least one remote message descriptor to the second compute node (B).

  19. V-093: Symantec PGP Desktop Buffer Overflows Let Local Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Secure Mobility Client Heap Overflow Lets Local Users Gain Elevated Privileges V-066: Adobe AcrobatReader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users...

  20. LANSCE | Users | User Office

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User Office LANSCE User Office and Visitor Center The LANSCE User Office is responsible for coordinating the users with LANSCE instrument scientist and the facility. Users contact the User Office weeks before they arrive at the LANSCE Visitor Center at Technical Area 53. Among their many responsibilities, the team issues the call for proposals, coordinates proposal experiment schedules, directs users to the training center, issues badges and dosimeters, helps to arrange tours of the facilities,

  1. T-660: OpenSSH on FreeBSD Has Buffer Overflow in pam_thread() That Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    The module does not adequately validate user input leading to an cross-site scripting (XSS) possibility in certain circumstances.

  2. User Information

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User Information User Information Print ALSHub User Portal User Guide A step-by-step guide for users about how to apply and prepare for beam time at the ALS. Experiment Safety Upon receiving beam time, complete an Experiment Safety Sheet Prospective Users Users from Industry Contacts for Users User Policy Data Management Users' Executive Committee (UEC) User Meeting

  3. LANSCE | Users | User Program

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    LANSCE User Program LANSCE's User Program ensures the research it oversees represents the cutting edge of nuclear and materials science and technology. The User Program plays a key role in training the next generation of top scientists, attracting the best graduate students, postdoctoral researchers, and early-career scientists (defined as those less than 40-years old). The User Program typically begins with the first call for proposals and run until the end of the run-cycle. The User-Program

  4. Training Courses for Argonne User Facilities | Advanced Photon...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Training Courses for Argonne User Facilities All core courses can be taken via the Remote Training web site. See the user training requirements summary for general information....

  5. User Training | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User Training Before performing work at the CNM, you must take certain orientation and safety training courses. We encourage you to take these courses remotely before you arrive at ...

  6. User Services

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Home Contact User Services Print The User Services Group is available to aid ALS users before they arrive, while they are here, and after they leave. User Office Experiment...

  7. User Facilities

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User Facilities User Facilities User facility agreements allow Los Alamos partners and other entities to conduct research at our unique facilities. In 2011, LANL hosted more than 1,200 users at CINT, LANSCE, and NHMFL. Users came from across the DOE complex, from international academia, and from industrial companies from 45 states across the U.S. Unique world-class user facilities foster rich research opportunities Through its technology transfer efforts, LANL can implement user facility

  8. Remote switch actuator

    DOE Patents [OSTI]

    Haas, Edwin Gerard; Beauman, Ronald; Palo, Jr., Stefan

    2013-01-29

    The invention provides a device and method for actuating electrical switches remotely. The device is removably attached to the switch and is actuated through the transfer of a user's force. The user is able to remain physically removed from the switch site obviating need for protective equipment. The device and method allow rapid, safe actuation of high-voltage or high-current carrying electrical switches or circuit breakers.

  9. LANSCE | Users

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Rosen Scholar Rosen Prize Users dotline User Information Planning for Arrival: Contact the User Office several weeks before arriving at LANSCE. The LANSCE User Office will assist you in preparing for your visit to LANSCE. Plan to arrive one day prior to your scheduled beam time. User Office Contacts Division Office Ph: 505.667.5051 Lujan Center User Office lujan-uo@lanl.gov WNR User Program Administrator Tanya Herrera Ph: 505.667.6797 User Office Main Desk Email: lansce-user-office@lanl.gov Ph:

  10. User Services

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Section Sue Bailey This e-mail address is being protected from spambots. You need JavaScript enabled to view it User Services Group Leader Prospective users Proprietary users...

  11. User Services

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Proposals for beam time User publications database Guest logistics and parking Loan of laptop, stealth phone and projector Logisitics for the annual users' meeting ALS Experiment...

  12. User Facilities

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User Facilities User Facilities A new research frontier awaits! Our door is open, and we thrive on mutually beneficial partnerships and collaborations that drive innovations and new technologies. Unique world-class user facilities foster rich research opportunities Through its technology transfer efforts, Los Alamos National Laboratory can implement user facility agreements that allow its partners and other entities to conduct research at many of its unique facilities. While our largest user

  13. User Services

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Contacts for Users User Services Print General Inquiries: This e-mail address is being protected from spambots. You need JavaScript enabled to view it Tel: 510-486-7745 (dial last four numbers from on-site phones) Location: Building 6 mezzanine, Room 6-2212 Office hours: Monday-Friday 8am - 5pm (new users should arrive before 4pm) Address: Advanced Light Source, Berkeley Lab, MS 6-2100, Berkeley, CA 94720 Group Leader User Services Sue Bailey Prospective users, Industry users This e-mail address

  14. U-068:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    Vulnerability was reported in FreeBSD Telnet. A remote user can execute arbitrary code on the target system.

