Powered by Deep Web Technologies
Note: This page contains sample records for the topic "rsa envision bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: RSA enVision Bugs Permit Cross-Site Scripting, SQL 9: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks March 20, 2012 - 7:00am Addthis PROBLEM: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks PLATFORM: 4.x, prior to 4.1 Patch 4 ABSTRACT: Several vulnerabilities were reported in RSA enVision. A remote user can access the system. A remote authenticated user can conduct cross-site scripting attacks. A remote authenticated user can inject SQL commands. A remote authenticated user can view files on the target system. Reference LINKS: SecurityTracker Alert ID: 1026819 CVE-2012-0403 IMPACT ASSESSMENT: High Discussion: The system does not properly filter HTML code from user-supplied input

2

U-090: RSA enVision Discloses Environment Variable Information...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: RSA enVision Discloses Environment Variable Information to Remote Users U-090: RSA enVision Discloses Environment Variable Information to Remote Users January 27, 2012 - 6:00am...

3

T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

704: RSA enVision Lets Remote Users View Files and Remote 704: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password August 29, 2011 - 3:45am Addthis PROBLEM: Allows remote attackers to obtain sensitive information by sniffing the network or leveraging access to a recipient mailbox. PLATFORM: RSA enVision Version(s): 3.x, 4.x ABSTRACT: RSA enVision lets remote users view files and remote authenticated users obtain password. reference LINKS: SecurityTracker Alert ID: 1025979 CVE-2011-2736 CVE-2011-2737 RSA enVision Product Security IMPACT ASSESSMENT: Medium Discussion: Two vulnerabilities were reported in RSA enVision. A remote user can view files on the target system. A remote authenticated user can obtain

4

T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: RSA enVision Lets Remote Users View Files and Remote 4: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password August 29, 2011 - 3:45am Addthis PROBLEM: Allows remote attackers to obtain sensitive information by sniffing the network or leveraging access to a recipient mailbox. PLATFORM: RSA enVision Version(s): 3.x, 4.x ABSTRACT: RSA enVision lets remote users view files and remote authenticated users obtain password. reference LINKS: SecurityTracker Alert ID: 1025979 CVE-2011-2736 CVE-2011-2737 RSA enVision Product Security IMPACT ASSESSMENT: Medium Discussion: Two vulnerabilities were reported in RSA enVision. A remote user can view files on the target system. A remote authenticated user can obtain

5

V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

26: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions V-026: RSA Data Protection Manager Bugs Permit Cross-Site...

6

U-090: RSA enVision Discloses Environment Variable Information to Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: RSA enVision Discloses Environment Variable Information to 0: RSA enVision Discloses Environment Variable Information to Remote Users U-090: RSA enVision Discloses Environment Variable Information to Remote Users January 27, 2012 - 6:00am Addthis PROBLEM: A vulnerability was reported in RSA enVision PLATFORM: Version(s): 4.0 prior to 4.0 SP4 P5, 4.1 prior to 4.1 P3 ABSTRACT: A remote user can view potentially sensitive data on the target system. reference LINKS: CVE-2011-4143 SecurityTracker Alert ID: 1026591 Secunia Advisory IMPACT ASSESSMENT: Medium Discussion: The security issue is caused due to the application disclosing certain environment variables containing web system setup information via the web interface. Further information about this resolution and other fixes can be found in the Release Notes associated with RSA enVision 4.1, Patch 3 and

7

V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: RSA Data Protection Manager Bugs Permit Cross-Site Scripting 6: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions November 16, 2012 - 6:00am Addthis PROBLEM: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions. PLATFORM: RSA Data Protection Manager Appliance versions 2.7.x and 3.x ABSTRACT: Two vulnerabilities were reported in RSA Data Protection Manager. REFERENCE LINKS: SecurityTracker Alert ID: 1027781 EMC Identifier: ESA-2012-055 RSA Worldwide Customer Support CVE-2012-4612 CVE-2012-4613 IMPACT ASSESSMENT: Medium DISCUSSION: Two vulnerabilities were reported in RSA Data Protection Manager. A remote

8

U-027: RSA Key Manager Appliance Session Logout Bug Fails to Terminate  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: RSA Key Manager Appliance Session Logout Bug Fails to 7: RSA Key Manager Appliance Session Logout Bug Fails to Terminate Sessions U-027: RSA Key Manager Appliance Session Logout Bug Fails to Terminate Sessions November 4, 2011 - 8:00am Addthis PROBLEM: RSA Key Manager Appliance Session Logout Bug Fails to Terminate Sessions. PLATFORM: RSA Key Manager Appliance 2.7 Service Pack 1 ABSTRACT: A remote authenticated user session may not terminate properly. reference LINKS: SecurityTracker Alert ID: 1026276 SecurityFocus Bug Traq Seclists: ESA-2011-035 CVE-2011-2740 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in RSA Key Manager Appliance. A remote authenticated user session may not terminate properly. When using Firefox 4 and 5, an authenticated user session is not terminated properly when logging out.

9

U-061: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: RSA Adaptive Authentication Bugs Let Remote Users Bypass 1: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain Security Controls U-061: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain Security Controls December 14, 2011 - 8:17am Addthis PROBLEM: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain Security Controls. PLATFORM: 6.0.2.1 SP1 Patch 2 and SP1 Patch 3 6.0.2.1 SP2 and SP2 Patch 1 6.0.2.1 SP3 ABSTRACT: A remote user may be able to bypass certain security controls. reference LINKS: SecurityTracker Alert ID: 1026420 Security Focus: ESA-2011-036 IMPACT ASSESSMENT: Medium Discussion: Two vulnerabilities were reported in RSA Adaptive Authentication (On-Premise). A remote user may be able to bypass certain security controls. A remote user can send specially crafted data elements to affect the Device

10

Water Bugs  

NLE Websites -- All DOE Office Websites (Extended Search)

Bugs Bugs Nature Bulletin No. 221-A March 12, 1966 Forest Preserve District of Cook County Seymour Simon, President Roland F. Eisenbeis, Supt. of Conservation WATER BUGS It is fascinating to lie in a boat or on a log at the edge of the water and watch the drama that unfolds among the small water animals. Among the star performers in small streams and ponds are the Water Bugs. These are aquatic members of that large group of insects called the "true bugs", most of which live on land. Moreover, unlike many other types of water insects, they do not have gills but get their oxygen directly from the air. Those that do go beneath the surface usually carry an oxygen supply with them in the form of a shiny glistening sheath of air imprisoned among a covering of fine waterproof hairs. The common water insect known to small boys at the "Whirligig Bug" is not a water bug but a beetle.

11

Factorization of a 512-bit RSA modulus  

Science Conference Proceedings (OSTI)

This paper reports on the factorization of the 512-bit number RSA-155 by the Number Field Sieve factoring method (NFS) and discusses the implications for RSA.

Stefania Cavallar; Bruce Dodson; Arjen K. Lenstra; Walter Lioen; Peter L. Montgomery; Brian Murphy; Herman Te Riele; Karen Aardal; Jeff Gilchrist; Gérard Guillerm; Paul Leyland; Joël Marchand; François Morain; Alec Muffett; Chris Putnam; Craig Putnam; Paul Zimmermann

2000-05-01T23:59:59.000Z

12

Using Two-Factor RSA Token  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Using Two-Factor RSA Token Using Two-Factor RSA Token with VPN User Guide November 2013 Using Your RSA token with WebVPN 1. Establish a connection to the Internet and connect to https://connect.doe.gov 2. Users who are using their RSA Token for the first time should follow the steps below for PIN creation. Others who have already set up their PIN and used their RSA token previously should enter their six digit numeric username and passcode; this is the PIN + the RSA token code. The result of this successful login will be Step 8 below. 3. A login page similar to the picture below will be displayed. Enter your VPN Username (six-digit numeric ID) and your Password by typing your generated RSA Token code and then click the Login button. Example; your generated RSA token code is 032848 (from above). In the Password box, you will enter

13

CRT RSA algorithm protected against fault attacks  

Science Conference Proceedings (OSTI)

Embedded devices performing RSA signatures are subject to Fault Attacks, particularly when the Chinese Remainder Theorem is used. In most cases, the modular exponentiation and the Garner recombination algorithms are targeted. To thwart Fault Attacks, ... Keywords: RSA, chinese remainder theorem, fault attacks, modular exponentiation, simple power analysis, smart card

Arnaud Boscher; Robert Naciri; Emmanuel Prouff

2007-05-01T23:59:59.000Z

14

The RSA Group is Pseudo-Free  

E-Print Network (OSTI)

Rivest, On the notion of pseudo-free groups. In: Theory ofImplicit function theorem over free groups. J. Algebra 290(The RSA Group is Pseudo-Free ? Daniele Micciancio Department

Micciancio, Daniele

2010-01-01T23:59:59.000Z

15

Bug Wars: a competitive exercise to find bugs in code  

Science Conference Proceedings (OSTI)

Software bugs are a common problem that students encounter in any Computer Science program. "Bug Wars" is a fun and competitive class exercise for student teams to identify bugs in code. To prepare for the competition, the instructor provides several ...

Renee Bryce

2011-12-01T23:59:59.000Z

16

V-103: RSA Authentication Agent Lets Remote Users Bypass Authentication  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: RSA Authentication Agent Lets Remote Users Bypass 3: RSA Authentication Agent Lets Remote Users Bypass Authentication Requirements V-103: RSA Authentication Agent Lets Remote Users Bypass Authentication Requirements March 4, 2013 - 12:27am Addthis PROBLEM: RSA Authentication Agent Lets Remote Users Bypass Authentication Requirements PLATFORM: RSA Authentication Agent 7.1, 7.1.1 for Microsoft Windows ABSTRACT: A vulnerability was reported in RSA Authentication Agent. REFERENCE LINKS: RSA SecurCare SecurityTracker Alert ID: 1028230 CVE-2013-0931 IMPACT ASSESSMENT: Medium DISCUSSION: On systems configured for Quick PIN Unlock, the system will request a PIN instead of a full Passcode when the session is activated from an active screensaver after the Quick PIN Unlock timeout has expired. RSA Authentication Agent on Windows Vista, Windows 7, Windows 2008, and

17

Massive June Bug Emergence  

NLE Websites -- All DOE Office Websites (Extended Search)

Massive June Bug Emergence Massive June Bug Emergence Name: Cordell Location: N/A Country: N/A Date: N/A Question: We are infested with june bugs next to the street light near the end of my driveway. They have burrowed into the ground and underneath my driveway. Yesterday we shoveled 2/3 of a 33-gallon trash bag of just bugs. What can we spray or do to kill these june bugs? Replies: Not knowing which part of the country you are from and I could be wrong because of this fact buy this does not sound like June Bugs. This has to be a Circadia outbreak which are relatives to the June Bug. They run in 13, 17 or other year cycles and this depends upon the part of the country you are from. Ask a local garden center or naturalist and you'll probably see that this won't happen again for a number of years to come.

18

T-582: RSA systems has resulted in certain information being extracted from  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: RSA systems has resulted in certain information being 2: RSA systems has resulted in certain information being extracted from RSA systems that relates to RSA SecurID T-582: RSA systems has resulted in certain information being extracted from RSA systems that relates to RSA SecurID March 17, 2011 - 11:45pm Addthis PROBLEM: Recently EMC's security systems identified an extremely sophisticated cyber attack in progress, targeting their RSA business unit. RSA took a variety of aggressive measures against the threat to protect their business and their customers, including further hardening of their IT infrastructure. PLATFORM: RSA SecurID implementations ABSTRACT: RSA investigation has revealed that the attack resulted in certain information being extracted from RSA's systems. Some of that information is related to RSA's SecurID two-factor authentication products.

19

Trendy Bugs Topic Trends in the Android Bug Reports  

E-Print Network (OSTI)

Trendy Bugs Topic Trends in the Android Bug Reports Lee Martie, Vijay Krishna Palepu, Hitesh {lmartie, vpalepu, hsajnani, lopes}@ics.uci.edu Abstract--Studying vast volumes of bug and issue public issue tracker. This informs us of the features or parts of the project that are more problematic

Jones, James A.

20

T-642: RSA SecurID update to Customers | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: RSA SecurID update to Customers 2: RSA SecurID update to Customers T-642: RSA SecurID update to Customers June 9, 2011 - 12:45am Addthis PROBLEM: Certain characteristics of the attack on RSA indicated that the perpetrator's most likely motive was to obtain an element of security information that could be used to target defense secrets and related IP, rather than financial gain, PII, or public embarrassment. PLATFORM: RSA SecurID implementations ABSTRACT: RSA investigation has revealed that the attack resulted in certain information being extracted from RSA's systems. Some of that information is related to RSA's SecurID two-factor authentication products. reference LINKS: Open Letter to RSA Customers (update) CVE-2011-0322 RSA Fraud Resource Center RSA Security Practice DOE-CIRC T-640: RSA Access Manager Server CVE-2011-0322 Update

Note: This page contains sample records for the topic "rsa envision bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

Mining succinct predicated bug signatures  

Science Conference Proceedings (OSTI)

A bug signature is a set of program elements highlighting the cause or effect of a bug, and provides contextual information for debugging. In order to mine a signature for a buggy program, two sets of execution profiles of the program, one capturing ... Keywords: bug signature, feature selection, statistical debugging

Chengnian Sun; Siau-Cheng Khoo

2013-08-01T23:59:59.000Z

22

T-696: RSA Adaptive Authentication Has Unspecified Remote Authenticated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: RSA Adaptive Authentication Has Unspecified Remote 6: RSA Adaptive Authentication Has Unspecified Remote Authenticated Session Re-use Flaw T-696: RSA Adaptive Authentication Has Unspecified Remote Authenticated Session Re-use Flaw August 18, 2011 - 3:09pm Addthis PROBLEM: A vulnerability was reported in RSA Adaptive Authentication. PLATFORM: 6.0.2.1 SP1 Patch 2 and SP1 Patch 3, 6.0.2.1 SP2 and SP2 Patch 1, 6.0.2.1 SP3 ABSTRACT: An issue with Adaptive Authentication (On-Premise) was discovered which in certain circumstances might affect the out-of-the-box available authentication methods. In certain circumstances, when authentication information is compromised, and with the knowledge of additional session information, the authentication information might be reused within an active session. reference LINKS: Security Tracker: 1025956

23

T-640: RSA Access Manager Server CVE-2011-0322 Update | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: RSA Access Manager Server CVE-2011-0322 Update 0: RSA Access Manager Server CVE-2011-0322 Update T-640: RSA Access Manager Server CVE-2011-0322 Update June 7, 2011 - 5:18pm Addthis PROBLEM: ESA-2011-009 (revised): RSA, The Security Division of EMC, announces new fix for potential security vulnerability in RSA Access Manager Server. PLATFORM: RSA Access Manager Server version 5.5.x, 6.0.x, and 6.1.x ABSTRACT: RSA strongly recommends that all customers running RSA Access Manager Server versions 5.5.3, 6.0.4, and 6.1 apply the following updated security hot fixes, which contain the resolution to this issue, at the earliest opportunity. The hot fixes can be downloaded from SecurCare Online or by contacting RSA Security Customer Support. ?Security Hot fix # 5.5.3.174 for RSA Access Manager Server version 5.5.3

24

V-195: RSA Authentication Manager Lets Local Users View the Administrative  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

95: RSA Authentication Manager Lets Local Users View the 95: RSA Authentication Manager Lets Local Users View the Administrative Account Password V-195: RSA Authentication Manager Lets Local Users View the Administrative Account Password July 9, 2013 - 12:51am Addthis PROBLEM: RSA Authentication Manager Lets Local Users View the Administrative Account Password PLATFORM: RSA Authentication Manager 7.1, 8.0 ABSTRACT: A vulnerability was reported in RSA Authentication Manager. REFERENCE LINKS: SecurityTracker Alert ID: 1028742 CVE-2013-3273 RSA IMPACT ASSESSMENT: Medium DISCUSSION: When the RSA Authentication Manager Software Development Kit (SDK) is used to develop a custom application that connects with RSA Authentication Manager and the trace logging is set to verbose, the administrative account password used by the custom application is written in clear text to trace

25

Efficient concurrency-bug detection across inputs  

Science Conference Proceedings (OSTI)

In the multi-core era, it is critical to efficiently test multi-threaded software and expose concurrency bugs before software release. Previous work has made significant progress in detecting and validating concurrency bugs under a given input. Unfortunately, ... Keywords: bug detection, concurrency bugs, multi-threaded software, software testing

Dongdong Deng, Wei Zhang, Shan Lu

2013-10-01T23:59:59.000Z

26

V-034: RSA Adaptive Authentication (On-Premise) Input Validation Flaws  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: RSA Adaptive Authentication (On-Premise) Input Validation 4: RSA Adaptive Authentication (On-Premise) Input Validation Flaws Permit Cross-Site Scripting Attacks V-034: RSA Adaptive Authentication (On-Premise) Input Validation Flaws Permit Cross-Site Scripting Attacks November 27, 2012 - 2:00am Addthis PROBLEM: RSA Adaptive Authentication (On-Premise) Input Validation Flaws Permit Cross-Site Scripting Attacks PLATFORM: RSA Adaptive Authentication (On-Premise) 6.x ABSTRACT: A vulnerability was reported in RSA Adaptive Authentication (On-Premise). REFERENCE LINKS: SecurityTracker Alert ID: 1027811 SecurityFocus Security Alert RSA Customer Support CVE-2012-4611 IMPACT ASSESSMENT: Medium DISCUSSION: A vulnerability was reported in RSA Adaptive Authentication (On-Premise). A remote user can conduct cross-site scripting attacks. The software does not

27

V-159: RSA SecurID Agent Discloses Node Secret Encryption Key...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Agent Discloses Node Secret Encryption Key to Local Users PLATFORM: RSA Authentication API versions prior to 8.1 SP1 RSA Web Agent for Apache Web Server versions prior to 5.3.5...

28

U-063: RSA SecurID Software Token for Windows DLL Loading Error...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code U-063: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote...

29

bug | OpenEI Community  

Open Energy Info (EERE)

bug bug Home Rmckeel's picture Submitted by Rmckeel(297) Contributor 20 July, 2012 - 07:55 Image upload with broken thumbnail image bug images wiki OpenEI users can upload images to the wiki by typing a new file name http://en.openei.org/wiki/File:My_new_file.jpg However, due to a caching timing issue, right after upload, the 120px-wide thumbnail has not yet been created by the time the fetier cache goes after it. Thus, the thumbnail appears broken. Is anyone up for debugging? For users uploading images, this can be fixed by forcing a reload of the page: Rmckeel's picture Submitted by Rmckeel(297) Contributor 19 June, 2012 - 08:04 "Ghost" entries bug utility rate There is an issue that Illinois State University has come across. From Nick B: Syndicate content 429 Throttled (bot load)

30

Envision: a user-centered database of computer science literature  

Science Conference Proceedings (OSTI)

Project Envision is an early NSF-funded digital library effort to develop a multimedia collection of computer science literature with full-text searching and full-content retrieval capabilities. Envision was launched in 1991 in accordance with the ACM ...

Lenwood S. Heath; Deborah Hix; Lucy T. Nowell; William C. Wake; Guillermo A. Averboch; Eric Labow; Scott A. Guyer; Dennis J. Brueni; Robert K. France; Kaushai Dalal; Edward A. Fox

1995-04-01T23:59:59.000Z

31

Team Bug Bag Biogas For Nicaragua  

E-Print Network (OSTI)

Team Bug Bag Biogas For Nicaragua Project Recap The task for Team Bug Bag was to create for under $100 (USD), and be able to produce biogas that could boil water for a thirty minute time period

Demirel, Melik C.

32

U-063: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: RSA SecurID Software Token for Windows DLL Loading Error 3: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code U-063: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code December 16, 2011 - 8:00am Addthis PROBLEM: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code. PLATFORM: RSA SecurID Software Token 4.1 for Microsoft Windows ABSTRACT: A remote user can cause the target application to execute arbitrary code on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026426 ESA-2011-039 Secunia Advisory: SA45665 Securityfocus Advisory CVE-2011-4141 RSA Online Fraud Resource Center IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in RSA SecurID Software Token. A remote user

33

U-063: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

63: RSA SecurID Software Token for Windows DLL Loading Error 63: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code U-063: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code December 16, 2011 - 8:00am Addthis PROBLEM: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code. PLATFORM: RSA SecurID Software Token 4.1 for Microsoft Windows ABSTRACT: A remote user can cause the target application to execute arbitrary code on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026426 ESA-2011-039 Secunia Advisory: SA45665 Securityfocus Advisory CVE-2011-4141 RSA Online Fraud Resource Center IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in RSA SecurID Software Token. A remote user

34

V-174: RSA Authentication Manager Writes Operating System, SNMP, and HTTP  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: RSA Authentication Manager Writes Operating System, SNMP, 4: RSA Authentication Manager Writes Operating System, SNMP, and HTTP Plug-in Proxy Passwords in Clear Text to Log Files V-174: RSA Authentication Manager Writes Operating System, SNMP, and HTTP Plug-in Proxy Passwords in Clear Text to Log Files June 10, 2013 - 12:47am Addthis PROBLEM: RSA Authentication Manager Writes Operating System, SNMP, and HTTP Plug-in Proxy Passwords in Clear Text to Log Files PLATFORM: RSA Authentication Manager 8.0 ABSTRACT: A vulnerability was reported in RSA Authentication Manager. REFERENCE LINKS: RSA SecurityTracker Alert ID: 1028638 CVE-2013-0947 IMPACT ASSESSMENT: Medium DISCUSSION: The system may write operating system, SNMP, and HTTP plug-in proxy passwords in clear text to log and configuration files. IMPACT: A local user can obtain operating system, SNMP, and HTTP plug-in proxy

35

U-120: RSA SecurID Software Token Converter Unspecified Buffer Overflow  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: RSA SecurID Software Token Converter Unspecified Buffer 0: RSA SecurID Software Token Converter Unspecified Buffer Overflow Vulnerability U-120: RSA SecurID Software Token Converter Unspecified Buffer Overflow Vulnerability March 8, 2012 - 7:00am Addthis PROBLEM: RSA SecurID Software Token Converter Unspecified Buffer Overflow Vulnerability PLATFORM: RSA SecurID Software Token Converter 2.x ABSTRACT: Successful exploitation may allow execution of arbitrary code. reference LINKS: Secunia Advisory SA48297 CVE-2012-0397 IMPACT ASSESSMENT: High Discussion: A vulnerability has been reported in RSA SecurID Software Token Converter, which can be exploited by malicious people to compromise a user's system. Impact: An unspecified error can be exploited to cause a buffer overflow. Solution: Update to version 2.6.1. Addthis Related Articles

36

U-212: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: RSA Authentication Manager Flaws Permit Cross-Site and 2: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks U-212: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks July 13, 2012 - 7:00am Addthis PROBLEM: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks PLATFORM: RSA Authentication Manager 7.1 is vulnerable; other versions may also be affected. ABSTRACT: RSA Authentication Manager is prone to multiple security vulnerabilities because it fails to properly sanitize user-supplied input. Attackers can exploit these issues to execute arbitrary script or HTML code, steal cookie-based authentication credentials, and conduct phishing attacks. Other attacks may also be possible.

37

New Member of EM's Leadership Team Envisions Success Following  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

New Member of EM's Leadership Team Envisions Success Following New Member of EM's Leadership Team Envisions Success Following Reorganization New Member of EM's Leadership Team Envisions Success Following Reorganization February 1, 2012 - 12:00pm Addthis Alice Williams was named EM’s Associate Principal Deputy Assistant Secretary on Jan. 1. Alice Williams was named EM's Associate Principal Deputy Assistant Secretary on Jan. 1. WASHINGTON, D.C. - Alice Williams was named EM's Associate Principal Deputy Assistant Secretary on Jan. 1. Williams recently talked with EM Update about her role in EM's new organizational structure, which is based on a matrix construct and facilitates collaborative decision-making around shared goals and objectives. This structure aims to better align the program to achieve success in the Cold War cleanup. As part of its

38

V-202: Cisco Video Surveillance Manager Bugs Let Remote Users...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain Potentially Sensitive Information V-202: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain Potentially...

39

V-149: Microsoft Internet Explorer Object Access Bug Lets Remote...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code V-149: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary...

40

Scale Insects and Mealy Bugs  

NLE Websites -- All DOE Office Websites (Extended Search)

Scale Insects and Mealy Bugs Scale Insects and Mealy Bugs Nature Bulletin No. 404-A January 30, 1971 Forest Preserve District of Cook County George W. Dunne, President Roland F. Eisenbeis, Supt. of Conservation SCALE INSECTS AND MEALY BUGS The insect world contains an enormous number and variety of species but, of them all, the Scale Insects and Mealy Bugs come nearest to being vegetables. Most insects are active animals that fly, hop, scamper, crawl or burrow, but these queer creatures spend most of their lives merely sitting in one spot, sucking plant juices from a branch, twig, leaf, or fruit. Some of our most destructive pests are included among the several hundred kinds of these highly specialized insects. They are so small that the average person seldom realizes that they are responsible for the sickly or dying condition of a tree or shrub. Adult scale insects are extremely variable in shape, and range in size from that of a pinhead up to forms which are a quarter of an inch long. Each hides under a hard protective shell, or scale, of wax secreted by pores on its body, and are frequently so numerous that they form a dense crust. The females molt a few times, and usually discard their legs and wings, before they mature. She lays eggs under the scale and then dies. These hatch into young (called "crawlers") which move around for a period varying from a few hours to a day or two before they settle down and build scales. Unlike the female, the male -always the smaller of the two -- goes through a cocoon stage from which he emerges with a pair of wings but with no means of taking food. He merely mates and dies. Males are scarce In most kinds and in many species have never been seen.

Note: This page contains sample records for the topic "rsa envision bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

V-234: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: EMC RSA Archer GRC Open Redirection Weakness and Security 4: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass Security Issue V-234: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass Security Issue September 4, 2013 - 6:00am Addthis PROBLEM: A weakness and a security issue have been reported in EMC RSA Archer GRC PLATFORM: EMC RSA Archer GRC 5.x ABSTRACT: This fixes multiple vulnerabilities, which can be exploited to bypass certain security restrictions and to conduct spoofing attacks REFERENCE LINKS: Secunia Advisory SA54717 SecurityTracker Alert ID 1028971 EMC Identifier: ESA-2013-057 CVE-2013-3276 CVE-2013-3277 IMPACT ASSESSMENT: Medium DISCUSSION: 1) The application does not properly restrict deactivated users. This can be exploited by deactivated users to login and gain access to otherwise

42

V-223: RSA Authentication Agent for PAM Allows Remote Users to Make  

NLE Websites -- All DOE Office Websites (Extended Search)

3: RSA Authentication Agent for PAM Allows Remote Users to Make 3: RSA Authentication Agent for PAM Allows Remote Users to Make Unlimited Login Attempts V-223: RSA Authentication Agent for PAM Allows Remote Users to Make Unlimited Login Attempts August 21, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in RSA Authentication Agent for PAM PLATFORM: RSA Authentication Agent for PAM 7.0.2 and prior ABSTRACT: A remote user can make unlimited login attempts REFERENCE LINKS: Security Tracker Alert ID 1028930 CVE-2013-3271 IMPACT ASSESSMENT: Medium DISCUSSION: The system does not restrict the number of login attempts made via the agent IMPACT: System Access SOLUTION: Vendor has issued a fix Addthis Related Articles U-267: RSA® Authentication Agent 7.1 for Microsoft Windows® and RSA® Authentication Client 3.5 Access Control Vulnerability

43

Finding and understanding bugs in C compilers  

Science Conference Proceedings (OSTI)

Compilers should be correct. To improve the quality of C compilers, we created Csmith, a randomized test-case generation tool, and spent three years using it to find compiler bugs. During this period we reported more than 325 previously unknown bugs ... Keywords: automated testing, compiler defect, compiler testing, random program generation, random testing

Xuejun Yang; Yang Chen; Eric Eide; John Regehr

2011-06-01T23:59:59.000Z

44

U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: RSA Access Manager Session Replay Flaw Lets Remote Users 5: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System July 5, 2012 - 7:02am Addthis PROBLEM: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System PLATFORM: Version(s): Server version 6.0.x, 6.1, 6.1 SP1, 6.1 SP2, 6.1 SP3; all Agent versions ABSTRACT: A vulnerability was reported in RSA Access Manager. A remote user can gain access to the target system. reference LINKS: SecurityFocus ESA-2012-026 SecurityTracker Alert ID: 1027220 CVE-2012-2281 RSA SecurCare Online MPACT ASSESSMENT: Medium Discussion: RSA Access Manager contains a vulnerability that can be potentially exploited by a malicious user to replay the session with compromised session tokens. This is due to improper invalidation of session tokens

45

U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

205: RSA Access Manager Session Replay Flaw Lets Remote Users 205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System July 5, 2012 - 7:02am Addthis PROBLEM: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System PLATFORM: Version(s): Server version 6.0.x, 6.1, 6.1 SP1, 6.1 SP2, 6.1 SP3; all Agent versions ABSTRACT: A vulnerability was reported in RSA Access Manager. A remote user can gain access to the target system. reference LINKS: SecurityFocus ESA-2012-026 SecurityTracker Alert ID: 1027220 CVE-2012-2281 RSA SecurCare Online MPACT ASSESSMENT: Medium Discussion: RSA Access Manager contains a vulnerability that can be potentially exploited by a malicious user to replay the session with compromised session tokens. This is due to improper invalidation of session tokens

46

V-084: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain Access,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

84: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain 84: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain Access, Clickjacking, and File Upload Attacks V-084: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain Access, Clickjacking, and File Upload Attacks February 5, 2013 - 12:01am Addthis PROBLEM: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain Access, Clickjacking, and File Upload Attacks PLATFORM: RSA Archer SmartSuite Framework version 4.x RSA Archer GRC version 5.x ABSTRACT: Several vulnerabilities were reported in RSA Archer eGRC. REFERENCE LINKS: Security Alert: ESA-2013-002 SecurityTracker Alert ID: 1028073 CVE-2012-1064 CVE-2012-2292 CVE-2012-2293 CVE-2012-2294 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can cause arbitrary scripting code to be executed by the target user's browser [CVE-2012-1064]. The code will originate from the

47

U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL  

NLE Websites -- All DOE Office Websites (Extended Search)

259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic 259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL Buffer Overflow Lets Remote Users Execute Arbitrary Code U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL Buffer Overflow Lets Remote Users Execute Arbitrary Code September 13, 2012 - 6:00am Addthis PROBLEM: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL Buffer Overflow Lets Remote Users Execute Arbitrary Code PLATFORM: RSA BSAFE SSL-C prior to 2.8.6 ABSTRACT: RSA BSAFE SSL-C Multiple Vulnerabilities reference LINKS: Secunia Advisory SA50601 SecurityTracker Alert ID: 1027514 SecurityTracker Alert ID: 1027513 CVE-2011-3389 CVE-2012-2110 CVE-2012-2131 IMPACT ASSESSMENT: High Discussion: EMC has acknowledged a weakness and a vulnerability in RSA BSAFE, which can

48

Dynamically fighting bugs : prevention, detection and elimination  

E-Print Network (OSTI)

This dissertation presents three test-generation techniques that are used to improve software quality. Each of our techniques targets bugs that are found by different stake-holders: developers, testers, and maintainers. ...

Artzi, Shay

2009-01-01T23:59:59.000Z

49

U-153: EMC Data Protection Advisor Server and Collector Bugs...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: EMC Data Protection Advisor Server and Collector Bugs Let Remote Users Deny Service U-153: EMC Data Protection Advisor Server and Collector Bugs Let Remote Users Deny Service...

50

V-128: Xen Event Channel Tracking Pointer Bug Local Privilege...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Xen Event Channel Tracking Pointer Bug Local Privilege Escalation V-128: Xen Event Channel Tracking Pointer Bug Local Privilege Escalation April 8, 2013 - 12:28am Addthis...

51

Mining Bug Databases for Unidentified Software Vulnerabilities  

SciTech Connect

Identifying software vulnerabilities is becoming more important as critical and sensitive systems increasingly rely on complex software systems. It has been suggested in previous work that some bugs are only identified as vulnerabilities long after the bug has been made public. These vulnerabilities are known as hidden impact vulnerabilities. This paper discusses the feasibility and necessity to mine common publicly available bug databases for vulnerabilities that are yet to be identified. We present bug database analysis of two well known and frequently used software packages, namely Linux kernel and MySQL. It is shown that for both Linux and MySQL, a significant portion of vulnerabilities that were discovered for the time period from January 2006 to April 2011 were hidden impact vulnerabilities. It is also shown that the percentage of hidden impact vulnerabilities has increased in the last two years, for both software packages. We then propose an improved hidden impact vulnerability identification methodology based on text mining bug databases, and conclude by discussing a few potential problems faced by such a classifier.

Dumidu Wijayasekara; Milos Manic; Jason Wright; Miles McQueen

2012-06-01T23:59:59.000Z

52

Public-Key Cryptography Standards (PKCS) #1: RSA Cryptography Specifications Version 2.1  

Science Conference Proceedings (OSTI)

This memo represents a republication of PKCS #1 v2.1 from RSA Laboratories' Public-Key Cryptography Standards (PKCS) series, and change control is retained within the PKCS process. The body of this document is taken directly from the PKCS #1 v2.1 document, ...

J. Jonsson; B. Kaliski

2003-02-01T23:59:59.000Z

53

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

71 - 1880 of 28,905 results. 71 - 1880 of 28,905 results. Download EA-1388: Final Environmental Assessment Ground Water Compliance at the Shiprock Uranium Mill Tailings Site http://energy.gov/nepa/downloads/ea-1388-final-environmental-assessment Download Document Management & Control System (DMCS) http://energy.gov/cio/downloads/document-management-control-system-dmcs Article U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks Several vulnerabilities were reported in RSA enVision. A remote user can access the system. A remote authenticated user can conduct cross-site scripting attacks. A remote authenticated user can inject SQL commands. A remote authenticated user can view files on the target system. http://energy.gov/cio/articles/u-129-rsa-envision-bugs-permit-cross-site-scripting-sql-injection-and-directory

54

U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information...

55

UNIXUNIXUNIXUNIX((((OpenSSHOpenSSHOpenSSHOpenSSH)))) (gw.ps.nifs.ac.jp) RSA  

E-Print Network (OSTI)

pdf SSH SSH SSH UNIXUNIXUNIXUNIX((((OpenSSHOpenSSHOpenSSHOpenSSH)))) ssh (gw.ps.nifsTerm: New connection TCP/IP gw.ps.nifs.ac.jp %ssh (-i ) (-l ) gw.ps.nifs.ac.jp The authenticity of host 'gw.ps.nifs.ps.nifs.ac.jp,133.75.37.11' (RSA) to the list of known hosts. Enter passphrase for key '/home

Ito, Atsushi

56

An approach to detecting duplicate bug reports using natural language and execution information  

Science Conference Proceedings (OSTI)

An open source project typically maintains an open bug repository so that bug reports from all over the world can be gathered. When a new bug report is submitted to the repository, a person, called a triager, examines whether it is a duplicate of an ... Keywords: duplicate bug report, execution information, information retrieval

Xiaoyin Wang; Lu Zhang; Tao Xie; John Anvik; Jiasu Sun

2008-05-01T23:59:59.000Z

57

U-141: Sourcefire Defense Center Bugs | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Sourcefire Defense Center Bugs 1: Sourcefire Defense Center Bugs U-141: Sourcefire Defense Center Bugs April 5, 2012 - 8:30am Addthis PROBLEM: Sourcefire Defense Center Bugs Let Remote Users Traverse the Directory, Access the Database, and Conduct Cross-Site Scripting Attacks PLATFORM: Version(s): prior to 4.10.2.3 ABSTRACT: Several vulnerabilities were reported in Sourcefire Defense Center. A remote user can conduct cross-site scripting attacks. A remote user can access the database. A remote user can view files on the target system reference LINKS: Original Advisory Security Tracker ID 1026890 Secunia Advisory 48667 IMPACT ASSESSMENT: Medium Discussion: A remote user can cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the Sourcefire Defense

58

U-141: Sourcefire Defense Center Bugs | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Sourcefire Defense Center Bugs 1: Sourcefire Defense Center Bugs U-141: Sourcefire Defense Center Bugs April 5, 2012 - 8:30am Addthis PROBLEM: Sourcefire Defense Center Bugs Let Remote Users Traverse the Directory, Access the Database, and Conduct Cross-Site Scripting Attacks PLATFORM: Version(s): prior to 4.10.2.3 ABSTRACT: Several vulnerabilities were reported in Sourcefire Defense Center. A remote user can conduct cross-site scripting attacks. A remote user can access the database. A remote user can view files on the target system reference LINKS: Original Advisory Security Tracker ID 1026890 Secunia Advisory 48667 IMPACT ASSESSMENT: Medium Discussion: A remote user can cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the Sourcefire Defense

59

U-092: Sudo Format String Bug Lets Local Users Gain Elevated...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Sudo Format String Bug Lets Local Users Gain Elevated Privileges U-092: Sudo Format String Bug Lets Local Users Gain Elevated Privileges January 31, 2012 - 5:45am Addthis...