  15. User Guide

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User Guide Print 1. Register with the ALS Create an account on ALSHub-the ALS user portal. 2. Apply for Beam Time 3. Establish a User Agreement 4. Comply with Experiment Safety Requirements Upon receiving beam time, complete an Experiment Safety Sheet. 5. Get Access to Work Onsite 6. Complete Online Safety Training 7. Utilize Available Resources 8. Complete the User Satisfaction Survey 9. Report Publications, Awards, Talks, Acknowledging Work at ALS

  16. User Policy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User Policy Print 1. Guiding Principles The aim of User Policy at the Advanced Light Source (ALS) is to provide a framework for establishing a challenging yet congenial environment where talented scientists from different backgrounds can work together in pursuit of the new scientific opportunities presented by the availability of this innovative facility. User policy must address a variety of user needs and sensitivities. On one hand, the qualified researcher with little financial backing needs

  17. User Guide

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User Guide Print 1. Register with the ALS Create an account on ALSHub-the ALS user portal. 2. Apply for Beam Time 3. Establish a User Agreement 4. Comply with Experiment Safety Requirements Upon receiving beam time, complete an Experiment Safety Sheet. 5. Get Access to Work Onsite 6. Complete Online Safety Training 7. Utilize Available Resources 8. Complete the User Satisfaction Survey 9. Report Publications, Awards, Talks, Acknowledging Work at ALS

  18. User Policy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User Policy Print 1. Guiding Principles The aim of User Policy at the Advanced Light Source (ALS) is to provide a framework for establishing a challenging yet congenial environment where talented scientists from different backgrounds can work together in pursuit of the new scientific opportunities presented by the availability of this innovative facility. User policy must address a variety of user needs and sensitivities. On one hand, the qualified researcher with little financial backing needs

  19. User Guide

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Guide User Guide Print 1. Register with the ALS Create an account on ALSHub-the ALS user portal. 2. Apply for Beam Time 3. Establish a User Agreement 4. Comply with Experiment Safety Requirements Upon receiving beam time, complete an Experiment Safety Sheet. 5. Get Access to Work Onsite 6. Complete Online Safety Training 7. Utilize Available Resources 8. Complete the User Satisfaction Survey 9. Report Publications, Awards, Talks, Acknowledging Work at ALS

  20. User Policy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Policy User Policy Print 1. Guiding Principles The aim of User Policy at the Advanced Light Source (ALS) is to provide a framework for establishing a challenging yet congenial environment where talented scientists from different backgrounds can work together in pursuit of the new scientific opportunities presented by the availability of this innovative facility. User policy must address a variety of user needs and sensitivities. On one hand, the qualified researcher with little financial backing

  1. V-225: McAfee Email Gateway SMTP Processing Flaw Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: McAfee Email Gateway SMTP Processing Flaw Lets Remote Users Deny Service V-225: McAfee Email Gateway SMTP Processing Flaw Lets Remote Users Deny Service August 23, 2013 - 1:26am...

  2. V-166: HP-UX Directory Server Discloses Passwords to Remote Authentica...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6: HP-UX Directory Server Discloses Passwords to Remote Authenticated and Local Users V-166: HP-UX Directory Server Discloses Passwords to Remote Authenticated and Local Users May...

  3. User Packages

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User Packages User Packages There is more than one way for users to manage installation of Python packages on their own. Users of the Anaconda distribution may create their own environments as described here. Users of the NERSC-built modules can use virtualenv, pip, or compile and install Python packages directly. Using "pip" on Edison and Cori There is an issue with the pip command on the Cray systems because of an SSL certificate verification problem. One symptom is that you create

  4. User Services

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Author Guidelines User Services Print General Inquiries: This e-mail address is being protected from spambots. You need JavaScript enabled to view it Tel: 510-486-7745 (dial last four numbers from on-site phones) Location: Building 6 mezzanine, Room 6-2212 Office hours: Monday-Friday 8am - 5pm (new users should arrive before 4pm) Address: Advanced Light Source, Berkeley Lab, MS 6-2100, Berkeley, CA 94720 Group Leader User Services Sue Bailey Prospective users, Industry users This e-mail address