60

V-183: Cisco TelePresence TC and TE Bugs Let Remote Users Deny...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Cisco TelePresence TC and TE Bugs Let Remote Users Deny Service and Remote Adjacent Authenticated Users Gain Root Shell Access V-183: Cisco TelePresence TC and TE Bugs Let...

Note: This page contains sample records for the topic "rsa envision bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

V-016: HP Performance Insight Bugs with Sybase Database Let Remote...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Performance Insight Bugs with Sybase Database Let Remote Users Deny Service and Take Full Control of the Target System V-016: HP Performance Insight Bugs with Sybase Database Let...

62

U-045: Windows Win32k.sys Keyboard Layout Bug Lets Local Users...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny Service U-045: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny Service November 25, 2011 - 9:00am...

63

T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

68: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request Forgery Attacks and Execute Arbitrary Code T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site...

64

Microsoft Word - BUGS_The Next Smart Grid Peak Resource Final...  

NLE Websites -- All DOE Office Websites (Extended Search)

April 15, 2010 DOENETL-20101406 Backup Generators (BUGS): The Next Smart Grid Peak Resource Backup Generators (BUGS): The Next Smart Grid Peak Resource v1.0 ii DISCLAIMER This...

65

Bed bugs are blood-sucking insects in the family Cimicidae. Both nymphs  

E-Print Network (OSTI)

- trol this pest. IDENTIFICATION AND LIFE CYCLE Adult bed bugs (Figure 1) are oval, wing- less, about 1/5 inch long, and rusty red or mahogany. Their bodies are flattened, they have well-developed antennae, conenose bugs (also known as kissing bugs), by their smaller size, more rounded shape, and lack of wings

Hammock, Bruce D.

66

ConAir: featherweight concurrency bug recovery via single-threaded idempotent execution  

Science Conference Proceedings (OSTI)

Many concurrency bugs are hidden in deployed software and cause severe failures for end-users. When they finally manifest and become known by developers, they are difficult to fix correctly. To support end-users, we need techniques that ... Keywords: bug fixing, concurrency bugs, failure recovery, idempotency, static analysis

Wei Zhang; Marc de Kruijf; Ang Li; Shan Lu; Karthikeyan Sankaralingam

2013-04-01T23:59:59.000Z

67

Microsoft Word - Final BUGS article final.docx  

NLE Websites -- All DOE Office Websites (Extended Search)

October 18, 2010 DOE/NETL-2010/1435 BUGS: The Next Smart Grid Peak Resource? BUGS: The Next Smart Grid Peak Resource? 2 Prepared by: Booz Allen Hamilton (BAH) Steve Pullins Horizon Energy Group DOE Contract number: DE-FE000400 BUGS: The Next Smart Grid Peak Resource? 3 Acknowledgements This report was prepared by Booz Allen Hamilton, Inc. (BAH) for the United States Department of Energy's National Energy Technology Laboratory. This work was completed under DOE NETL Contract Number DE-FE000400, and performed under BAH Task 430.04. The authors wish to acknowledge the excellent guidance, contributions, and cooperation of the NETL staff, particularly: Steven Bossart, Integrated Electric Power Systems Division Director Keith Dodrill, Integrated Electric Power Systems Division NETL Technical Monitor

68

Brown Marmorated The brown marmorated stink bug (BMSB), Halyomorpha  

E-Print Network (OSTI)

abdominal edge extending beyond wings MATURE NYMPH Banded antennae Spines in front of eyes and on shoulder edges Banded legs Dark bands on wing tips Blue-green metallic depressions on head and shoulder,UC JACKKELLYCLARK,UC RED SHOULDERED STINK BUG Edgeofabdomenconcealed;antennal bands, if present, are not white; less

Ishida, Yuko

69

Is this a bug or an obsolete test?  

Science Conference Proceedings (OSTI)

In software evolution, developers typically need to identify whether the failure of a test is due to a bug in the source code under test or the obsoleteness of the test code when they execute a test suite. Only after finding the cause of a failure can ...

Dan Hao, Tian Lan, Hongyu Zhang, Chao Guo, Lu Zhang

2013-07-01T23:59:59.000Z

70

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

31, 2011 31, 2011 T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass Authentication or Obtain Information Apache Tomcat AJP protocol processing bug lets remote users bypass authentication or obtain information. August 30, 2011 T-706: Microsoft Fraudulent Digital Certificate Issued by DigiNotar Fraudulent Digital Certificate Issued by DigiNotar, a Certification Authority Present in the Trusted Root Certification Authorities August 30, 2011 T-705: Linux Kernel Weakness in Sequence Number Generation Facilitates Packet Injection Attacks Linux Kernel Weakness in Sequence Number Generation Facilitates Packet Injection Attacks. August 29, 2011 T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password RSA enVision lets remote users view files and remote authenticated users

71

T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

68: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site 68: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request Forgery Attacks and Execute Arbitrary Code T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request Forgery Attacks and Execute Arbitrary Code March 2, 2011 - 3:05pm Addthis PROBLEM: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request Forgery Attacks and Execute Arbitrary Code. PLATFORM: Firefox, Thunderbird, SeaMonkey ABSTRACT: Mozilla developers identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and Mozilla presume that with enough effort at least some of these could be exploited to run arbitrary code. reference LINKS:

72

Metabolic engineering of microorganisms for biofuels production: from bugs to synthetic biology to fuels  

E-Print Network (OSTI)

DK, Weiss R: Synthetic biology: new engineering rules for anfrom bugs to synthetic biology to fuels Sung Kuk Lee, Howardengineering and synthetic biology will provide new tools for

Kuk Lee, Sung

2010-01-01T23:59:59.000Z

73

OpenEI/URDB Bug? | OpenEI Community  

Open Energy Info (EERE)

OpenEI/URDB Bug? OpenEI/URDB Bug? Home > Groups > Utility Rate Clarknd's picture Submitted by Clarknd(20) Member 26 November, 2012 - 07:39 I ran into a problem today on the Utility Rate Database (URDB). Every time I select the "Assume net metering (buy = sell)" box and go to save the page for some reason it doesn't save that change and reverts back to "No" rather than "Yes". Groups: Utility Rate Login to post comments Latest discussions Rmckeel New page curation tool Posted: 7 May 2013 - 08:16 by Rmckeel Rmckeel Considering removing "Show Preview" button on utility rate form edit Posted: 22 Apr 2013 - 13:55 by Rmckeel 5 comment(s) 1 of 10 ›› Groups Menu You must login in order to post into this group. Latest discussion comments NickL

74

DON'T LET THE BED BUGS BITE We've all heard the saying, "sleep tight, don't let the bed bugs bite." Most of us have never  

E-Print Network (OSTI)

and appear bright red after feeding. The wings of bed bugs are vestigial, so they cannot fly. Bed bugs can. Small, flat, or raised bumps on the skin are the most common sign; redness, swelling, and itching

Bertini, Robert L.

75

Catch me if you can: performance bug detection in the wild  

Science Conference Proceedings (OSTI)

Profilers help developers to find and fix performance problems. But do they find performance bugs -- performance problems that real users actually notice? In this paper we argue that -- especially in the case of interactive applications -- traditional ... Keywords: latency bug, perceptible performance, profiling

Milan Jovic; Andrea Adamoli; Matthias Hauswirth

2011-10-01T23:59:59.000Z

76

WuKong: automatically detecting and localizing bugs that manifest at large system scales  

Science Conference Proceedings (OSTI)

A key challenge in developing large scale applications is finding bugs that are latent at the small scales of testing, but manifest themselves when the application is deployed at a large scale. Here, we ascribe a dual meaning to "large scale"---it could ... Keywords: feature reconstruction, program behavior prediction, scale-dependent bug

Bowen Zhou; Jonathan Too; Milind Kulkarni; Saurabh Bagchi

2013-06-01T23:59:59.000Z

77

T-700:Red Hat: kernel security, bug fix, and enhancement update |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

700:Red Hat: kernel security, bug fix, and enhancement update 700:Red Hat: kernel security, bug fix, and enhancement update T-700:Red Hat: kernel security, bug fix, and enhancement update August 24, 2011 - 3:45pm Addthis PROBLEM: Updated kernel packages that fix several security issues, various bugs, and add two enhancements are now available for Red Hat Enterprise Linux 6. PLATFORM: Red Hat Enterprise Linux Desktop (v. 6) Red Hat Enterprise Linux HPC Node (v. 6) Red Hat Enterprise Linux Server (v. 6) Red Hat Enterprise Linux Server EUS (v. 6.1.z) Red Hat Enterprise Linux Workstation (v. 6) ABSTRACT: Red Hat: kernel security, bug fix, and enhancement update. reference LINKS: RHSA-2011: 1189-1 Secunia Advisory: SA45746 Red Hat Download CVE-2011-1182 , CVE-2011-1576 CVE-2011-1593 , CVE-2011-1776 CVE-2011-1898 , CVE-2011-2183

78

V-040: Apache Tomcat Bug Lets Remote Users Bypass Security Constraints |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Apache Tomcat Bug Lets Remote Users Bypass Security 0: Apache Tomcat Bug Lets Remote Users Bypass Security Constraints V-040: Apache Tomcat Bug Lets Remote Users Bypass Security Constraints December 5, 2012 - 1:00am Addthis PROBLEM: Apache Tomcat Bug Lets Remote Users Bypass Security Constraints PLATFORM: Version(s): 6.0.0 - 6.0.35, 7.0.0 - 7.0.29 ABSTRACT: A vulnerability was reported in Apache Tomcat. REFERENCE LINKS: Apache Tomcat Red Hat Bugzilla - Bug 883634 SecurityTracker Alert ID: 1027833 CVE-2012-3546 IMPACT ASSESSMENT: High DISCUSSION: When using FORM authentication it was possible to bypass the security constraint checks in the FORM authenticator by appending /j_security_check to the end of the URL if some other component (such as the Single-Sign-On valve) had called request.setUserPrincipal() before the call to

79

V-098: Linux Kernel Extended Verification Module Bug Lets Local Users Deny  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Linux Kernel Extended Verification Module Bug Lets Local 8: Linux Kernel Extended Verification Module Bug Lets Local Users Deny Service V-098: Linux Kernel Extended Verification Module Bug Lets Local Users Deny Service February 25, 2013 - 12:12am Addthis PROBLEM: Linux Kernel Extended Verification Module Bug Lets Local Users Deny Service PLATFORM: The Linux Kernel prior to 3.7.5 ABSTRACT: A vulnerability was reported in the Linux Kernel. REFERENCE LINKS: The Linux Kernel Archives Linux Kernel Red Hat Bugzilla - Bug 913266 SecurityTracker Alert ID: 1028196 CVE-2013-0313 IMPACT ASSESSMENT: Medium DISCUSSION: A local user can exploit a null pointer dereference in the evm_update_evmxattr() function in 'security/integrity/evm/evm_crypto.c' to cause the target system to crash. IMPACT: A local user can cause denial of service conditions.

80

U-068:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated 8:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated Privileges U-068:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated Privileges December 23, 2011 - 8:45am Addthis PROBLEM: Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated Privileges PLATFORM: Red Hat Enterprise Linux Desktop (v. 6) Red Hat Enterprise Linux HPC Node (v. 6) Red Hat Enterprise Linux Server (v. 6) Red Hat Enterprise Linux Server AUS (v. 6.2) Red Hat Enterprise Linux Server EUS (v. 6.2.z) Red Hat Enterprise Linux Workstation (v. 6) ABSTRACT: A local privileged user on the guest operating system can obtain elevated privileges on the target system. reference LINKS: Red Hat kernel security and bug fix update SecurityTracker Alert ID: 1026453 SecurityTracker Alert ID: 1026454

Note: This page contains sample records for the topic "rsa envision bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

42: HP Onboard Administrator Bugs Let Remote Users Gain Access, 42: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks April 6, 2012 - 7:00am Addthis PROBLEM: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks PLATFORM: HP Onboard Administrator (OA) up to and including v3.32 ABSTRACT: A remote user can obtain potentially sensitive information. reference LINKS: HP Support Document ID: c03263573 SecurityTracker Alert ID: 1026889 CVE-2012-0128, CVE-2012-0129, CVE-2012-0130 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in HP Onboard Administrator. A remote

82

V-189: Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users Deny  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users 9: Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users Deny Service on the Target Host V-189: Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users Deny Service on the Target Host July 1, 2013 - 12:48am Addthis PROBLEM: Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users Deny Service on the Target Host PLATFORM: VirtualBox 4.2.12 ABSTRACT: A vulnerability was reported in Oracle VirtualBox. REFERENCE LINKS: VirtualBox ticket: 11863 SecurityTracker Alert ID: 1028712 IMPACT ASSESSMENT: Medium DISCUSSION: A local user on the guest operating system can issue a 'tracepath' command to cause the network on the target host system to become unavailable. IMPACT: A local user on a guest operating system can cause denial of service conditions on the target host system.

83

U-137: HP Performance Manager Unspecified Bug Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: HP Performance Manager Unspecified Bug Lets Remote Users 7: HP Performance Manager Unspecified Bug Lets Remote Users Execute Arbitrary Codes U-137: HP Performance Manager Unspecified Bug Lets Remote Users Execute Arbitrary Codes March 30, 2012 - 9:15am Addthis PROBLEM: HP Performance Manager Unspecified Bug Lets Remote Users Execute Arbitrary Codes PLATFORM: HP-UX B.11.31 HP-UX B.11.23 ABSTRACT: A remote user can execute arbitrary code on the target system. REFERENCE LINKS: HP Support Document ID: c03255321 SecurityTracker Alert ID: 1026869 CVE-2012-0127 IMPACT ASSESSMENT: High Discussion: A potential security vulnerability has been identified with HP Performance Manager running on HP-UX, Linux, Solaris, and Windows. The vulnerability could be exploited remotely to execute arbitrary code and to create a Denial of Service (DoS).

84

V-063: Adobe ColdFusion Bugs Let Remote Users Gain Access and Obtain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Adobe ColdFusion Bugs Let Remote Users Gain Access and 3: Adobe ColdFusion Bugs Let Remote Users Gain Access and Obtain Information V-063: Adobe ColdFusion Bugs Let Remote Users Gain Access and Obtain Information January 7, 2013 - 1:00am Addthis PROBLEM: Adobe ColdFusion Bugs Let Remote Users Gain Access and Obtain Information PLATFORM: ColdFusion 10, 9.0.2, 9.0.1 and 9.0 for Windows, Macintosh and UNIX ABSTRACT: Adobe has identified three vulnerabilities affecting ColdFusion for Windows, Macintosh and UNIX REFERENCE LINKS: Adobe Security Bulletin APSA13-01 SecurityTracker Alert ID: 1027938 CVE-2013-0625 CVE-2013-0629 CVE-2013-0631 IMPACT ASSESSMENT: High DISCUSSION: A remote user can bypass authentication and take control of the target system [CVE-2013-0625]. Systems with password protection disabled or with no password set are affected.

85

U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: HP Onboard Administrator Bugs Let Remote Users Gain Access, 2: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks April 6, 2012 - 7:00am Addthis PROBLEM: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks PLATFORM: HP Onboard Administrator (OA) up to and including v3.32 ABSTRACT: A remote user can obtain potentially sensitive information. reference LINKS: HP Support Document ID: c03263573 SecurityTracker Alert ID: 1026889 CVE-2012-0128, CVE-2012-0129, CVE-2012-0130 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in HP Onboard Administrator. A remote

86

U-052: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: HP Protect Tools Device Access Manager Unspecified Bug Lets 2: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code U-052: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code December 6, 2011 - 7:00am Addthis PROBLEM: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code. PLATFORM: HP Protect Tools Device Access Manager for Windows earlier than v.6.1.0.1 running on the following HP PCs: HP EliteBook 2560p Notebook PC HP EliteBook 2760p Notebook PC HP EliteBook 8460p Notebook PC HP EliteBook 8460w Mobile Workstation HP EliteBook 8560p Notebook PC HP EliteBook 8560w Mobile Workstation HP EliteBook 8760w Mobile Workstation HP ProBook 4230s Notebook PC

87

U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Cisco IOS Intrusion Prevention System DNS Processing Bug 9: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service September 27, 2012 - 4:07am Addthis PROBLEM: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service PLATFORM: Devices configured with Cisco IOS IPS are affected ABSTRACT: A vulnerability was reported in Cisco IOS. reference LINKS: SecurityTracker Alert ID: 1027580 Cisco Security Advisory CVE-2012-3950 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Cisco IOS. A remote user can cause denial of service conditions. A remote user can send specially crafted (but legitimate) DNS packets through the target device to cause the device to

88

U-203: HP Photosmart Bug Lets Remote Users Deny Service | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

03: HP Photosmart Bug Lets Remote Users Deny Service 03: HP Photosmart Bug Lets Remote Users Deny Service U-203: HP Photosmart Bug Lets Remote Users Deny Service July 2, 2012 - 8:00am Addthis PROBLEM: HP Photosmart Bug Lets Remote Users Deny Service PLATFORM: HP Photosmart Wireless e-All-in-One Printer series - B110 HP Photosmart e-All-in-One Printer series - D110 HP Photosmart Plus e-All-in-One Printer series - B210 HP Photosmart eStation All-in-One Printer series - C510 HP Photosmart Ink Advantage e-All-in-One Printer series - K510 HP Photosmart Premium Fax e-All-in-One Printer series - C410 ABSTRACT: A vulnerability was reported in HP Photosmart. A remote user can cause denial of service conditions. Reference LINKS: The Vendor's Advisory SecurityTracker Alert ID: 1027213 CVE-2012-2017 IMPACT ASSESSMENT: High Discussion:

89

U-231: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

31: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service 31: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service U-231: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service August 9, 2012 - 7:00am Addthis PROBLEM: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service PLATFORM: Version(s): ASA 5500 Series; 8.2 - 8.4 ABSTRACT: Two vulnerabilities were reported in Cisco ASA. A remote or remote authenticated user can cause denial of service conditions. reference LINKS: Release Notes for the Cisco ASA 5500 Series, 8.4(x) SecurityTracker Alert ID: 1027355 CVE-2012-2472 CVE-2012-2474 IMPACT ASSESSMENT: Medium Discussion: Two vulnerabilities were reported in Cisco ASA. 1. On systems with SIP inspection enabled, a remote user can send specially crafted SIP traffic to cause the target device to create many identical

90

U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, 2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information July 27, 2012 - 7:00am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information PLATFORM: Version(s):Apple Safari prior to 6.0 ABSTRACT: Multiple vulnerabilities were reported in Apple Safari. reference LINKS: The Vendor's Advisory Bugtraq ID: 54683 SecurityTracker Alert ID: 1027307 IMPACT ASSESSMENT:

91

V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site 0: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information April 23, 2013 - 12:26am Addthis PROBLEM: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information PLATFORM: Apache ActiveMQ versions prior to 5.8.0 ABSTRACT: Several vulnerabilities were reported in Apache ActiveMQ. REFERENCE LINKS: Apache ActiveMQ SecurityTracker Alert ID: 1028457 CVE-2012-6092 CVE-2012-6551 CVE-2013-3060 IMPACT ASSESSMENT: High DISCUSSION: Several web demos do not properly filter HTML code from user-supplied input

92

U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

41: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 41: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information August 22, 2012 - 7:00am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information PLATFORM: Adobe Flash Player 11.3.300.271 and earlier versions for Windows, Macintosh and Linux operating systems Adobe Flash Player 11.1.115.11 and earlier versions for Android 4.x Adobe Flash Player 11.1.111.10 and earlier versions for Android 3.x and 2.x Adobe AIR 3.3.0.3670 and earlier versions for Windows and Macintosh Adobe AIR 3.3.0.3690 SDK (includes AIR for iOS) and earlier versions Adobe AIR 3.3.0.3650 and earlier versions for Android ABSTRACT:

93

T-712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement  

NLE Websites -- All DOE Office Websites (Extended Search)

712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and 712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update T-712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update September 8, 2011 - 10:30am Addthis PROBLEM: A flaw was discovered in Cumin where it would log broker authentication credentials to the Cumin log file. A vulnerability was reported in Red Hat Enterprise MRG Grid. A local user can access the broker password. PLATFORM: Red Hat Enterprise MRG v2 for Red Hat Enterprise Linux (version 5) ABSTRACT: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update. reference LINKS: RHSA-2011:1249-1 SecurityTracker Alert ID: 1026021 CVE-2011-2925 IMPACT ASSESSMENT: Medium Discussion: A local user exploiting this flaw could connect to the broker outside of Cumin's control and perform certain operations such as scheduling jobs,

94

T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users 7: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass Authentication or Obtain Information T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass Authentication or Obtain Information August 31, 2011 - 12:00pm Addthis PROBLEM: A vulnerability was reported in Apache Tomcat. A remote user can bypass authentication or obtain potentially sensitive information. PLATFORM: Apache Tomcat 5.5.0 to 5.5.33, 6.0.0 to 6.0.33, 7.0.0 to 7.0.20 ABSTRACT: Apache Tomcat AJP protocol processing bug lets remote users bypass authentication or obtain information. reference LINKS: SecurityTracker Alert ID: 1025993 CVE-2011-3190 (under review) Apache Tomcat Security Updates IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Apache Tomcat. A remote user can bypass

95

T-589: Citrix XenApp and Citrix Presentation Server Bug | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

89: Citrix XenApp and Citrix Presentation Server Bug 89: Citrix XenApp and Citrix Presentation Server Bug T-589: Citrix XenApp and Citrix Presentation Server Bug March 28, 2011 - 3:05pm Addthis PROBLEM: Citrix XenApp and Citrix Presentation Server Bug in ActiveSync Lets Remote Users Execute Arbitrary Code. PLATFORM: Citrix XenApp Presentation versions 4.5, 5 ABSTRACT: A vulnerability was reported in Citrix XenApp (Presentation Server). A remote user can execute arbitrary code on the target system. -------------------------------------------------------------------------------- LINKS: DOE-CIRC BULLETIN: http://www.doecirc.energy.gov/bulletins/t-589.shtml OTHER LINKS: Citrix Document: CTX128366 SecurityTracker Alert ID: 1025254 Citrix Support Technical Support Downloads --------------------------------------------------------------------------------

96

U-055: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 5: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code U-055: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code December 8, 2011 - 8:30am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code . PLATFORM: Adobe Flash Player 11.1.102.55 on Windows and Mac OS X and prior versions ABSTRACT: Two vulnerabilities exploited by the Intevydis vd_adobe_fp module in VulnDisco Step Ahead were reported in Adobe Flash Player. reference LINKS: Secunia Advisory: SA47161 SecurityTracker Alert ID: 1026392 CVE-2011-4693 CVE-2011-4694 IMPACT ASSESSMENT: High Discussion: A remote or local user can obtain potentially sensitive information. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a specially crafted SWF file that, when

97

U-025: HP OpenView Network Node Manager Bugs Let Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-025: HP OpenView Network Node Manager Bugs Let Remote Users U-025: HP OpenView Network Node Manager Bugs Let Remote Users Execute Arbitrary Code U-025: HP OpenView Network Node Manager Bugs Let Remote Users Execute Arbitrary Code November 2, 2011 - 8:00am Addthis PROBLEM: HP OpenView Network Node Manager Bugs Let Remote Users Execute Arbitrary Code. PLATFORM: HP OpenView Network Node Manager (OV NNM) v7.51, v7.53 running on HP-UX, Linux, Solaris, and Windows ABSTRACT: A remote user can execute arbitrary code on the target system. reference LINKS: HP Support Center Document ID: c03054052 SecurityTracker Alert ID: 1026260 CVE-2011-1365 CVE-2011-1366 CVE-2011-1367 IMPACT ASSESSMENT: Medium Discussion: Several vulnerabilities were reported in HP OpenView Network Node Manager. A remote user can execute arbitrary code on the target system.

98

U-052: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: HP Protect Tools Device Access Manager Unspecified Bug Lets 2: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code U-052: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code December 6, 2011 - 7:00am Addthis PROBLEM: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code. PLATFORM: HP Protect Tools Device Access Manager for Windows earlier than v.6.1.0.1 running on the following HP PCs: HP EliteBook 2560p Notebook PC HP EliteBook 2760p Notebook PC HP EliteBook 8460p Notebook PC HP EliteBook 8460w Mobile Workstation HP EliteBook 8560p Notebook PC HP EliteBook 8560w Mobile Workstation HP EliteBook 8760w Mobile Workstation HP ProBook 4230s Notebook PC

99

U-071:HP Database Archiving Software Bugs Let Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1:HP Database Archiving Software Bugs Let Remote Users Execute 1:HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code U-071:HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code December 29, 2011 - 8:15am Addthis PROBLEM: HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code PLATFORM: HP Database Archiving Software v6.31 ABSTRACT: A remote user can execute arbitrary code on the target system. reference LINKS: HP Database Document ID: c03128302 SecurityTracker Alert ID: 1026467 CVE-2011-4163 CVE-2011-4164 CVE-2011-4165 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in HP Database Archiving Software. A remote user can execute arbitrary code on the target system. Impact: A remote user can execute arbitrary code on the target system. Solution:

100

V-015: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, 5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information V-015: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information November 2, 2012 - 6:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information PLATFORM: Apple iOS prior to 6.0.1 ABSTRACT: Three vulnerabilities were reported in Apple iOS. REFERENCE LINKS: Apple Article: HT5567 SecurityTracker Alert ID: 1027716 Bugtraq ID: 56363 CVE-2012-3748 CVE-2012-3749 CVE-2012-3750 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the

Note: This page contains sample records for the topic "rsa envision bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

U-118: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

18: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 18: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information U-118: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information March 6, 2012 - 7:00am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information PLATFORM: Adobe Flash Player 10.x, Adobe Flash Player 11.x ABSTRACT: Two vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can obtain potentially information. reference LINKS: Secunia Advisory SA48281 CVE-2012-0769 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will trigger a memory corruption error in Matrix3D and execute

102

V-078: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: WordPress Bugs Permit Cross-Site Scripting and Port Scanning 8: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks V-078: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks January 28, 2013 - 12:32am Addthis PROBLEM: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks PLATFORM: WordPress all versions are affected prior to 3.5.1 ABSTRACT: WordPress 3.5.1 Maintenance and Security Release REFERENCE LINKS: WordPress News SecurityTracker Alert ID: 1028045 Secunia Advisory SA51967 IMPACT ASSESSMENT: Medium DISCUSSION: Several scripts do not properly filter HTML code from user-supplied input before displaying the input. A remote user can cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the site running the WordPress software and will run in the security

103

U-210: Linux Kernel epoll_ctl() Bug Lets Local Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

10: Linux Kernel epoll_ctl() Bug Lets Local Users Deny Service 10: Linux Kernel epoll_ctl() Bug Lets Local Users Deny Service U-210: Linux Kernel epoll_ctl() Bug Lets Local Users Deny Service July 11, 2012 - 7:00am Addthis PROBLEM: Linux Kernel epoll_ctl() Bug Lets Local Users Deny Service PLATFORM: Version(s): 2.6.x ABSTRACT: A vulnerability was reported in the Linux Kernel. A local user can cause denial of service conditions. reference LINKS: The Vendor's Advisory SecurityTracker Alert ID: 1027237 SecurityTracker Alert ID: 1027240 Red Hat advisory CVE-2012-3375 IMPACT ASSESSMENT: Medium Discussion: The Linux kernel's Event Poll (epoll) subsystem does not properly handle resource clean up when an ELOOP error code is returned. A local user can exploit this to cause the target system to crash. Impact: A local user can cause the target system to crash.

104

U-008: Symantec Data Loss Prevention Bugs in KeyView Filter Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

08: Symantec Data Loss Prevention Bugs in KeyView Filter Lets 08: Symantec Data Loss Prevention Bugs in KeyView Filter Lets Remote Users Deny Service U-008: Symantec Data Loss Prevention Bugs in KeyView Filter Lets Remote Users Deny Service October 11, 2011 - 8:00am Addthis PROBLEM: Symantec Data Loss Prevention Bugs in KeyView Filter Lets Remote Users Deny Service PLATFORM: Symantec Data Loss Prevention Enforce/Detection Servers for Windows 10.x, 11.x ABSTRACT: A remote user can create a file that, when processed by the target filter, will cause partial denial of service conditions. reference LINKS: Symantec Security Advisory SYM11-013 SecurityTracker Alert ID: 1026157 IMPACT ASSESSMENT: Medium Discussion: Multiple vulnerabilities were reported in Symantec Data Loss Prevention. A remote user can cause denial of service conditions on the target system.A

105

U-217: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Red Hat Certificate System Bugs Let Remote Users Conduct 7: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site Scripting and Denial of Service Attacks U-217: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site Scripting and Denial of Service Attacks July 20, 2012 - 7:00am Addthis PROBLEM: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site Scripting and Denial of Service Attacks PLATFORM: Red Hat Certificate System v8 ABSTRACT: Two vulnerabilities were reported in Red Hat Certificate System. A remote user can conduct cross-site scripting attacks. A remote authenticated user can revoke the CA certificate. reference LINKS: Advisory: RHSA-2012:1103-1 SecurityTracker Alert ID: 1027284 CVE-2012-2662 CVE-2012-3367 IMPACT ASSESSMENT: Medium Discussion: The Agent and End Entity pages do not properly filter HTML code from

106

U-168: EMC Documentum Information Rights Management Server Bugs Let Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

168: EMC Documentum Information Rights Management Server Bugs Let 168: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service U-168: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service May 14, 2012 - 7:00am Addthis PROBLEM: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service PLATFORM: Information Rights Management Server 4.x, 5.x ABSTRACT: Two vulnerabilities were reported in EMC Documentum Information Rights Management Server. A remote authenticated user can cause denial of service conditions. Reference links: SecurityTracker Alert ID: 1027058 CVE-2012-2276 CVE-2012-2277 IMPACT ASSESSMENT: High Discussion: A remote authenticated user can send specially crafted data to trigger a NULL pointer dereference and cause the target service to crash. A remote

107

U-130: JBoss Operations Network LDAP Authentication Bug Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: JBoss Operations Network LDAP Authentication Bug Lets Remote 0: JBoss Operations Network LDAP Authentication Bug Lets Remote Users Bypass Authentication U-130: JBoss Operations Network LDAP Authentication Bug Lets Remote Users Bypass Authentication March 21, 2012 - 7:00am Addthis PROBLEM: JBoss Operations Network LDAP Authentication Bug Lets Remote Users Bypass Authentication PLATFORM: JBoss Operations Network 2.x ABSTRACT: A vulnerability was reported in JBoss Operations Network. A remote user can login with an arbitrary password in certain cases. reference LINKS: SecurityTracker Alert ID: 1026826 Secunia Advisory SA48471 CVE-2012-1100 IMPACT ASSESSMENT: Medium Discussion: The vulnerability is caused due to an error within the Lightweight Directory Access Protocol (LDAP) authentication when handling invalid bind account credentials, which can be exploited to log-in to LDAP-based

108

V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

10: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 10: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code March 13, 2013 - 12:04am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): 1.6.602.171 and prior for Windows/Mac; other versions on other platforms ABSTRACT: Several vulnerabilities were reported in Adobe Flash Player. REFERENCE LINKS: Adobe Vulnerability identifier: APSB13-09 SecurityTracker Alert ID: 1028277 CVE-2013-0646 CVE-2013-0650 CVE-2013-1371 CVE-2013-1375 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user.

109

U-074: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Microsoft .NET Bugs Let Remote Users Execute Arbitrary 4: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users U-074: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users January 4, 2012 - 8:00am Addthis PROBLEM: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users . PLATFORM: Windows XP Service Pack 3 Windows XP Professional x64 Edition Service Pack 2 Windows Server 2003 Service Pack 2 Windows Server 2003 x64 Edition Service Pack 2 Windows Server 2003 with SP2 for Itanium-based Systems Windows Vista Service Pack 2 Windows Vista x64 Edition Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 Windows Server 2008 for x64-based Systems Service Pack 2

110

U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain 9: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication May 1, 2012 - 7:00am Addthis PROBLEM: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication PLATFORM: Red Hat Enterprise MRG v2 for Red Hat Enterprise Linux (version 6) ABSTRACT: A vulnerability was reported in Red Hat Enterprise MRG Messaging. A remote user can access cluster messages and view the internal configuration. reference LINKS: SecurityTracker Alert ID: 1026990 CVE-2011-3620 Red Hat advisory IMPACT ASSESSMENT: High Discussion: Qpid may accept arbitrary passwords and SASL mechanims. A remote user on the local private interconnect network with knowledge of a valid cluster

111

V-016: HP Performance Insight Bugs with Sybase Database Let Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: HP Performance Insight Bugs with Sybase Database Let Remote 6: HP Performance Insight Bugs with Sybase Database Let Remote Users Deny Service and Take Full Control of the Target System V-016: HP Performance Insight Bugs with Sybase Database Let Remote Users Deny Service and Take Full Control of the Target System November 5, 2012 - 6:00am Addthis PROBLEM: HP Performance Insight Bugs with Sybase Database Let Remote Users Deny Service and Take Full Control of the Target System PLATFORM: HP Performance Insight v5.31, v5.40 and v5.41 running on HP-UX, Solaris, Linux, and Windows and using Sybase as the database ABSTRACT: Two vulnerabilities were reported in HP Performance Insight. REFERENCE LINKS: HP Support Document ID: c03555488 SecurityTracker Alert ID: 1027719 CVE-2012-3269 CVE-2012-3270 IMPACT ASSESSMENT: High DISCUSSION:

112

U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

57: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny 57: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service September 12, 2012 - 6:00am Addthis PROBLEM: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service PLATFORM: ColdFusion 10, 9.0.2, 9.0.1, 9.0, 8.0.1, and 8.0 for Windows, Macintosh and UNIX ABSTRACT: Adobe ColdFusion is prone to a remote denial-of-service vulnerability. reference LINKS: Adobe Security bulletins and advisories Adobe Vulnerability identifier: APSB12-21 SecurityTracker Alert ID: 1027516 Bugtraq ID: 55499 CVE-2012-2048 IMPACT ASSESSMENT: Medium Discussion: Adobe has released a security hotfix for ColdFusion 10 and earlier versions for Windows, Macintosh and UNIX. This update resolves a vulnerability which

113

V-146: HP Service Manager Bugs Permit Cross-Site Scripting and Information  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: HP Service Manager Bugs Permit Cross-Site Scripting and 6: HP Service Manager Bugs Permit Cross-Site Scripting and Information Disclosure Attacks V-146: HP Service Manager Bugs Permit Cross-Site Scripting and Information Disclosure Attacks May 1, 2013 - 12:43am Addthis PROBLEM: HP Service Manager Bugs Permit Cross-Site Scripting and Information Disclosure Attacks PLATFORM: Service Manager v9.31 Web Tier ABSTRACT: Two vulnerabilities were reported in HP Service Manager REFERENCE LINKS: HP Document ID: c03748875 SecurityTracker Alert ID: 1028496 CVE-2012-5222 CVE-2013-2321 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can obtain potentially sensitive information [CVE-2012-5222]. Service Manager Web Tier does not properly filter HTML code from user-supplied input before displaying the input [CVE-2013-2321]. A remote

114

U-079: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

79: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute 79: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code U-079: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code January 11, 2012 - 8:00am Addthis PROBLEM: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code. PLATFORM: Adobe Acrobat/Reader Version(s): 9.x prior to 9.5, 10.x prior to 10.1.2 ABSTRACT: A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026496 Adobe Security Bulletin APSB12-01 CVE-2011-2462, CVE-2011-4369, CVE-2011-4370, CVE-2011-4371, CVE-2011-4372, CVE-2011-4373. IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in Adobe Acrobat/Reader. A remote

115

U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

21: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, 21: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information March 9, 2012 - 7:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information PLATFORM: Apple iOS Version(s): prior to 5.1 ABSTRACT: Multiple vulnerabilities were reported in Apple iOS. reference LINKS: SecurityTracker Alert ID: 1026774 Apple Security Updates About the security content of iOS 5.1 Software Update CVE-2012-0641, CVE-2012-0642, CVE-2012-0643, CVE-2011-3453, CVE-2012-0644,

116

U-233: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote 3: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote Authenticated Users Gain Elevated Privileges U-233: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote Authenticated Users Gain Elevated Privileges August 13, 2012 - 7:00am Addthis PROBLEM: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote Authenticated Users Gain Elevated Privileges PLATFORM: Oracle Database Server versions 10.2.0.3, 10.2.0.4, 10.2.0.5, 11.1.0.7, 11.2.0.2, 11.2.0.3 ABSTRACT: A remote authenticated user with 'Create Table' privileges can gain 'SYS' privileges on the target system. Reference LINKS: Oracle Security Alert Oracle Security Alert - CVE-2012-3132 Risk Matrices SecurityTracker Alert ID: 1027367 CVE-2012-3132 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Oracle Database. This vulnerability is not