  5. User Services

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User Services General Inquiries: This e-mail address is being protected from spambots. You need JavaScript enabled to view it Tel: 510-486-7745 (dial last four numbers from on-site phones) Location: Building 6 mezzanine, Room 6-2212 Office hours: Monday-Friday 8am - 5pm (new users should arrive before 4pm) Address: Advanced Light Source, Berkeley Lab, MS 6-2100, Berkeley, CA 94720 Group Leader User Services Sue Bailey Prospective users, Industry users This e-mail address is being protected from

  6. User Services

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User Services Print General Inquiries: This e-mail address is being protected from spambots. You need JavaScript enabled to view it Tel: 510-486-7745 (dial last four numbers from on-site phones) Location: Building 6 mezzanine, Room 6-2212 Office hours: Monday-Friday 8am - 5pm (new users should arrive before 4pm) Address: Advanced Light Source, Berkeley Lab, MS 6-2100, Berkeley, CA 94720 Group Leader User Services Sue Bailey Prospective users, Industry users This e-mail address is being protected

  7. User Services

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User Services Print General Inquiries: This e-mail address is being protected from spambots. You need JavaScript enabled to view it Tel: 510-486-7745 (dial last four numbers from on-site phones) Location: Building 6 mezzanine, Room 6-2212 Office hours: Monday-Friday 8am - 5pm (new users should arrive before 4pm) Address: Advanced Light Source, Berkeley Lab, MS 6-2100, Berkeley, CA 94720 Group Leader User Services Sue Bailey Prospective users, Industry users This e-mail address is being protected

  8. User Services

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User Services Print General Inquiries: This e-mail address is being protected from spambots. You need JavaScript enabled to view it Tel: 510-486-7745 (dial last four numbers from on-site phones) Location: Building 6 mezzanine, Room 6-2212 Office hours: Monday-Friday 8am - 5pm (new users should arrive before 4pm) Address: Advanced Light Source, Berkeley Lab, MS 6-2100, Berkeley, CA 94720 Group Leader User Services Sue Bailey Prospective users, Industry users This e-mail address is being protected

  9. New User and Data Analytics Training

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    New User and Data Analytics Training New User and Data Analytics Training February 23, 2015 Monday, Feb. 23 - New User and Data Analytics Training NERSC (Berkeley Lab Building 943), 415 20th Street, Oakland, CA If you plan to attend, please register here. There is no registration fee, but your registration helps us plan the event. To attend remotely via WebEx, please see Remote Setup. Note that the morning session "New User Training" and the afternoon session "Data and Analytics

  10. U-058: Apache Struts Conversion Error OGNL Expression Injection...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    in Apache Struts. A remote user can execute arbitrary commands on the target system. PLATFORM: Apache Struts 2.x ABSTRACT: Apache Struts Conversion Error OGNL Expression...

  11. User Policy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Policy Print 1. Guiding Principles The aim of User Policy at the Advanced Light Source (ALS) is to provide a framework for establishing a challenging yet congenial environment where talented scientists from different backgrounds can work together in pursuit of the new scientific opportunities presented by the availability of this innovative facility. User policy must address a variety of user needs and sensitivities. On one hand, the qualified researcher with little financial backing needs

  12. Industrial Users

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Industrial Users The facility has been used for more than a decade by a virtual Who's Who of the semiconductor industry to simulate the potential failures posed by cosmic-ray-induced neutrons upon miniature electronic devices, such as chips that help control aircraft or complex integrated circuits in automobiles. Industrial User Information The Neutron and Nuclear Science (WNR) Facility welcomes proposals for beam time experiments from industry users. Proprietary and non-proprietary industrial

  13. User Services

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Services Print General Inquiries: This e-mail address is being protected from spambots. You need JavaScript enabled to view it Tel: 510-486-7745 (dial last four numbers from on-site phones) Location: Building 6 mezzanine, Room 6-2212 Office hours: Monday-Friday 8am - 5pm (new users should arrive before 4pm) Address: Advanced Light Source, Berkeley Lab, MS 6-2100, Berkeley, CA 94720 Group Leader User Services Sue Bailey Prospective users, Industry users This e-mail address is being protected from

  14. User Services

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Services Print General Inquiries: This e-mail address is being protected from spambots. You need JavaScript enabled to view it Tel: 510-486-7745 (dial last four numbers from on-site phones) Location: Building 6 mezzanine, Room 6-2212 Office hours: Monday-Friday 8am - 5pm (new users should arrive before 4pm) Address: Advanced Light Source, Berkeley Lab, MS 6-2100, Berkeley, CA 94720 Group Leader User Services Sue Bailey Prospective users, Industry users This e-mail address is being protected from

  15. User Guide

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Upon receiving beam time, complete an Experiment Safety Sheet. 5. Get Access to Work Onsite 6. Complete Online Safety Training 7. Utilize Available Resources 8. Complete the User ...