117

U-026: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Cisco Small Business SRP500 Series Bug Lets Remote Users 6: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject Commands U-026: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject Commands November 3, 2011 - 8:15am Addthis PROBLEM: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject Commands. PLATFORM: The following models are affected when running firmware prior to version 1.1.24: Cisco SRP521W Cisco SRP526W Cisco SRP527W The following models are affected when running firmware prior to version 1.2.1: Cisco SRP541W Cisco SRP546W Cisco SRP547W ABSTRACT: A remote user can create a URL that, when loaded by the target authenticated administrative user, will execute arbitrary commands on the target system. reference LINKS: Advisory ID: cisco-sa-20111102-srp500 SecurityTracker Alert ID: 1026266

118

U-155: WebCalendar Access Control and File Inclusion Bugs Let Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: WebCalendar Access Control and File Inclusion Bugs Let 5: WebCalendar Access Control and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code U-155: WebCalendar Access Control and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code April 25, 2012 - 7:00am Addthis PROBLEM: WebCalendar Access Control and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code PLATFORM: 1.2.4 and prior versions ABSTRACT: Two vulnerabilities were reported in WebCalendar. A remote user may be able to execute arbitrary PHP code on the target system. reference links: SecurityTracker Alert ID: 1026966 CVE-2012-1495 CVE-2012-1496 IMPACT ASSESSMENT: Medium Discussion: A remote user can access '/install/index.php' to potentially modify '/includes/settings/' with arbitrary values or PHP code. A remote

119

T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3:Adobe Flash Player Multiple Bugs Let Remote Users Obtain 3:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code September 22, 2011 - 8:00am Addthis PROBLEM: Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code. PLATFORM: Adobe Flash Player 10.3.183.7 and earlier versions for Windows, Macintosh, Linux and Solaris. Adobe Flash Player 10.3.186.6 and earlier versions for Android. ABSTRACT: An attacker can exploit this issue by enticing an unsuspecting victim into visiting a malicious website. reference LINKS: Adobe Security Bulletin

120

V-037: Wireshark Multiple Bugs Let Remote Users Deny Service | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Wireshark Multiple Bugs Let Remote Users Deny Service 7: Wireshark Multiple Bugs Let Remote Users Deny Service V-037: Wireshark Multiple Bugs Let Remote Users Deny Service November 30, 2012 - 3:30am Addthis PROBLEM: Wireshark Multiple Bugs Let Remote Users Deny Service PLATFORM: Version(s): prior to 1.6.12, 1.8.4 ABSTRACT: Several vulnerabilities were reported in Wireshark. REFERENCE LINKS: Wireshark Security Advisories Secunia Advisory SA51422 Seclists SecurityTracker Alert ID: 1027822 CVE-2012-5592 CVE-2012-5593 CVE-2012-5594 CVE-2012-5595 CVE-2012-5596 CVE-2012-5597 CVE-2012-5598 CVE-2012-5599 CVE-2012-5600 CVE-2012-5601 CVE-2012-5602 IMPACT ASSESSMENT: Medium DISCUSSION: Several vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions. A user can obtain potentially sensitive information.

Note: This page contains sample records for the topic "rsa envision bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

U-163: PHP Command Parameter Bug Lets Remote Users Obtain Potentially  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: PHP Command Parameter Bug Lets Remote Users Obtain 3: PHP Command Parameter Bug Lets Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code U-163: PHP Command Parameter Bug Lets Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code May 7, 2012 - 7:00am Addthis PROBLEM: PHP Command Parameter Bug Lets Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code PLATFORM: Prior to 5.3.12 and 5.4.2 ABSTRACT: A vulnerability was reported in PHP. A remote user can obtain potentially sensitive information. A remote user can execute arbitrary code on the target system. reference LINKS: SecurityTracker Alert ID: 1027022 CVE-2012-1823 CVE-2012-2311 IMPACT ASSESSMENT: High Discussion: A remote user can submit a specially crafted request containing a command

122

V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Apple Safari Bugs Let Remote Users Execute Arbitrary Code 1: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks June 5, 2013 - 1:05am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks PLATFORM: Apple Safari prior to 6.0.5 ABSTRACT: Several vulnerabilities were reported in Apple Safari. REFERENCE LINKS: Apple Article: HT5785 SecurityTracker Alert ID: 1028627 CVE-2013-0926 CVE-2013-1009 CVE-2013-1012 CVE-2013-1013 CVE-2013-1023 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary

123

U-076: OpenSSL Bugs Let Remote Users Deny Service, Obtain Information, and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

76: OpenSSL Bugs Let Remote Users Deny Service, Obtain 76: OpenSSL Bugs Let Remote Users Deny Service, Obtain Information, and Potentially Execute Arbitrary Code U-076: OpenSSL Bugs Let Remote Users Deny Service, Obtain Information, and Potentially Execute Arbitrary Code January 6, 2012 - 8:15am Addthis PROBLEM: OpenSSL Bugs Let Remote Users Deny Service, Obtain Information, and Potentially Execute Arbitrary Code PLATFORM: OpenSSL prior to 0.9.8s; 1.x prior to 1.0.0f ABSTRACT: A remote user may be able to execute arbitrary code on the target system. reference LINKS: SecurityTracker Alert ID: 1026485 OpenSSL Security Advisory IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in OpenSSL. A remote user can cause denial of service conditions. A remote user can obtain sensitive information. A remote user may be able to execute arbitrary code on the

124

V-135: Cisco ASA Multiple Bugs Let Remote Users Deny Service | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Cisco ASA Multiple Bugs Let Remote Users Deny Service 5: Cisco ASA Multiple Bugs Let Remote Users Deny Service V-135: Cisco ASA Multiple Bugs Let Remote Users Deny Service April 16, 2013 - 12:21am Addthis PROBLEM: Cisco ASA Multiple Bugs Let Remote Users Deny Service PLATFORM: Cisco ASA Software for Cisco ASA 5500 Series Adaptive Security Appliances, Cisco ASA Services Module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers, and Cisco ASA 1000V Cloud Firewall are affected by multiple vulnerabilities. Affected versions of Cisco ASA Software will vary depending on the specific vulnerability. ABSTRACT: Several vulnerabilities were reported in Cisco ASA. REFERENCE LINKS: Cisco Security Advisory Secunia Advisory SA52989 SecurityTracker Alert ID: 1028415 CVE-2013-1149 CVE-2013-1150 CVE-2013-1151 CVE-2013-1152

125

V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site 0: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information April 23, 2013 - 12:26am Addthis PROBLEM: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information PLATFORM: Apache ActiveMQ versions prior to 5.8.0 ABSTRACT: Several vulnerabilities were reported in Apache ActiveMQ. REFERENCE LINKS: Apache ActiveMQ SecurityTracker Alert ID: 1028457 CVE-2012-6092 CVE-2012-6551 CVE-2013-3060 IMPACT ASSESSMENT: High DISCUSSION: Several web demos do not properly filter HTML code from user-supplied input

126

T-589: Citrix XenApp and Citrix Presentation Server Bug | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Citrix XenApp and Citrix Presentation Server Bug 9: Citrix XenApp and Citrix Presentation Server Bug T-589: Citrix XenApp and Citrix Presentation Server Bug March 28, 2011 - 3:05pm Addthis PROBLEM: Citrix XenApp and Citrix Presentation Server Bug in ActiveSync Lets Remote Users Execute Arbitrary Code. PLATFORM: Citrix XenApp Presentation versions 4.5, 5 ABSTRACT: A vulnerability was reported in Citrix XenApp (Presentation Server). A remote user can execute arbitrary code on the target system. -------------------------------------------------------------------------------- LINKS: DOE-CIRC BULLETIN: http://www.doecirc.energy.gov/bulletins/t-589.shtml OTHER LINKS: Citrix Document: CTX128366 SecurityTracker Alert ID: 1025254 Citrix Support Technical Support Downloads --------------------------------------------------------------------------------

127

U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny 7: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service September 12, 2012 - 6:00am Addthis PROBLEM: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service PLATFORM: ColdFusion 10, 9.0.2, 9.0.1, 9.0, 8.0.1, and 8.0 for Windows, Macintosh and UNIX ABSTRACT: Adobe ColdFusion is prone to a remote denial-of-service vulnerability. reference LINKS: Adobe Security bulletins and advisories Adobe Vulnerability identifier: APSB12-21 SecurityTracker Alert ID: 1027516 Bugtraq ID: 55499 CVE-2012-2048 IMPACT ASSESSMENT: Medium Discussion: Adobe has released a security hotfix for ColdFusion 10 and earlier versions for Windows, Macintosh and UNIX. This update resolves a vulnerability which

128

V-046: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

46: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 46: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code V-046: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code December 13, 2012 - 3:30am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): 11.5.502.110 and prior for Windows/Mac; 11.2.202.251 and prior for Linux ABSTRACT: Several vulnerabilities were reported in Adobe Flash Player. REFERENCE LINKS: Adobe Vulnerability identifier: APSB12-27 SecurityTracker Alert ID: 1027854 Secunia Advisory SA51560 RHSA-2012:1569-1 CVE-2012-5676 CVE-2012-5677 CVE-2012-5678 IMPACT ASSESSMENT: High DISCUSSION: A buffer overflow can trigger code execution [CVE-2012-5676]. An integer overflow can trigger code execution [CVE-2012-5677]. A memory corruption flaw can trigger code execution [CVE-2012-5678].

129

V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote  

NLE Websites -- All DOE Office Websites (Extended Search)

71: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets 71: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service January 17, 2013 - 12:00am Addthis PROBLEM: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service PLATFORM: The vulnerability is reported in versions 8.7.1 and 8.7.1.1. ABSTRACT: A vulnerability has been reported in Cisco ASA 1000V Cloud Firewall REFERENCE LINKS: Cisco Advisory ID: cisco-sa-20130116-asa1000v SecurityTracker Alert ID: 1028005 Secunia Advisory SA51897 CVE-2012-5419 IMPACT ASSESSMENT: Medium DISCUSSION: A vulnerability has been reported in Cisco ASA 1000V Cloud Firewall, which can be exploited by malicious people to cause a DoS (Denial of Service).

130

T-708:Pidgin Bugs Let Remote Users Deny Service and Potentially Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

T-708:Pidgin Bugs Let Remote Users Deny Service and Potentially T-708:Pidgin Bugs Let Remote Users Deny Service and Potentially Execute Arbitrary Code T-708:Pidgin Bugs Let Remote Users Deny Service and Potentially Execute Arbitrary Code September 1, 2011 - 12:00pm Addthis PROBLEM: gtkutils.c in Pidgin before 2.10.0 on Windows allows user-assisted remote attackers to execute arbitrary programs via a file: URL in a message. PLATFORM: Pidgin before 2.10.0 on Windows ABSTRACT: Pidgin bugs let remote users deny service and potentially execute arbitrary code. reference LINKS: CVE-2011-3185 CVE-2011-2943 CVE-2011-3184 SecurityTracker Alert ID: 1025961 Pidgin Security Advisories IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in Pidgin. A remote user can cause denial of service conditions. A remote user can cause arbitrary code to be

131

U-047: Siemens Automation License Manager Bugs Let Remote Users Deny  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Siemens Automation License Manager Bugs Let Remote Users 7: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code November 29, 2011 - 9:00am Addthis PROBLEM: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code. PLATFORM: Siemens Automation License Manager 500.0.122.1 ABSTRACT: Several vulnerabilities were reported in Siemens Automation License Manager. reference LINKS: SecurityTracker Alert ID: 1026354 Bugtraq Siemens Advisory Services IMPACT ASSESSMENT: Medium Discussion: A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions. A remote user can send specially crafted *_licensekey commands to trigger a

132

T-667: Red Hat Enterprise Linux kernel security and bug fix update |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Red Hat Enterprise Linux kernel security and bug fix update 7: Red Hat Enterprise Linux kernel security and bug fix update T-667: Red Hat Enterprise Linux kernel security and bug fix update July 13, 2011 - 7:24am Addthis PROBLEM: Red Hat Enterprise Linux kernel security and bug fix update PLATFORM: Vulnerable Linux Kernels; Red Hat Enterprise Linux Desktop (v. 6), Red Hat Enterprise Linux HPC Node (v. 6), Red Hat Enterprise Linux Server (v. 6), Red Hat Enterprise Linux Server EUS (v. 6.1.z), Red Hat Enterprise Linux Workstation (v. 6) ABSTRACT: It was found that the receive hook in the ipip_init() function in the ipip module, and in the ipgre_init() function in the ip_gre module, could be called before network namespaces setup is complete. If packets were received at the time the ipip or ip_gre module was still being loaded into

133

U-075: Apache Struts Bug Lets Remote Users Overwrite Files and Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

075: Apache Struts Bug Lets Remote Users Overwrite Files and 075: Apache Struts Bug Lets Remote Users Overwrite Files and Execute Arbitrary Code U-075: Apache Struts Bug Lets Remote Users Overwrite Files and Execute Arbitrary Code January 5, 2012 - 8:15am Addthis PROBLEM: Apache Struts Bug Lets Remote Users Overwrite Files and Execute Arbitrary Code PLATFORM: Version(s): 2.1.0 - 2.3.1 ABSTRACT: A remote user can execute arbitrary Java code on the target system. reference LINKS: SecurityTracker Alert ID: 1026484 Secunia Advisory SA47393 Bugtraq ID: 51257 Apache Struts 2 Documentation S2-008 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Apache Struts. A remote user can execute arbitrary Java code on the target system. A remote user can overwrite arbitrary files on the target system. A remote user can send specially

134

V-030: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

30: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny 30: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service V-030: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service November 21, 2012 - 3:00am Addthis PROBLEM: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service PLATFORM: ColdFusion 10 Update 1 and above for Windows ABSTRACT: Adobe ColdFusion Denial of Service Vulnerability REFERENCE LINKS: Adobe Vulnerability identifier: APSB12-25 SecurityTracker Alert ID: 1027787 Secunia Advisory SA51335 CVE-2012-5674 IMPACT ASSESSMENT: High DISCUSSION: A vulnerability was reported in Adobe ColdFusion. A remote user can cause denial of service conditions. A remote user can send specially crafted data to cause unspecified denial of service conditions on the target ColdFusion service on Windows Internet

135

V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Mozilla Firefox 'window.location' Bugs Permit Cross-Site 2: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code October 29, 2012 - 6:00am Addthis PROBLEM: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code PLATFORM: Firefox, Thunderbird, SeaMonkey ABSTRACT: Three vulnerabilities were reported in Mozilla Firefox. REFERENCE LINKS: Mozilla Foundation Security Advisory 2012-90 SecurityTracker Alert ID: 1027701 SecurityTracker Alert ID: 1027702 Advisory: RHSA-2012:1407-1 CVE-2012-4194 CVE-2012-4195 CVE-2012-4196 IMPACT ASSESSMENT: High DISCUSSION: A remote user can exploit the valueOf() method of window.location to, in

136

U-045: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny Service  

NLE Websites -- All DOE Office Websites (Extended Search)

5: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny 5: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny Service U-045: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny Service November 25, 2011 - 9:00am Addthis PROBLEM: A vulnerability was reported in the Windows Kernel. A local user can cause denial of service conditions. PLATFORM: Windows Win32k.sys ABSTRACT: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny reference LINKS: SecurityTracker Alert ID: 1026347 Secunia ID: SA46919 IMPACT ASSESSMENT: Low Discussion: A vulnerability has been discovered in Microsoft Windows, which can be exploited by malicious, local users to cause a DoS (Denial of Service). The vulnerability is caused due to an indexing error in the win32k.sys driver when loading a keyboard layout file. This can be exploited to access

137

V-091: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary 1: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary Code V-091: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary Code February 14, 2013 - 12:22am Addthis PROBLEM: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary Code PLATFORM: Adobe Reader XI (11.0.01 and earlier) for Windows and Macintosh Adobe Reader X (10.1.5 and earlier) for Windows and Macintosh Adobe Reader 9.5.3 and earlier 9.x versions for Windows and Macintosh Adobe Acrobat XI (11.0.01 and earlier) for Windows and Macintosh Adobe Acrobat X (10.1.5 and earlier) for Windows and Macintosh Adobe Acrobat 9.5.3 and earlier 9.x versions for Windows and Macintosh ABSTRACT: Adobe has identified critical vulnerabilities in Adobe Reader and Acrobat REFERENCE LINKS: Adobe Reader and Acrobat Vulnerability Report

138

V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code 3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code March 18, 2013 - 1:53am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 6.0.3 ABSTRACT: Two vulnerabilities were reported in Apple Safari. REFERENCE LINKS: Apple security update, Article: HT1222 SecurityTracker Alert ID: 1028292 CVE-2013-0960 CVE-2013-0961 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. IMPACT: A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

139

T-563: Red Hat Directory Server Bugs Let Local Users Gain Elevated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Red Hat Directory Server Bugs Let Local Users Gain Elevated 3: Red Hat Directory Server Bugs Let Local Users Gain Elevated Privileges and Remote and Local Users Deny Service T-563: Red Hat Directory Server Bugs Let Local Users Gain Elevated Privileges and Remote and Local Users Deny Service February 23, 2011 - 7:00am Addthis PROBLEM: Red Hat Directory Server Bugs Let Local Users Gain Elevated Privileges and Remote and Local Users Deny Service. PLATFORM: Red Hat Directory Server v8 EL4, Red Hat Directory Server v8 EL5 ABSTRACT: Several vulnerabilities were reported in Red Hat Directory Server. A local user can obtain elevated privileges on the target system. A remote user can cause denial of service conditions. A local user can cause denial of service conditions. A remote user can send multiple simple paged search requests to cause the

140

U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, 2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information July 27, 2012 - 7:00am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information PLATFORM: Version(s):Apple Safari prior to 6.0 ABSTRACT: Multiple vulnerabilities were reported in Apple Safari. reference LINKS: The Vendor's Advisory Bugtraq ID: 54683 SecurityTracker Alert ID: 1027307 IMPACT ASSESSMENT:

Note: This page contains sample records for the topic "rsa envision bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

U-053: Linux kexec Bugs Let Local and Remote Users Obtain Potentially  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

53: Linux kexec Bugs Let Local and Remote Users Obtain 53: Linux kexec Bugs Let Local and Remote Users Obtain Potentially Sensitive Information U-053: Linux kexec Bugs Let Local and Remote Users Obtain Potentially Sensitive Information December 7, 2011 - 7:30am Addthis PROBLEM: Linux kexec Bugs Let Local and Remote Users Obtain Potentially Sensitive Information . PLATFORM: Red Hat Enterprise Linux Desktop (v. 6) Red Hat Enterprise Linux HPC Node (v. 6) Red Hat Enterprise Linux Server (v. 6) Red Hat Enterprise Linux Workstation (v. 6) ABSTRACT: Several vulnerabilities were reported in Linux kexec. A remote or local user can obtain potentially sensitive information. reference LINKS: Red Hat Security Advisory: RHSA-2011:1532-3 SecurityTracker Alert ID: 1026375 IMPACT ASSESSMENT: Medium Discussion: Kdump uses the SSH "StrictHostKeyChecking=no" option when dumping to SSH

142

U-208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary 208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code U-208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code July 10, 2012 - 7:00am Addthis PROBLEM: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code PLATFORM: HP Operations Agent for AIX, HP-UX, Linux, Solaris, and Windows prior to v11.03.12. ABSTRACT: Two vulnerabilities were reported in HP Operations Agent. A remote user can execute arbitrary code on the target system reference LINKS: The Vendor's Advisory SecurityTracker Alert ID: 1027225 CVE-2012-2019 CVE-2012-2020 IMPACT ASSESSMENT: High Discussion: Potential security vulnerabilities have been identified with HP Operations Agent for AIX, HP-UX, Linux, Solaris, and Windows. The vulnerabilities could be remotely exploited resulting in the execution of arbitrary code.

143

U-072:Apache Tomcat Hash Table Collision Bug Lets Remote Users Deny Service  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

72:Apache Tomcat Hash Table Collision Bug Lets Remote Users Deny 72:Apache Tomcat Hash Table Collision Bug Lets Remote Users Deny Service U-072:Apache Tomcat Hash Table Collision Bug Lets Remote Users Deny Service December 30, 2011 - 9:15am Addthis PROBLEM: Apache Tomcat Hash Table Collision Bug Lets Remote Users Deny Service PLATFORM: apache Tomcat 5.5.34, 6.0.34, 7.0.22; and prior versions aBSTRACT: A remote user can cause performance to degrade on the target server. reference LINKS: Apache Tomcat Security Alert SecurityTracker Alert ID: 1026477 nruns Advisory SA-2011.004 Secunia Advisory SA47411 CVE-2011-4084 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Apache Tomcat. A remote user can cause denial of service conditions. A remote user can send specially crafted POST request values to trigger hash collisions and cause significant performance

144

T-538: HP OpenView Storage Data Protector Bug Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

T-538: HP OpenView Storage Data Protector Bug Lets Remote Users T-538: HP OpenView Storage Data Protector Bug Lets Remote Users Execute Arbitrary Code T-538: HP OpenView Storage Data Protector Bug Lets Remote Users Execute Arbitrary Code January 20, 2011 - 6:39am Addthis PROBLEM: HP OpenView Storage Data Protector Bug Lets Remote Users Execute Arbitrary Code. PLATFORM: HP OpenView Storage Data Protector v6.11 ABSTRACT: A vulnerability was reported in HP OpenView Storage Data Protector. A remote user can execute arbitrary code on the target system. reference LINKS: HP Security Bulletin SecurityTracker Alert ID: 1024983 CVE-2011-0273 IMPACT ASSESSMENT: High Discussion: A potential security vulnerability has been identified with HP OpenView Storage Data Protector. The vulnerability could be remotely exploited to execute arbitrary code.

145

U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Cisco Firewall Services Module Bugs Let Remote Users Execute 9: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service October 11, 2012 - 6:00am Addthis PROBLEM: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service PLATFORM: Version(s): prior to 4.1(9) ABSTRACT: Several vulnerabilities were reported in Cisco Firewall Services Module. reference LINKS: Cisco Advisory ID: cisco-sa-20121010-fwsm SecurityTracker Alert ID: 1027640 CVE-2012-4661 CVE-2012-4662 CVE-2012-4663 IMPACT ASSESSMENT: High Discussion: A remote user can send specially crafted DCERPC data through the target device to trigger a stack overflow in the DCERPC inspection engine and execute arbitrary code on the target device or cause the target device to

146

ConMem: detecting severe concurrency bugs through an effect-oriented approach  

Science Conference Proceedings (OSTI)

Multicore technology is making concurrent programs increasingly pervasive. Unfortunately, it is difficult to deliver reliable concurrent programs, because of the huge and non-deterministic interleaving space. In reality, without the resources to thoroughly ... Keywords: concurrency bugs, software testing

Wei Zhang; Chong Sun; Shan Lu

2010-03-01T23:59:59.000Z

147

U-201: HP System Management Homepage Bugs Let Remote Users Deny...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated Users Gain Elevated Privileges and Remote Users Deny Service V-051: Oracle Solaris Java Multiple Vulnerabilities...

148

V-149: Microsoft Internet Explorer Object Access Bug Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Microsoft Internet Explorer Object Access Bug Lets Remote 9: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code V-149: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code May 6, 2013 - 12:07am Addthis PROBLEM: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code PLATFORM: Internet Explorer 8 ABSTRACT: A vulnerability was reported in Microsoft Internet Explorer. REFERENCE LINKS: SecurityTracker Alert ID: 1028514 Microsoft Security Advisory (2847140) CVE-2013-1347 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will access and object that has been deleted or not properly allocated and execute arbitrary code on the target system. The code will run with the privileges of the target user.

149

U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Cisco IOS Intrusion Prevention System DNS Processing Bug 9: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service September 27, 2012 - 4:07am Addthis PROBLEM: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service PLATFORM: Devices configured with Cisco IOS IPS are affected ABSTRACT: A vulnerability was reported in Cisco IOS. reference LINKS: SecurityTracker Alert ID: 1027580 Cisco Security Advisory CVE-2012-3950 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Cisco IOS. A remote user can cause denial of service conditions. A remote user can send specially crafted (but legitimate) DNS packets through the target device to cause the device to

150

V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code 3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code March 18, 2013 - 1:53am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 6.0.3 ABSTRACT: Two vulnerabilities were reported in Apple Safari. REFERENCE LINKS: Apple security update, Article: HT1222 SecurityTracker Alert ID: 1028292 CVE-2013-0960 CVE-2013-0961 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. IMPACT: A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

151

V-160: Wireshark Multiple Bugs Let Remote Users Deny Service | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

60: Wireshark Multiple Bugs Let Remote Users Deny Service 60: Wireshark Multiple Bugs Let Remote Users Deny Service V-160: Wireshark Multiple Bugs Let Remote Users Deny Service May 21, 2013 - 12:09am Addthis PROBLEM: Wireshark Multiple Bugs Let Remote Users Deny Service PLATFORM: Versions 1.8.0 to 1.8.6 ABSTRACT: Multiple vulnerabilities have been reported in Wireshark REFERENCE LINKS: Wireshark Docid: wnpa-sec-2013-23 Secunia Advisory SA53425 SecurityTracker Alert ID: 1028582 CVE-2013-2486 CVE-2013-2487 IMPACT ASSESSMENT: Medium DISCUSSION: Multiple vulnerabilities have been reported in Wireshark, which can be exploited by malicious people to cause a DoS (Denial of Service). 1) An error in the RELOAD dissector (dissectors/packet-reload.c) can be exploited to trigger infinite loops and consume CPU resources via specially

152

U-005: Apache mod_proxy Pattern Matching Bug Lets Remote Users Access  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apache mod_proxy Pattern Matching Bug Lets Remote Users 5: Apache mod_proxy Pattern Matching Bug Lets Remote Users Access Internal Servers U-005: Apache mod_proxy Pattern Matching Bug Lets Remote Users Access Internal Servers October 6, 2011 - 9:30am Addthis PROBLEM: Apache mod_proxy Pattern Matching Bug Lets Remote Users Access Internal Servers. PLATFORM: Apache HTTP Server 1.3.x, 2.2.21 and prior versions ABSTRACT: A remote user can access internal servers. reference LINKS: The Apache HTTP Server Project SecurityTracker Alert ID: 1026144 CVE-2011-3368 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Apache mod_proxy. A remote user can access internal servers. When this system is configured in reverse proxy mode and uses the RewriteRule or ProxyPassMatch directives with a pattern match, a remote user can send a specially crafted request to access internal

153

V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Mozilla Firefox 'window.location' Bugs Permit Cross-Site 2: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code October 29, 2012 - 6:00am Addthis PROBLEM: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code PLATFORM: Firefox, Thunderbird, SeaMonkey ABSTRACT: Three vulnerabilities were reported in Mozilla Firefox. REFERENCE LINKS: Mozilla Foundation Security Advisory 2012-90 SecurityTracker Alert ID: 1027701 SecurityTracker Alert ID: 1027702 Advisory: RHSA-2012:1407-1 CVE-2012-4194 CVE-2012-4195 CVE-2012-4196 IMPACT ASSESSMENT: High DISCUSSION: A remote user can exploit the valueOf() method of window.location to, in

154

V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 0: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code March 13, 2013 - 12:04am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): 1.6.602.171 and prior for Windows/Mac; other versions on other platforms ABSTRACT: Several vulnerabilities were reported in Adobe Flash Player. REFERENCE LINKS: Adobe Vulnerability identifier: APSB13-09 SecurityTracker Alert ID: 1028277 CVE-2013-0646 CVE-2013-0650 CVE-2013-1371 CVE-2013-1375 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user.

155

U-012: BlackBerry Enterprise Server Collaboration Service Bug Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

12: BlackBerry Enterprise Server Collaboration Service Bug Lets 12: BlackBerry Enterprise Server Collaboration Service Bug Lets Remote Users Impersonate Intra-organization Messages U-012: BlackBerry Enterprise Server Collaboration Service Bug Lets Remote Users Impersonate Intra-organization Messages October 17, 2011 - 9:45am Addthis PROBLEM: BlackBerry Enterprise Server Collaboration Service Bug Lets Remote Users Impersonate Intra-organization Messages. PLATFORM: Exchange and Domino 5.0.3 through 5.0.3 MR4 BlackBerry Client for use with Microsoft Office Communications Server 2007 R2 BlackBerry Client for use with Microsoft Lync Server 2010 ABSTRACT: A vulnerability was reported in BlackBerry Enterprise Server. A remote user can impersonate another messaging user within the same organization. reference LINKS: BlackBerry Security Advisory ID: KB28524

156

U-071:HP Database Archiving Software Bugs Let Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1:HP Database Archiving Software Bugs Let Remote Users Execute 1:HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code U-071:HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code December 29, 2011 - 8:15am Addthis PROBLEM: HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code PLATFORM: HP Database Archiving Software v6.31 ABSTRACT: A remote user can execute arbitrary code on the target system. reference LINKS: HP Database Document ID: c03128302 SecurityTracker Alert ID: 1026467 CVE-2011-4163 CVE-2011-4164 CVE-2011-4165 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in HP Database Archiving Software. A remote user can execute arbitrary code on the target system. Impact: A remote user can execute arbitrary code on the target system. Solution:

157

History's Worst Software Bugs By Simson Garfinkel Story location: http://www.wired.com/news/technology/bugs/0,2924,69355,00.html  

E-Print Network (OSTI)

,000 of its Prius hybrid vehicles following reports of vehicle warning lights illuminating for no reason, the root of the Prius issue wasn't a hardware problem -- it was a programming error in the smart car's embedded code. The Prius had a software bug. With that recall, the Pruis joined the ranks of the buggy

Overstreet, C. Michael

158

Backup Generators (BUGS): The Next Smart Grid Peak Resource? | Open Energy  

Open Energy Info (EERE)

Backup Generators (BUGS): The Next Smart Grid Peak Resource? Backup Generators (BUGS): The Next Smart Grid Peak Resource? Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Backup Generators (BUGS): The Next Smart Grid Peak Resource? Focus Area: Crosscutting Topics: Potentials & Scenarios Website: www.netl.doe.gov/smartgrid/referenceshelf/articles/10-18-2010_BUGS%20a Equivalent URI: cleanenergysolutions.org/content/backup-generators-bugs-next-smart-gri Language: English Policies: "Deployment Programs,Financial Incentives,Regulations" is not in the list of possible values (Deployment Programs, Financial Incentives, Regulations) for this property. DeploymentPrograms: Demonstration & Implementation Regulations: "Resource Integration Planning,Energy Standards" is not in the list of possible values (Agriculture Efficiency Requirements, Appliance & Equipment Standards and Required Labeling, Audit Requirements, Building Certification, Building Codes, Cost Recovery/Allocation, Emissions Mitigation Scheme, Emissions Standards, Enabling Legislation, Energy Standards, Feebates, Feed-in Tariffs, Fuel Efficiency Standards, Incandescent Phase-Out, Mandates/Targets, Net Metering & Interconnection, Resource Integration Planning, Safety Standards, Upgrade Requirements, Utility/Electricity Service Costs) for this property.

159

T-654: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Apple QuickTime Multiple Bugs Let Remote Users Execute 4: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary T-654: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary June 24, 2011 - 4:39am Addthis PROBLEM: A vulnerability was reported in QuickTime. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Version(s): prior to QuickTime 7.6.8 ABSTRACT: A remote user can create a specially crafted file that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. reference LINKS: SecurityTracker Alert ID: 1025705 Apple Security Article: HT4339 Apple Security Article: HT4723 Apple Security Article: HT1222 CVE-2011-0213 Secunia Advisory: SA45054 IMPACT ASSESSMENT High Discussion:

160

V-202: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Cisco Video Surveillance Manager Bugs Let Remote Users 2: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain Potentially Sensitive Information V-202: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain Potentially Sensitive Information July 25, 2013 - 2:52am Addthis PROBLEM: A remote user can obtain potentially sensitive information and modify some configuration settings. A remote user can exploit this to create, modify, and remove camera feeds, archives, logs, and users. PLATFORM: Cisco Video Surveillance Manager 7.1, 7.5 ABSTRACT: Two vulnerabilities were reported in Cisco Video Surveillance Manager REFERENCE LINKS: Security Tracker Alert ID: 1028827 CVE-2013-3429 CVE-2013-3430 CVE-2013-3431 IMPACT ASSESSMENT: Medium DISCUSSION: The vulnerability is due to an access control error that occurred. The

Note: This page contains sample records for the topic "rsa envision bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

T-647: PHP File Upload Bug May Let Remote Users Overwrite Files on the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: PHP File Upload Bug May Let Remote Users Overwrite Files on 7: PHP File Upload Bug May Let Remote Users Overwrite Files on the Target System T-647: PHP File Upload Bug May Let Remote Users Overwrite Files on the Target System June 15, 2011 - 3:45pm Addthis PROBLEM: A vulnerability was reported in PHP. A remote user may be able to overwrite files on the target system. PLATFORM: PHP prior to 5.3.7 ABSTRACT: PHP is prone to a security-bypass vulnerability.Successful exploits will allow an attacker to delete files from the root directory, which may aid in further attacks. PHP 5.3.6 is vulnerable; other versions may also be affected. reference LINKS: PHP Security Notice PHP CVE-2011-2202 SecurityTracker Alert ID: 1025659 Secunia Advisory: SA44874 CVE-2011-2202 IMPACT ASSESSMENT: High Discussion: The vulnerability lies in the 'SAPI_POST_HANDLER_FUNC()' function in

162

U-192: VMware Workstation/Player VM Remote Device Bug Lets Local or Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

92: VMware Workstation/Player VM Remote Device Bug Lets Local or 92: VMware Workstation/Player VM Remote Device Bug Lets Local or Remote Users Deny Service U-192: VMware Workstation/Player VM Remote Device Bug Lets Local or Remote Users Deny Service June 15, 2012 - 7:00am Addthis PROBLEM: A vulnerability was reported in VMware Workstation/Player. PLATFORM: Version(s): Workstation 8.x, Player 4.x aBSTRACT: A local or remote user can cause denial of service conditions on the target virtual system. reference LINKS: Vendor Advisory Security Tracker ID 1027173 CVE-2012-3289 IMPACT ASSESSMENT: High Discussion: A user with the ability to modify communications data between a remote virtual device (e.g., CD-ROM, keyboard) located on a physically separate system and the target virtual machine can cause the target virtual machine to crash.

163

U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated 2: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated Privileges, Inject SQL Commands, and Spoof Certificates U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated Privileges, Inject SQL Commands, and Spoof Certificates February 28, 2012 - 8:45am Addthis PROBLEM: A vulnerability was reported in PostgreSQL. PLATFORM: Version(s): prior to 8.3.18, 8.4.11, 9.0.7, 9.1.3 ABSTRACT: A remote authenticated user can gain elevated privileges. A remote authenticated user can inject SQL commands. A remote user can spoof connections in certain cases. reference LINKS: Vendor Advisory Security Tracker ID 1026744 CVE-2012-0866 IMPACT ASSESSMENT: Medium Discussion: For trigger functions marked SECURITY DEFINER, a remote authenticated user can execute a trigger function and gain elevated privileges CVE-2012-0866.

164

V-203: HP LoadRunner Multiple Bugs Let Remote Users Deny Service and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: HP LoadRunner Multiple Bugs Let Remote Users Deny Service 3: HP LoadRunner Multiple Bugs Let Remote Users Deny Service and Execute Arbitrary Code V-203: HP LoadRunner Multiple Bugs Let Remote Users Deny Service and Execute Arbitrary Code July 26, 2013 - 3:31am Addthis PROBLEM: A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions. PLATFORM: HP LoadRunner prior to 11.52 ABSTRACT: Multiple vulnerabilities were reported in HP LoadRunner. REFERENCE LINKS: Security Tracker Alert ID: 1028833 CVE-2013-2368 CVE-2013-2369 CVE-2013-2370 CVE-2013-4797 CVE-2013-4798 CVE-2013-4799 CVE-2013-4800 CVE-2013-4801 IMPACT ASSESSMENT: Medium DISCUSSION: Potential security vulnerabilities have been identified with HP LoadRunner. The vulnerabilities could be remotely exploited to allow execution of code

165

U-092: Sudo Format String Bug Lets Local Users Gain Elevated Privileges |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Sudo Format String Bug Lets Local Users Gain Elevated 2: Sudo Format String Bug Lets Local Users Gain Elevated Privileges U-092: Sudo Format String Bug Lets Local Users Gain Elevated Privileges January 31, 2012 - 5:45am Addthis PROBLEM: A vulnerability was reported in Sudo. A local user can obtain elevated privileges on the target system. PLATFORM: Linux (Any) Version(s): 1.8.0 - 1.8.3p1 ABSTRACT: A local user can supply a specially crafted command line argument to trigger a format string flaw and execute arbitrary commands on the target system with root privileges. reference LINKS: CVE-2012-0809 SecurityTracker Alert ID: 1026600 Vendor Site IMPACT ASSESSMENT: Medium Discussion: The vulnerability resides in the sudo_debug() function in 'src/sudo.c'. This can be exploited by local users, regardless of whether they are listed

166

V-128: Xen Event Channel Tracking Pointer Bug Local Privilege Escalation |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Xen Event Channel Tracking Pointer Bug Local Privilege 8: Xen Event Channel Tracking Pointer Bug Local Privilege Escalation V-128: Xen Event Channel Tracking Pointer Bug Local Privilege Escalation April 8, 2013 - 12:28am Addthis PLATFORM: Version(s): 3.2 and later ABSTRACT: A vulnerability was reported in Xen. REFERENCE LINKS: SecurityTracker Alert ID: 1028388 CVE-2013-1920 IMPACT ASSESSMENT: Medium DISCUSSION: A local user with kernel level privileges on the guest operating system can exploit a memory pointer error when the hypervisor is under memory pressure and Xen Security Module (XSM) is enabled to execute arbitrary code on the target host system IMPACT: A local user on the guest operating system can obtain elevated privileges on the target host system. SOLUTION: The vendor has issued a fix (xsa47-4.1.patch, xsa47-4.2-unstable.patch).