  16. Industrial Users

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Industrial Users - Media Publications and Information The Invisible Neutron Threat Neutron-Induced Failures in Semiconductor Devices Nuclear Science Research at the LANSCE-WNR...

  17. Prospective Users

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    from universities, government labs, and industry who are interested in performing experiments at the general sciences and structural biology beamlines open to users. An...

  18. U-084: Cisco Digital Media Manager Lets Remote Authenticated...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Show and Share. Impact: A remote authenticated user can send a specially crafted URL via TCP port 8443 to access administrative resources and gain administrative privileges....

  19. Remote Access

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Remote Access Remote Access Laboratory employees can access Research Library databases and products from offsite using our EZproxy service. This service is limited to LANL employees with active Z numbers and cryptocards. Access Electronic Collections with EZproxy Remote Access Journals - Books - Standards - Databases (WOK, etc) How to use EZproxy: From this page: Click on the icon above. From external site: Select "OFFSITE LANL Employee". Enter your Z number and Cryptocard passcode.

  20. U-082: McAfee SaaS 'myCIOScn.dll' ActiveX Control Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Lets Remote Users Execute Arbitrary Code January 17, 2012 - 1:00pm Addthis PROBLEM: PHP Null Pointer Dereference in zendstrndup() Lets Local Users Deny Service PLATFORM: PHP...

  1. U-119: Blackberry PlayBook Unspecified WebKit Bug Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7.1, and BlackBerry PlayBook tablet software ABSTRACT: A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's...

  2. Prospective Users

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    the ALS with all the technical, experiment, and administrative support they require for successful and efficient use of beam time. The kinds of access for users, i.e., General...

  3. NIF Users

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    users NIF Users Research Opportunities at the National Ignition Facility The National Ignition Facility provides the scientific community with an unprecedented capability for studying materials at extreme pressures, temperatures, and densities. NIF is expected to achieve temperatures and densities almost an order of magnitude greater than those in the sun's core and pressures far in excess of those at the core of Jupiter. The density of neutrons during the tens of picoseconds the NIF target

  4. New User Training: August 13, 2015

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    8/13/2015 New User Training: August 13, 2015 NERSC will present a day of training for new users on August 13, 2015 from 09:00 to 17:00 PDT. This event is targeted to new users of NERSC and will help them navigate the center and its systems. Location This event will be presented online using Zoom technology and in person at NERSC Oakland Scientific Facility. Please see below for remote connection information. Registration There is no registration for the online event. Please see below for remote

  5. User Program | Prospective Users US

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ... Click on the "User Satisfaction Survey" link on the "main menu" page. If you don't have an account you will need to create one. Your login ID (username and email) is the same as ...

  6. User Accounts and Emails

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User Accounts and Emails Print User Accounts Once a User Agreement is signed, users may ... and Information System (IRIS) . User Emails Users may sign up for a Berkeley Lab ...

  7. ALS User Meeting

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User Meeting ALS User Meeting web banner ALS User Meeting: October 5-7, 2015 Home Agenda Awards Exhibitors Lodging Posters Registration Transportation Workshops Contact Us User...

  8. User Services

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    a.m. - 12.00 p.m. and 1.00 p.m. - 4.00 p.m. User Office Staff Deborah Smith adriana reza This e-mail address is being protected from spambots. You need JavaScript enabled to...

  9. User Environment

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User Environment Environment on Genepool When you log into the Genepool system you will land in your $HOME directory on NERSC's "global homes" file system. The global homes file system is mounted across all NERSC computation systems with the exception of PDSF. The $HOME directory has quota of 40GB and 1,000,000 inodes. To customize your environment, by setting environment variables or aliases, you will need to modify one of the "dot" files that NERSC has created for you. You

  10. User Financial Account Form

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    22013 User Financial Account Form Establish a user financial account at SLAC to procure gases, chemicals, supplies or services to support your experiment at SLAC's user ...

  11. User Financial Account Form

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    102115 User Financial Account Form Establish a user financial account at SLAC to procure gases, chemicals, supplies or services to support your experiment at SLAC's user ...

  12. 2013 ALS User Meeting

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    3 ALS User Meeting banner Home Agenda Awards Exhibitors Lodging Posters Registration T-Shirt Contest Transportation Workshops Contact Us User Meeting Archives Users' Executive...

  13. 2013 ALS User Meeting

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    2013 ALS User Meeting Print banner Home Agenda Awards Exhibitors Lodging Posters Registration T-Shirt Contest Transportation Workshops Contact Us User Meeting Archives Users'...

  14. ALS User Meeting

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ALS User Meeting Print web banner ALS User Meeting: October 5-7, 2015 Home Agenda Awards Exhibitors Lodging Posters Registration Transportation Workshops Contact Us User Meeting...