167

U-110: Samba Bug Lets Remote Users Execute Arbitrary Code | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Samba Bug Lets Remote Users Execute Arbitrary Code 0: Samba Bug Lets Remote Users Execute Arbitrary Code U-110: Samba Bug Lets Remote Users Execute Arbitrary Code February 24, 2012 - 7:30am Addthis PROBLEM: A vulnerability was reported in Samba. PLATFORM: Version(s): prior to 3.4.0 ABSTRACT: A remote user can send specially crafted data to the smbd service to trigger a flaw in chain_reply() and construct_reply() and execute arbitrary code on the target system. reference LINKS: Vendor Advisory Security Tracker ID 1026739 CVE-2012-0870 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Samba. A remote user can execute arbitrary code on the target system. A remote user can send specially crafted data to the smbd service to trigger a flaw in chain_reply() and construct_reply() and execute arbitrary code on the target system. The code will run with the

168

U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code June 6, 2012 - 7:00am Addthis PROBLEM: Multiple vulnerabilities were reported in Mozilla Firefox. PLATFORM: Version(s): prior to 13.0 ABSTRACT: A remote user can cause arbitrary code to be executed on the target user's system. A remote user can conduct cross-site scripting attacks. A remote user can obtain potentially sensitive information. Reference Links: Security Tracker ID 1027120 CVE-2012-0441,CVE-2012-1937 Vendor URL IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system [CVE-2012-1937 , CVE-2012-1938, CVE-2012-1939 ].

169

V-127: Samba Bug Lets Remote Authenticated Users Modify Files | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Samba Bug Lets Remote Authenticated Users Modify Files 7: Samba Bug Lets Remote Authenticated Users Modify Files V-127: Samba Bug Lets Remote Authenticated Users Modify Files April 5, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Samba. PLATFORM: The vulnerabilities are reported in version(s): 3.6.0 - 3.6.5 ABSTRACT: A remote authenticated user can modify files on the target share REFERENCE LINKS: SecurityTracker Alert ID: 1028389 Samba Security Announcement CVE-2013-0454 IMPACT ASSESSMENT: Medium DISCUSSION: A remote authenticated user can perform operations on the target CIFS export that are not permitted by the CIFS share access control settings. This may include writing to read-only shares. IMPACT: Modification of user information SOLUTION: Update to 3.6.6 and higher or apply the following patch Addthis

170

U-192 VMware Workstation/Player VM Remote Device Bug Lets Local or Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

VMware Workstation/Player VM Remote Device Bug Lets Local or VMware Workstation/Player VM Remote Device Bug Lets Local or Remote Users Deny Service U-192 VMware Workstation/Player VM Remote Device Bug Lets Local or Remote Users Deny Service June 15, 2012 - 7:00am Addthis PROBLEM: A vulnerability was reported in VMware Workstation/Player. PLATFORM: Version(s): Workstation 8.x, Player 4.x ABSTRACT: A local or remote user can cause denial of service conditions on the target virtual system. reference LINKS: Vendor Advisory Security Tracker ID 1027173 CVE-2012-3289 IMPACT ASSESSMENT: High Discussion: A user with the ability to modify communications data between a remote virtual device (e.g., CD-ROM, keyboard) located on a physically separate system and the target virtual machine can cause the target virtual machine to crash. Impact:

171

V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Cisco Wireless LAN Controller Bugs Let Remote Users Deny 6: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code January 24, 2013 - 6:00am Addthis PROBLEM: Several vulnerabilities were reported in Cisco Wireless LAN Controller. PLATFORM: The vulnerabilities are reported in: Cisco 2000 Series WLC Cisco 2100 Series WLC Cisco 2500 Series WLC Cisco 4100 Series WLC Cisco 4400 Series WLC Cisco 5500 Series WLC Cisco 7500 Series WLC Cisco 8500 Series WLC Cisco 500 Series Wireless Express Mobility Controllers Cisco Wireless Services Module (Cisco WiSM) Cisco Wireless Services Module version 2 (Cisco WiSM version 2)

172

U-096: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny 6: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny Service U-096: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny Service February 6, 2012 - 7:00am Addthis PROBLEM: Vulnerability in AIX TCP stack PLATFORM: Version(s): 5.3, 6.1, 7.1 ABSTRACT: A remote user can send a series of specially crafted TCP packets to trigger a kernel panic on the target system. reference LINKS: SecurityTracker Alert ID: 1026640 IBM Security Advisory CVE-2012-0194 IMPACT ASSESSMENT: Medium Discussion: AIX could allow a remote attacker to cause a denial of service, caused by an error when the TCP large send offload option is enabled on a network interface. By sending a specially-crafted sequence of packets, an attacker could exploit this vulnerability to cause a kernel panic.

173

V-077: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Barracuda SSL VPN Bug Lets Remote Users Bypass 7: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication V-077: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication January 25, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Barracuda SSL VPN. PLATFORM: The vulnerability has been verified to exist in Barracuda SSL VPN version 2.2.2.203 ABSTRACT: A remote user can gain administrative access to the target system. REFERENCE LINKS: SecurityTracker Alert ID: 1028039 Barracuda Networks Advisory IMPACT ASSESSMENT: High DISCUSSION: A remote user can set a specially crafted Java system property (via 'setSysProp.jsp') to bypass access restrictions and gain access to the API functionality. This can be exploited to download configuration files, download database dumps, shutdown the system, and set new administrative

174

T-652: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and 2: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and Execute Arbitrary Code T-652: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and Execute Arbitrary Code June 22, 2011 - 2:55pm Addthis PROBLEM: Multiple vulnerabilities were reported in Mozilla Thunderbird. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can obtain cookies from another domain in certain cases. A remote user can create specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system [CVE-2011-2364, CVE-2011-2374, CVE-2011-2375, CVE-2011-2376]. The code will run with the privileges of the target user. PLATFORM: Mozilla Thunderbird prior to 3.1.11

175

V-183: Cisco TelePresence TC and TE Bugs Let Remote Users Deny Service and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Cisco TelePresence TC and TE Bugs Let Remote Users Deny 3: Cisco TelePresence TC and TE Bugs Let Remote Users Deny Service and Remote Adjacent Authenticated Users Gain Root Shell Access V-183: Cisco TelePresence TC and TE Bugs Let Remote Users Deny Service and Remote Adjacent Authenticated Users Gain Root Shell Access June 21, 2013 - 6:00am Addthis PROBLEM: Three vulnerabilities were reported in Cisco TelePresence TC and TE PLATFORM: The following product models are affected by the vulnerabilities: Cisco TelePresence MX Series Cisco TelePresence System EX Series Cisco TelePresence Integrator C Series Cisco TelePresence Profiles Series running Cisco TelePresence Quick Set Series Cisco IP Video Phone E20 ABSTRACT: Cisco TelePresence TC and TE Software contain two vulnerabilities in the implementation of the Session Initiation Protocol (SIP) that could allow an

176

U-201: HP System Management Homepage Bugs Let Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: HP System Management Homepage Bugs Let Remote Users Deny 1: HP System Management Homepage Bugs Let Remote Users Deny Service U-201: HP System Management Homepage Bugs Let Remote Users Deny Service June 28, 2012 - 7:00am Addthis PROBLEM: A vulnerability was reported in HP System Management Homepage. PLATFORM: Version(s): prior to 7.1.1 ABSTRACT: The vulnerabilities could be exploited remotely resulting in unauthorized access, disclosure of information, data modification, Denial of Service (DoS), and execution of arbitrary code. Reference links: Original Advisory Security Tracker ID 1027209 CVE-2012-2012, CVE-2012-2013, CVE-2012-2014 CVE-2012-2015, CVE-2012-2016 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in HP System Management Homepage. A remote authenticated user can gain elevated privileges. A remote authenticated

177

U-088: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary 8: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary Code U-088: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary Code January 25, 2012 - 6:00am Addthis PROBLEM: A remote user can execute arbitrary code on the target system. PLATFORM: Version(s): 12.5 SP3; pcAnywhere Solutions 7.1 GA, SP 1, and SP 2 ABSTRACT: Two vulnerabilities were reported in Symantec pcAnywhere. A remote user can execute arbitrary code on the target system. A local user can obtain elevated privileges on the target system. reference LINKS: Symantec Advisory Secunia Advisory SecurityTracker Alert ID:102576 IMPACT ASSESSMENT: Medium Discussion: A remote user can send specially crafted data to TCP port 5631 to trigger a but in the validation of authentication data and execute arbitrary code.

178

V-127: Samba Bug Lets Remote Authenticated Users Modify Files | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Samba Bug Lets Remote Authenticated Users Modify Files 7: Samba Bug Lets Remote Authenticated Users Modify Files V-127: Samba Bug Lets Remote Authenticated Users Modify Files April 5, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Samba. PLATFORM: The vulnerabilities are reported in version(s): 3.6.0 - 3.6.5 ABSTRACT: A remote authenticated user can modify files on the target share REFERENCE LINKS: SecurityTracker Alert ID: 1028389 Samba Security Announcement CVE-2013-0454 IMPACT ASSESSMENT: Medium DISCUSSION: A remote authenticated user can perform operations on the target CIFS export that are not permitted by the CIFS share access control settings. This may include writing to read-only shares. IMPACT: Modification of user information SOLUTION: Update to 3.6.6 and higher or apply the following patch Addthis

179

U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and 5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs May 9, 2012 - 7:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs PLATFORM: prior to 5.1.1; iPhone 3GS, iPhone 4, iPhone 4S, iPod touch (3rd generation) and later, iPad, iPad 2 ABSTRACT: Two vulnerabilities were reported in Apple iOS. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can spoof the address bar URL. reference LINKS: SecurityTracker Alert ID: 1027028 CVE-2012-0672 CVE-2012-0674 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a specially crafted file that, when loaded by the

180

T-714:Wireshark OpenSafety and CSN.1 Dissector Bugs | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

714:Wireshark OpenSafety and CSN.1 Dissector Bugs 714:Wireshark OpenSafety and CSN.1 Dissector Bugs T-714:Wireshark OpenSafety and CSN.1 Dissector Bugs September 12, 2011 - 9:00am Addthis PROBLEM: Several vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions. PLATFORM: Version(s): 1.4.0 to 1.4.8, 1.6.0 to 1.6.1 ABSTRACT: Wireshark OpenSafety and CSN.1 Dissector Bugs Lets Remote Users Deny Service. reference LINKS: Wireshark 1.6.2 Release Notes Wireshark 1.4.9 Release Notes Docid: wnpa-sec-2011-12 Docid: wnpa-sec-2011-14 Docid: wnpa-sec-2011-15 Docid: wnpa-sec-2011-16 SecurityTracker Alert ID: 1026030 IMPACT ASSESSMENT: High Discussion: A remote user can cause arbitrary scripting code to be executed on the target user's system. A large loop in the OpenSafety dissector could cause a crash. A remote user

Note: This page contains sample records for the topic "rsa envision bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

T-579: BlackBerry Device Software Bug in WebKit Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: BlackBerry Device Software Bug in WebKit Lets Remote Users 9: BlackBerry Device Software Bug in WebKit Lets Remote Users Execute Code T-579: BlackBerry Device Software Bug in WebKit Lets Remote Users Execute Code March 15, 2011 - 5:05pm Addthis PROBLEM: A vulnerability was reported in BlackBerry Device Software. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: BlackBerry Device Software version 6.0 and later. ABSTRACT: BlackBerry Device Software Bug in WebKit Lets Remote Users Execute Code. reference LINKS: BlackBerry Advisory: KB26132 CVE-2011-1290 BlackBerry Security Note BlackBerry Device Storage IMPACT ASSESSMENT: Moderate Discussion: A vulnerability exists in the open source WebKit browser engine provided in BlackBerry Device Software version 6.0 and later. The issue could result in

182

U-085: OpenSSL DTLS Bug Lets Remote Users Deny Service | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: OpenSSL DTLS Bug Lets Remote Users Deny Service 5: OpenSSL DTLS Bug Lets Remote Users Deny Service U-085: OpenSSL DTLS Bug Lets Remote Users Deny Service January 20, 2012 - 9:15am Addthis PROBLEM: OpenSSL DTLS Bug Lets Remote Users Deny Service PLATFORM: Only DTLS applications using OpenSSL 1.0.0f and 0.9.8s are affected. ABSTRACT: A flaw in the fix to CVE-2011-4108 can be exploited in a denial of service attack. REFERNCE LINKS: CVE-2012-0050 SecurityTracker Alert ID: 1026548 OpenSSL Security Advisory [18 Jan 2011] OpenSSL News IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in OpenSSL. The fix to correct the Datagram Transport Layer Security (DTLS) vulnerability referenced by CVE-2011-4108 introduced a flaw. A remote user can send specially crafted data to cause denial of service conditions on the target system.

183

V-029: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

29: Mozilla Firefox Multiple Bugs Let Remote Users Execute 29: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks V-029: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks November 21, 2012 - 2:00am Addthis PROBLEM: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks PLATFORM: Version(s): prior to 17.0 ABSTRACT: Multiple vulnerabilities were reported in Mozilla Firefox REFERENCE LINKS: Mozilla Foundation Security Advisories Bugtraq ID: 55260 SecurityTracker Alert ID: 1027791 CVE-2012-4201, CVE-2012-4202, CVE-2012-4203, CVE-2012-4204, CVE-2012-4205, CVE-2012-4206, CVE-2012-4207,CVE-2012-4208, CVE-2012-4209, CVE-2012-4210, CVE-2012-4212, CVE-2012-4213, CVE-2012-4214, CVE-2012-4215, CVE-2012-4216,

184

U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and 5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs May 9, 2012 - 7:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs PLATFORM: prior to 5.1.1; iPhone 3GS, iPhone 4, iPhone 4S, iPod touch (3rd generation) and later, iPad, iPad 2 ABSTRACT: Two vulnerabilities were reported in Apple iOS. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can spoof the address bar URL. reference LINKS: SecurityTracker Alert ID: 1027028 CVE-2012-0672 CVE-2012-0674 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a specially crafted file that, when loaded by the

185

V-115: Apple iOS Bugs Let Local Users Gain Elevated Privileges | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apple iOS Bugs Let Local Users Gain Elevated Privileges 5: Apple iOS Bugs Let Local Users Gain Elevated Privileges V-115: Apple iOS Bugs Let Local Users Gain Elevated Privileges March 20, 2013 - 12:08am Addthis PROBLEM: Apple iOS Bugs Let Local Users Gain Elevated Privileges PLATFORM: Version(s): prior to 6.1.3 ABSTRACT: Several vulnerabilities were reported in Apple iOS REFERENCE LINKS: Apple security Article: HT1222 SecurityTracker Alert ID: 1028314 CVE-2013-0977 CVE-2013-0978 CVE-2013-0979 CVE-2013-0981 IMPACT ASSESSMENT: High DISCUSSION: A local user can exploit a flaw in the handling of Mach-O executable files with overlapping segments to execute unsigned code on the target system [CVE-2013-0977]. A local user can exploit a flaw in the ARM prefetch abort handling to determine the address of structures in the kernel [CVE-2013-0978].