  15. NERSC User Group Annual Meeting February 1-3, 2012

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Oakland Scientific Facility in Oakland, CA. All three days will be available as a WebEx web meeting for remote participation. All NERSC users are invited to attend all three...

  16. U-233: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Articles U-083:Oracle Critical Patch Update Advisory - January 2012 V-067: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code T-576: Oracle Solaris Adobe Flash Player...

  17. PST user`s guide

    SciTech Connect (OSTI)

    Rempe, J.L.; Cebull, M.J.; Gilbert, B.G.

    1996-10-01

    The Parametric Source Term (PST) software allows estimation of radioactivity release fractions for Level 2 Probabilistic Safety Assessments (PSAs). PST was developed at the Idaho National Engineering Laboratory (INEL) for the Nuclear Regulatory Commission`s (NRC`s) Accident Sequence Precursor (ASP) Program. PST contains a framework of equations that model activity transport between volumes in the release pathway from the core, through the vessel, through the containment, and to the environment. PST quickly obtains exact solutions to differential equations for activity transport in each volume for each time interval. PST provides a superior method for source term estimation because it: ensures conservation of activity transported across various volumes in the release pathway; provides limited consideration of the time-dependent behavior of input parameter uncertainty distributions; allows input to be quantified using state-of-the-art severe accident analysis code results; increases modeling flexibility because linkage between volumes is specified by user input; and allows other types of Light Water Reactor (LWR) plant designs to be evaluated with minimal modifications. PST is a microcomputer-based system that allows the analyst more flexibility than a mainframe system. PST has been developed to run with both MS DOS and MS Windows 95/NT operating systems. PST has the capability to load ASP Source Term Vector (STV) information, import pre-specified default input for the 6 Pressurized Water Reactors (PWRs) initially analyzed in the NRC ASP program, allow input value modifications for release fraction sensitivity studies, export user-specified default input for the LWR being modeled, report results of radioactivity release calculations at each time interval, and generate formatted results that can interface with other risk assessment codes. This report describes the PST model and provides guidelines for using PST.

  18. Checkpoint-Restart in User Space

    SciTech Connect (OSTI)

    2013-07-19

    CRUISE implements a user-space file system that stores data in main memory and transparently spills over to other storage, like local flash memory or the parallel file system, as needed. CRUISE also exposes file contents fo remote direct memory access, allowing external tools to copy files to the parallel file system in the background with reduced CPU interruption.

  19. Apparatus and method for downhole injection of radioactive tracer

    DOE Patents [OSTI]

    Potter, R.M.; Archuleta, J.; Fink, C.F.

    The disclosure relates to downhole injection of radioactive /sup 82/Br and monitoring its progress through fractured structure to determine the nature thereof. An ampule containing granular /sup 82/Br is remotely crushed and water is repeatedly flushed through it to cleanse the instrument as well as inject the /sup 82/Br into surrounding fractured strata. A sensor in a remote horehole reads progress of the radioactive material through fractured structure.

  20. Apparatus and method for downhole injection of radioactive tracer

    DOE Patents [OSTI]

    Potter, Robert M.; Archuleta, Jacobo R.; Fink, Conrad F.

    1983-01-01

    The disclosure relates to downhole injection of radioactive .sup.82 Br and monitoring its progress through fractured structure to determine the nature thereof. An ampule containing granular .sup.82 Br is remotely crushed and water is repeatedly flushed through it to cleanse the instrument as well as inject the .sup.82 Br into surrounding fractured strata. A sensor in a remote borehole reads progress of the radioactive material through fractured structure.

  1. New User Training: July 15, 2014

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Training New User Training: July 15, 2014 July 15, 2014 NERSC will present a three-hour training for new users on July 15, 2014 from 09:00 to 12:00 PDT. This event is targeted to new users of NERSC and will help them navigate the center and its systems. Location This event will be presented online using WebEx technology and in person at NERSC Oakland Scientific Facility. Please see the remote setup page for connection information. Registration Attendance: 67 There is no registration for the

  2. New User Training: October 30, 2014

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    10/30/2014 New User Training: October 30, 2014 October 30, 2014 NERSC will present a three-hour training for new users on October 30, 2014 from 09:00 to 12:00 PDT. This event is targeted to new users of NERSC and will help them navigate the center and its systems. Location This event will be presented online using WebEx technology and in person at NERSC Oakland Scientific Facility. Please see the remote setup page for connection information. Registration There is no registration for the online

  3. New User Training: Sep. 10, 2013

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Training New User Training: Sep. 10, 2013 September 10, 2013 NERSC will present a four-hour training for new users on Sep. 10, 2013 from 10:00 to 14:00 PDT. This event is targeted to new users of NERSC and will help them navigate the center and its systems. Attemdamce: 104 Location This event will be presented online using WebEx technology and in person at NERSC Oakland Scientific Facility. Please see the remote setup page for connection information. Registration There is no registration for the

  4. Oregon Underground Injection Control Program Authorized Injection...

    Open Energy Info (EERE)

    search OpenEI Reference LibraryAdd to library Web Site: Oregon Underground Injection Control Program Authorized Injection Systems Webpage Author Oregon Department of...

  5. Remote information service access system based on a client-server-service model

    DOE Patents [OSTI]

    Konrad, A.M.

    1996-08-06

    A local host computing system, a remote host computing system as connected by a network, and service functionalities: a human interface service functionality, a starter service functionality, and a desired utility service functionality, and a Client-Server-Service (CSS) model is imposed on each service functionality. In one embodiment, this results in nine logical components and three physical components (a local host, a remote host, and an intervening network), where two of the logical components are integrated into one Remote Object Client component, and that Remote Object Client component and the other seven logical components are deployed among the local host and remote host in a manner which eases compatibility and upgrade problems, and provides an illusion to a user that a desired utility service supported on a remote host resides locally on the user`s local host, thereby providing ease of use and minimal software maintenance for users of that remote service. 16 figs.

  6. Remote information service access system based on a client-server-service model

    DOE Patents [OSTI]

    Konrad, A.M.

    1997-12-09

    A local host computing system, a remote host computing system as connected by a network, and service functionalities: a human interface service functionality, a starter service functionality, and a desired utility service functionality, and a Client-Server-Service (CSS) model is imposed on each service functionality. In one embodiment, this results in nine logical components and three physical components (a local host, a remote host, and an intervening network), where two of the logical components are integrated into one Remote Object Client component, and that Remote Object Client component and the other seven logical components are deployed among the local host and remote host in a manner which eases compatibility and upgrade problems, and provides an illusion to a user that a desired utility service supported on a remote host resides locally on the user`s local host, thereby providing ease of use and minimal software maintenance for users of that remote service. 16 figs.

  7. V-228: RealPlayer Buffer Overflow and Memory Corruption Error Let Remote

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Users Execute Arbitrary Code | Department of Energy 8: RealPlayer Buffer Overflow and Memory Corruption Error Let Remote Users Execute Arbitrary Code V-228: RealPlayer Buffer Overflow and Memory Corruption Error Let Remote Users Execute Arbitrary Code August 27, 2013 - 6:00am Addthis PROBLEM: Two vulnerabilities were reported in RealPlayer PLATFORM: RealPlayer 16.0.2.32 and prior ABSTRACT: A remote user can cause arbitrary code to be executed on the target user's system REFERENCE LINKS:

  8. User Meeting Awards

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User Meeting Awards Print web banner ALS User Meeting Awards See the 2013 User Meeting Awards Winners Home Agenda Awards Exhibitors Lodging Posters Registration Transportation Workshops This e-mail address is being protected from spambots. You need JavaScript enabled to view it User Meeting Archives Users' Executive Committee The ALS Users' Executive Committee invites ALS users and staff to submit nominations in recognition of the people who have made significant contributions to the scientific

  9. JLab Users Group

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    JLab Users Group Please upgrade your browser. This site's design is only visible in a graphical browser that supports web standards, but its content is accessible to any browser. Concerns? JLab Users Group User Liaison Home Users Group Program Advisory Committee User/Researcher Information print version UG Resources Background & Purpose Users Group Wiki By Laws Board of Directors Board of Directors Minutes Directory of Members Events At-A-Glance Member Institutions News Users Group Mailing

  10. LANSCE | Users | LUG | Topical User Workshop

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    2 LANSCE Topical User Meeting | January 9-10 2012 LANSCE Topical User Workshop LANSCE will host the 2012 Topical User Workshop, January 9-10, 2012. We hope to see you there! Registration | Accommodations | Agenda (some presentations are included on the agenda) LANL foreign nationals may register at anytime. | Poster Dimensions: 32 in x 40 in This workshop will solicit user input for the scientific opportunities offered by the pulse stacker and superconducting accelerator that LANSCE has proposed

  11. User Experience Research Templates and Examples: Card Sorting | Department

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    of Energy User Experience Research Templates and Examples: Card Sorting User Experience Research Templates and Examples: Card Sorting User experience research templates and examples for card sorting. Card list for an EERE office remote sort (15.78 KB) Card list (11.2 KB) More Documents & Publications Manufacturing Energy and Carbon Footprint References AIRMaster+ Software Tool Brochure MotorMaster+ Software Tool Brochure

  12. T-680:Samba SWAT 'user' Field Cross Site Scripting Vulnerability

    Broader source: Energy.gov [DOE]

    It was found that the 'Change Password' page / screen of the Samba Web Administration Tool did not properly sanitize content of the user-provided "user" field, prior printing it back to the page content. A remote attacker could provide a specially-crafted URL, which once visited by an authenticated Samba SWAT user could allow the attacker to conduct cross-site scripting attacks (execute arbitrary HTML or script code).

  13. Users' Executive Committee

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Users' Executive Committee Print The ALS Users' Executive Committee (UEC) is responsible for conveying the concerns and interests of users to ALS management. Members are elected annually by ALS users. To contact a member of the UEC, please email This e-mail address is being protected from spambots. You need JavaScript enabled to view it . ALS Users' Executive Committee Web Site ALS Users' Association Charter The current members of the committee (with terms), as of January 1, 2016, are David

  14. Users' Executive Committee

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Users' Executive Committee Print The ALS Users' Executive Committee (UEC) is responsible for conveying the concerns and interests of users to ALS management. Members are elected annually by ALS users. To contact a member of the UEC, please email This e-mail address is being protected from spambots. You need JavaScript enabled to view it . ALS Users' Executive Committee Web Site ALS Users' Association Charter The current members of the committee (with terms), as of January 1, 2016, are David

  15. JLF User Group

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    jlf user group JLF User Group 2015 NIF and JLF User Group Meeting Links: Send request to join the JLF User Group Join the NIF User Group Dr. Carolyn Kuranz - JLF User Group Dr. Carolyn Kuranz received her Ph.D. in Applied Physics from the University of Michigan in 2009. She is currently an Assistant Research Scientist at the Center for Laser Experimental Astrophysical Research and the Center for Radiative Shock Hydrodynamics at the University of Michigan. Her research involves hydrodynamic

  16. User Accounts and Emails

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User Accounts and Emails Print User Accounts Once a User Agreement is signed, users may set up an account for miscellaneous supplies and expenses at the ALS. To establish a user account, please contact This e-mail address is being protected from spambots. You need JavaScript enabled to view it , Budget and Planning, (x 6889). Users can keep track of expenses charged to their Berkeley Lab accounts through the Lab's Integrated Reporting and Information System (IRIS) . User Emails Users may sign up

  17. User Accounts and Emails

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User Accounts and Emails Print User Accounts Once a User Agreement is signed, users may set up an account for miscellaneous supplies and expenses at the ALS. To establish a user account, please contact This e-mail address is being protected from spambots. You need JavaScript enabled to view it , Budget and Planning, (x 6889). Users can keep track of expenses charged to their Berkeley Lab accounts through the Lab's Integrated Reporting and Information System (IRIS) . User Emails Users may sign up

  18. Establish a User Agreement

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    is the document that permits the User andor the home organization to retain ownership of intellectual property. Without the user agreement in place, the University of California...

  19. Aggregate Remote Memory Copy Interface

    Energy Science and Technology Software Center (OSTI)

    2006-02-23

    The purpose of the Aggregate Remote Memory Copy (ARMCI) library is to provide a general- purpose, efficient, and Widely portable remote memory access (RMA) operations (one-sided communication) optimized for Contiguous and noncontiguous (strided, scatter/gather, I/O vector) data transfers. In addition, ARMCI includes a set of atomic and mutual exclusion operations. The development ARMCI is driven by the need to support the global-addres space communication model in context of distributed regular or irregular distributed data structures,more » communication libraries, and compilers. ARMCI is a standalone system that could be used to support user-level libraries and applications that use MPI or PVM.« less

  20. Controlling user access to electronic resources without password

    DOE Patents [OSTI]

    Smith, Fred Hewitt

    2015-06-16

    Described herein are devices and techniques for remotely controlling user access to a restricted computer resource. The process includes pre-determining an association of the restricted computer resource and computer-resource-proximal environmental information. Indicia of user-proximal environmental information are received from a user requesting access to the restricted computer resource. Received indicia of user-proximal environmental information are compared to associated computer-resource-proximal environmental information. User access to the restricted computer resource is selectively granted responsive to a favorable comparison in which the user-proximal environmental information is sufficiently similar to the computer-resource proximal environmental information. In at least some embodiments, the process further includes comparing user-supplied biometric measure and comparing it with a predetermined association of at least one biometric measure of an authorized user. Access to the restricted computer resource is granted in response to a favorable comparison.

  1. Remote information service access system based on a client-server-service model

    DOE Patents [OSTI]

    Konrad, Allan M.

    1997-01-01

    A local host computing system, a remote host computing system as connected by a network, and service functionalities: a human interface service functionality, a starter service functionality, and a desired utility service functionality, and a Client-Server-Service (CSS) model is imposed on each service functionality. In one embodiment, this results in nine logical components and three physical components (a local host, a remote host, and an intervening network), where two of the logical components are integrated into one Remote Object Client component, and that Remote Object Client component and the other seven logical components are deployed among the local host and remote host in a manner which eases compatibility and upgrade problems, and provides an illusion to a user that a desired utility service supported on a remote host resides locally on the user's local host, thereby providing ease of use and minimal software maintenance for users of that remote service.

  2. Remote information service access system based on a client-server-service model

    DOE Patents [OSTI]

    Konrad, Allan M.

    1996-01-01

    A local host computing system, a remote host computing system as connected by a network, and service functionalities: a human interface service functionality, a starter service functionality, and a desired utility service functionality, and a Client-Server-Service (CSS) model is imposed on each service functionality. In one embodiment, this results in nine logical components and three physical components (a local host, a remote host, and an intervening network), where two of the logical components are integrated into one Remote Object Client component, and that Remote Object Client component and the other seven logical components are deployed among the local host and remote host in a manner which eases compatibility and upgrade problems, and provides an illusion to a user that a desired utility service supported on a remote host resides locally on the user's local host, thereby providing ease of use and minimal software maintenance for users of that remote service.

  3. Remote information service access system based on a client-server-service model

    DOE Patents [OSTI]

    Konrad, Allan M.

    1999-01-01

    A local host computing system, a remote host computing system as connected by a network, and service functionalities: a human interface service functionality, a starter service functionality, and a desired utility service functionality, and a Client-Server-Service (CSS) model is imposed on each service functionality. In one embodiment, this results in nine logical components and three physical components (a local host, a remote host, and an intervening network), where two of the logical components are integrated into one Remote Object Client component, and that Remote Object Client component and the other seven logical components are deployed among the local host and remote host in a manner which eases compatibility and upgrade problems, and provides an illusion to a user that a desired utility service supported on a remote host resides locally on the user's local host, thereby providing ease of use and minimal software maintenance for users of that remote service.

  4. SLAC Courier and Remote Login Facility

    SciTech Connect (OSTI)

    Huffer, M.E.

    1987-04-01

    The Courier and Remote Login Facility (CRLF) serves two functions. First, it provides for application programmers a presentation layer protocol called Courier. Courier enforces a remote procedure call discipline and allows the programmer to pass data between systems in a system independent form. Second, it implements a Remote Login Facility. This facility verifies a client's access rights, constructs an environment based on these rights, and starts up a program to process client requested services. Courier allows communication between two system elements (or hosts) by causing the creation of two programs: a user program on the initiating host and a server program on the remote host. Communication then takes place between the cooperating system elements by making appropriate calls to the Courier Interface Library.

  5. V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Users Deny Service | Department of Energy 1: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service January 17, 2013 - 12:00am Addthis PROBLEM: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service PLATFORM: The vulnerability is reported in versions 8.7.1 and 8.7.1.1. ABSTRACT: A vulnerability has been reported in Cisco ASA 1000V Cloud Firewall

  6. T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Users Access or Modify SSL/TLS Sessions | Department of Energy 76: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or Modify SSL/TLS Sessions T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or Modify SSL/TLS Sessions July 26, 2011 - 1:06am Addthis PROBLEM: A vulnerability was reported in Apple iOS. A remote user with the ability to conduct a man-in-the-middle attack can access or modify SSL/TLS sessions. PLATFORM: iOS 4.2.5

  7. T-655: Mozilla Firefox CVE-2011-2369 HTML Injection Vulnerability

    Broader source: Energy.gov [DOE]

    Mozilla Firefox is prone to an HTML-injection vulnerability because it fails to properly sanitize user-supplied input before using it in dynamically generated content.

  8. Franklin: User Experiences

    SciTech Connect (OSTI)

    National Energy Research Supercomputing Center; He, Yun; Kramer, William T.C.; Carter, Jonathan; Cardo, Nicholas

    2008-05-07

    The newest workhorse of the National Energy Research Scientific Computing Center is a Cray XT4 with 9,736 dual core nodes. This paper summarizes Franklin user experiences from friendly early user period to production period. Selected successful user stories along with top issues affecting user experiences are presented.

  9. Managing Your User Account

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Managing Your Account Managing Your User Account Use the NERSC Information Management (NIM) system to customize your user account and keep your personal information up-to-date. See the NIM User's Guide, especially the "Managing Your User Account with NIM" section. Last edited: 2016-04-29 11:35:06

  10. ALS User Meeting

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ALS User Meeting October 3-5, 2011 Lawrence Berkeley National Laboratory, California