186

U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Apple iOS Bugs Let Remote Users Execute Arbitrary Code 6: Apple iOS Bugs Let Remote Users Execute Arbitrary Code U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code November 15, 2011 - 8:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Obtain Information and Let Local Users Bypass Authentication. PLATFORM: iOS 3.0 through 5.0 for iPhone 3GS iPhone 4 and iPhone 4S iOS 3.1 through 5.0 for iPod touch (3rd generation) and later iOS 3.2 through 5.0 for iPad, iOS 4.3 through 5.0 for iPad 2 ABSTRACT: A remote user can create content that, when loaded by the target user, will execute arbitrary code on or obtain potentially sensitive information from the target user's system. reference LINKS: Apple Security Article: HT5052 Apple Product Security SecurityTracker Alert ID: 1026311 IMPACT ASSESSMENT:

187

U-211: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

11: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote 11: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories U-211: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories July 12, 2012 - 7:00am Addthis PROBLEM: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories PLATFORM: EMC Celerra Network Server versions 6.0.36.4 through 6.0.60.2 EMC VNX versions 7.0.12.0 through 7.0.53.1 EMC VNXe 2.0 (including SP1, SP2, and SP3) EMC VNXe MR1 (including SP1, SP2, SP3, and SP3.1) EMC VNXe MR2 (including SP0.1) ABSTRACT: A vulnerability was reported in EMC Celerra/VNX/VNXe. A remote authenticated user can access files and directories on the target file system. reference LINKS: The Vendor's Advisory

188

V-031: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote 1: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated Users Gain Elevated Privileges and Remote Users Deny Service V-031: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated Users Gain Elevated Privileges and Remote Users Deny Service November 22, 2012 - 3:00am Addthis PROBLEM: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated Users Gain Elevated Privileges and Remote Users Deny Service PLATFORM: Version(s): XC10 2.0.0.0 - 2.0.0.3, 2.1.0.0 - 2.1.0.2 ABSTRACT: Several vulnerabilities were reported in IBM WebSphere DataPower. REFERENCE LINKS: IBM Security Bulletin SecurityTracker Alert ID: 1027798 CVE-2012-5758 CVE-2012-5759 CVE-2012-5756 IMPACT ASSESSMENT: High DISCUSSION: Several vulnerabilities were reported in IBM WebSphere DataPower. A remote

189

V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to 1: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems April 24, 2013 - 1:06am Addthis PROBLEM: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems PLATFORM: HP ElitePad 900 with BIOS version vF.00 ABSTRACT: A vulnerability was reported in HP ElitePad 900 REFERENCE LINKS: HP Document ID: c03727435 SecurityTracker Alert ID: 1028461 CVE-2012-5218 IMPACT ASSESSMENT: Medium DISCUSSION: The BIOS secure boot feature of the BIOS may not be enabled. A local user may be able to bypass the secure boot feature and boot an alternate operating system. IMPACT: A local user can may be able to boot to an alternate operating system. SOLUTION:

190

U-119: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users 9: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute Arbitrary Code U-119: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute Arbitrary Code March 7, 2012 - 7:00am Addthis PROBLEM: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute Arbitrary Code PLATFORM: BlackBerry 6, BlackBerry 7, BlackBerry 7.1, and BlackBerry PlayBook tablet software ABSTRACT: A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026769 BlackBerry Security Notice Article ID: KB30152 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Blackberry PlayBook. A remote user can cause arbitrary code to be executed on the target user's system. A remote

191

V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to 1: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems April 24, 2013 - 1:06am Addthis PROBLEM: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems PLATFORM: HP ElitePad 900 with BIOS version vF.00 ABSTRACT: A vulnerability was reported in HP ElitePad 900 REFERENCE LINKS: HP Document ID: c03727435 SecurityTracker Alert ID: 1028461 CVE-2012-5218 IMPACT ASSESSMENT: Medium DISCUSSION: The BIOS secure boot feature of the BIOS may not be enabled. A local user may be able to bypass the secure boot feature and boot an alternate operating system. IMPACT: A local user can may be able to boot to an alternate operating system. SOLUTION:

192

T-718:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute 8:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code T-718:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code September 15, 2011 - 8:45am Addthis PROBLEM: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code. PLATFORM: Adobe Reader X (10.1) and earlier 10.x versions for Windows and Macintosh Adobe Reader 9.4.5 and earlier 9.x versions for Windows, Macintosh and UNIX Adobe Reader 8.3 and earlier 8.x versions for Windows and Macintosh Adobe Acrobat X (10.1) and earlier 10.x versions for Windows and Macintosh Adobe Acrobat 9.4.5 and earlier 9.x versions for Windows and Macintosh Adobe Acrobat 8.3 and earlier 8.x versions for Windows and Macintosh ABSTRACT: A remote user can create a file that, when loaded by the target user, will

193

U-176: Wireshark Multiple Bugs Let Remote Users Deny Service | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-176: Wireshark Multiple Bugs Let Remote Users Deny Service U-176: Wireshark Multiple Bugs Let Remote Users Deny Service U-176: Wireshark Multiple Bugs Let Remote Users Deny Service May 24, 2012 - 7:00am Addthis PROBLEM: Wireshark Multiple Bugs Let Remote Users Deny Service PLATFORM: 1.4.0 to 1.4.12, 1.6.0 to 1.6.7 ABSTRACT: Several vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions. Reference Links: SecurityTracker Alert ID: 1027094 CVE-2012-2392 CVE-2012-2393 CVE-2012-2394 IMPACT ASSESSMENT: Medium Discussion: A remote user can send specially crafted ANSI MAP, ASF, BACapp, Bluetooth HCI, IEEE 802.11, IEEE 802.3, LTP, and R3 data to cause Wireshark to hang or enter an infinite loop. A remote user can cause the DIAMETER dissector to crash. A remote user can trigger a memory error on SPARC or Itanium processors and

194

Microsoft Word - BUGS_The Next Smart Grid Peak Resource Final 4_19.docx  

NLE Websites -- All DOE Office Websites (Extended Search)

April 15, 2010 April 15, 2010 DOE/NETL-2010/1406 Backup Generators (BUGS): The Next Smart Grid Peak Resource Backup Generators (BUGS): The Next Smart Grid Peak Resource v1.0 ii DISCLAIMER This report was prepared as an account of work sponsored by an agency of the United States Government. Neither the United States Government nor any agency thereof, nor any of their employees, makes any warranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would not infringe privately owned rights. Reference therein to any specific commercial product, process, or service by trade name, trademark, manufacturer, or

195

V-210: HP LaserJet Pro Printer Bug Lets Remote Users Access Data |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

V-210: HP LaserJet Pro Printer Bug Lets Remote Users Access Data V-210: HP LaserJet Pro Printer Bug Lets Remote Users Access Data V-210: HP LaserJet Pro Printer Bug Lets Remote Users Access Data August 3, 2013 - 2:37am Addthis PROBLEM: A vulnerability was reported in HP Printers. A remote user can obtain potentially sensitive information. PLATFORM: HP LaserJet Pro products ABSTRACT: A potential security vulnerability has been identified with certain HP LaserJet Pro printers. The vulnerability could be exploited remotely to gain unauthorized access to data. REFERENCE LINKS: SecurityTracker Alert ID 1028869 CVE-2013-4807 Vendor URL IMPACT ASSESSMENT: Medium DISCUSSION: The following models are affected: HP LaserJet Pro P1102w CE657A/CE658A HP LaserJet Pro P1606dn CE749A HP LaserJet Pro M1212nf MFP CE841A HP LaserJet Pro M1213nf MFP CE845A

196

T-633: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets 3: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets Remote Users Deny Service T-633: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets Remote Users Deny Service May 31, 2011 - 3:35pm Addthis PROBLEM: A vulnerability was reported in BIND. A remote user can cause denial of service conditions. PLATFORM: BIND Version(s): 9.4-ESV-R3 and later, 9.6-ESV-R2 and later, 9.6.3, 9.7.1 and later, 9.8.0 and later; prior to 9.4-ESV-R4-P1, 9.6-ESV-R4-P1, 9.7.3-P1, 9.8.0-P2 ABSTRACT: A remote DNS server can supply very large RRSIG RRsets in a negative response to trigger an off-by-one error in a buffer size check and cause the target requesting named process to crash. A remote user can cause named to crash. reference LINKS: SecurityTracker Alert ID: 1025575 SecurityTracker Alert ID: 1025572

197

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

January 31, 2012 January 31, 2012 U-092: Sudo Format String Bug Lets Local Users Gain Elevated Privileges A local user can supply a specially crafted command line argument to trigger a format string flaw and execute arbitrary commands on the target system with root privileges. January 30, 2012 U-091: cURL Lets Remote Users Decrypt SSL/TLS Traffic A remote user can decrypt SSL/TLS sessions in certain cases January 27, 2012 U-090: RSA enVision Discloses Environment Variable Information to Remote Users A remote user can view potentially sensitive data on the target system. January 25, 2012 U-088: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary Code Two vulnerabilities were reported in Symantec pcAnywhere. A remote user can execute arbitrary code on the target system. A local user can obtain

198

U-232: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

32: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny 32: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the Host OS U-232: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the Host OS August 10, 2012 - 7:00am Addthis PROBLEM: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the Host OS PLATFORM: This vulnerability effects only Xen 4.0 and 4.1. Xen 3.4 and earlier and xen-unstable are not vulnerable. ABSTRACT: A vulnerability was reported in Xen. A local user on a guest operating system can cause denial of service conditions on the host. reference LINKS: Xen Security Announcements SecurityTracker Alert ID: 1027365 seclists.org CVE-2012-3433 IMPACT ASSESSMENT: Medium Discussion: An HVM guest is able to manipulate its physical address space such that tearing down the guest takes an extended period amount of time searching

199

U-265: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users 5: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain Information and Execute Arbitrary Code U-265: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain Information and Execute Arbitrary Code September 21, 2012 - 6:00am Addthis PROBLEM: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain Information and Execute Arbitrary Code PLATFORM: HP SiteScope v11.10, v11.11, v11.12 for Windows, Linux and Solaris ABSTRACT: A vulnerability was reported in HP SiteScope. reference LINKS: HP Security Bulletin Document ID: c03489683 SecurityTracker Alert ID: 1027547 CVE-2012-3259 CVE-2012-3260 CVE-2012-3261 CVE-2012-3262 CVE-2012-3263 CVE-2012-3264 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in HP SiteScope. A remote user can execute

200

U-265: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users 5: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain Information and Execute Arbitrary Code U-265: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain Information and Execute Arbitrary Code September 21, 2012 - 6:00am Addthis PROBLEM: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain Information and Execute Arbitrary Code PLATFORM: HP SiteScope v11.10, v11.11, v11.12 for Windows, Linux and Solaris ABSTRACT: A vulnerability was reported in HP SiteScope. reference LINKS: HP Security Bulletin Document ID: c03489683 SecurityTracker Alert ID: 1027547 CVE-2012-3259 CVE-2012-3260 CVE-2012-3261 CVE-2012-3262 CVE-2012-3263 CVE-2012-3264 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in HP SiteScope. A remote user can execute

Note: This page contains sample records for the topic "rsa envision bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

U-232: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

32: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny 32: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the Host OS U-232: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the Host OS August 10, 2012 - 7:00am Addthis PROBLEM: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the Host OS PLATFORM: This vulnerability effects only Xen 4.0 and 4.1. Xen 3.4 and earlier and xen-unstable are not vulnerable. ABSTRACT: A vulnerability was reported in Xen. A local user on a guest operating system can cause denial of service conditions on the host. reference LINKS: Xen Security Announcements SecurityTracker Alert ID: 1027365 seclists.org CVE-2012-3433 IMPACT ASSESSMENT: Medium Discussion: An HVM guest is able to manipulate its physical address space such that tearing down the guest takes an extended period amount of time searching

202

U-029: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

29: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets Remote 29: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets Remote Users Gain Unauthorized Access U-029: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets Remote Users Gain Unauthorized Access November 8, 2011 - 8:00am Addthis PROBLEM: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets Remote Users Gain Unauthorized Access. PLATFORM: HP TCP/IP Services for OpenVMS v5.6 and v5.7 on iTanium and ALPHA Servers. ABSTRACT: A remote user can gain unauthorized access reference LINKS: HP Support document ID: c01908983 SecurityTracker Alert ID: 1026279 CVE-2011-3168 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in TCP/IP Services for OpenVMS. A remote user can gain unauthorized access. On systems running POP or IMAP servers, a remote user can gain unauthorized access.

203

This Bug Man Is a Pest George Ledin teaches students how to write viruses, and it makes  

E-Print Network (OSTI)

's going on in Ledin's classroom. He has been likened to A.Q. Khan, the Pakistani scientist who sold--and the http://www.newsweek.com/2008/08/01/this-bug-man-is-a-pest.prin... 1 of 2 #12;hackers. "We've changed

Ravikumar, B.

204

Envision Solar | Open Energy Information  

Open Energy Info (EERE)

Solar Solar Address 4225 Executive Square Place San Diego, California Zip 92037 Sector Solar Product Developing designs for converting parking lots into PV systems Website http://www.envisionsolar.com/ Coordinates 32.8740074°, -117.2155849° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":32.8740074,"lon":-117.2155849,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

205

Envision Energy | Open Energy Information  

Open Energy Info (EERE)

Policies International Clean Energy Analysis Low Emission Development Strategies Oil & Gas Smart Grid Solar U.S. OpenLabs Utilities Water Wind Page Actions View form View source...

206

Complete genome sequence of Coriobacterium glomerans type strain (PW2T) from the midgut of Pyrrhocoris apterus L. (red soldier bug)  

SciTech Connect

Coriobacterium glomerans Haas and Ko nig 1988, is the only species of the genus Coriobacterium, family Coriobacteriaceae, order Coriobacteriales, phylum Actinobacteria. The bacterium thrives as an endosymbiont of pyrrhocorid bugs, i.e. the red fire bug Pyrrhocoris apterus L. The rationale for sequencing the genome of strain PW2T is its endosymbiotic life style which is rare among members of Actinobacteria. Here we describe the features of this symbiont, together with the complete genome sequence and its annotation. This is the first complete genome sequence of a member of the genus Coriobacterium and the sixth member of the order Coriobacteriales for which complete genome sequences are now available. The 2,115,681 bp long single replicon genome with its 1,804 protein-coding and 54 RNA genes is part of the Genomic Encyclopedia of Bacteria and Archaea project.

Stackebrandt, Erko [DSMZ - German Collection of Microorganisms and Cell Cultures GmbH, Braunschweig, Germany; Zeytun, Ahmet [Los Alamos National Laboratory (LANL); Lapidus, Alla L. [U.S. Department of Energy, Joint Genome Institute; Nolan, Matt [U.S. Department of Energy, Joint Genome Institute; Lucas, Susan [U.S. Department of Energy, Joint Genome Institute; Hammon, Nancy [U.S. Department of Energy, Joint Genome Institute; Deshpande, Shweta [U.S. Department of Energy, Joint Genome Institute; Cheng, Jan-Fang [U.S. Department of Energy, Joint Genome Institute; Tapia, Roxanne [Los Alamos National Laboratory (LANL); Goodwin, Lynne A. [Los Alamos National Laboratory (LANL); Pitluck, Sam [U.S. Department of Energy, Joint Genome Institute; Liolios, Konstantinos [U.S. Department of Energy, Joint Genome Institute; Pagani, Ioanna [U.S. Department of Energy, Joint Genome Institute; Ivanova, N [U.S. Department of Energy, Joint Genome Institute; Mavromatis, K [U.S. Department of Energy, Joint Genome Institute; Mikhailova, Natalia [U.S. Department of Energy, Joint Genome Institute; Huntemann, Marcel [U.S. Department of Energy, Joint Genome Institute; Pati, Amrita [U.S. Department of Energy, Joint Genome Institute; Chen, Amy [U.S. Department of Energy, Joint Genome Institute; Palaniappan, Krishna [U.S. Department of Energy, Joint Genome Institute; Chang, Yun-Juan [ORNL; Land, Miriam L [ORNL; Hauser, Loren John [ORNL; Rohde, Manfred [HZI - Helmholtz Centre for Infection Research, Braunschweig, Germany; Pukall, Rudiger [DSMZ - German Collection of Microorganisms and Cell Cultures GmbH, Braunschweig, Germany; Goker, Markus [DSMZ - German Collection of Microorganisms and Cell Cultures GmbH, Braunschweig, Germany; Detter, J. Chris [U.S. Department of Energy, Joint Genome Institute; Woyke, Tanja [U.S. Department of Energy, Joint Genome Institute; Bristow, James [U.S. Department of Energy, Joint Genome Institute; Eisen, Jonathan [U.S. Department of Energy, Joint Genome Institute; Markowitz, Victor [U.S. Department of Energy, Joint Genome Institute; Hugenholtz, Philip [U.S. Department of Energy, Joint Genome Institute; Kyrpides, Nikos C [U.S. Department of Energy, Joint Genome Institute; Klenk, Hans-Peter [DSMZ - German Collection of Microorganisms and Cell Cultures GmbH, Braunschweig, Germany

2013-01-01T23:59:59.000Z

207

Envision.Innovate.Lead. SPONSORSHIP PACKET  

E-Print Network (OSTI)

3:30pm-4:30pm Networking Reception 4:30pm-5:00pm Quiz Bowl: Final Round 5:00pm-5:30pm Awards science literacy and leadership skills in the next generation of engineering graduates · interact posters 2) Graduate posters 3) Graduate research talks 4) Bioengineering Quiz Bowl Featured as the award

Wang, Deli

208

What Did They Do in IEA 34/43? Or How to Diagnose and Repair Bugs in 500,000 Lines of Code: Preprint  

NLE Websites -- All DOE Office Websites (Extended Search)

4978 4978 June 2009 What Did They Do in IEA 34/43? Or How to Diagnose and Repair Bugs in 500,000 Lines of Code Preprint R. Judkoff National Renewable Energy Laboratory J. Neymark J. Neymark & Associates To be presented at the Building Simulation 2009 Conference Glasgow, Scotland 27-30 July 2009 NOTICE The submitted manuscript has been offered by an employee of the Alliance for Sustainable Energy, LLC (ASE), a contractor of the US Government under Contract No. DE-AC36-08-GO28308. Accordingly, the US Government and ASE retain a nonexclusive royalty-free license to publish or reproduce the published form of this contribution, or allow others to do so, for US Government purposes. This report was prepared as an account of work sponsored by an agency of the United States government.

209

Bugs, Drugs & Smoke  

E-Print Network (OSTI)

burden of drug-resistant TB, including four – China, India,on drug-resistant TB organized by WHO in Beijing, China, inChina, the Democratic Republic of the Congo, Estonia, Ethiopia, Georgia, India, Indonesia, in new drug-

WHO

2012-01-01T23:59:59.000Z

210

Bugs, Drugs & Smoke  

E-Print Network (OSTI)

27 such countries: Armenia, Azerbaijan, Bangladesh, Belarus,independent states, such as Azerbaijan, the Republic of49 avian influenza 126 Azerbaijan 114 B bacille Calmette–

WHO

2012-01-01T23:59:59.000Z

211

Efficient side-channel testing for public key algorithms: RSA ...  

Science Conference Proceedings (OSTI)

... it may also b nts. ... us far, can qu ations in a sem nt to consider when testing might be eas ... ervals, slight d er to isolate, h is performed re a t-test (or et ...

2011-09-21T23:59:59.000Z

212

T-659: Update support for RSA Authentication Manager | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Manager July 1, 2011 - 7:15am Addthis PROBLEM: Authentication Manager SP4 Patch 4 Windows Server 2008 PLATFORM: Windows Server 2008 SP4 Patch 4 32bit & 64bit (architectures)...

213

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

91 - 18700 of 28,560 results. 91 - 18700 of 28,560 results. Article Energy Efficiency Hits from the Doors (and Windows) Our 1970's-vintage house always seemed a bit too welcoming when howling winter winds swept up Colorado's foothills. http://energy.gov/energysaver/articles/energy-efficiency-hits-doors-and-windows Article U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System A vulnerability was reported in RSA Access Manager. A remote user can gain access to the target system. http://energy.gov/cio/articles/u-205-rsa-access-manager-session-replay-flaw-lets-remote-users-access-system Article U-125: Cisco ASA Multiple Bugs Let Remote Users Deny Service Several vulnerabilities were reported in Cisco ASA. http://energy.gov/cio/articles/u-125-cisco-asa-multiple-bugs-let-remote-users-deny-service

214

Symplectic Integrator Mercury: Bug Report  

E-Print Network (OSTI)

We report on a problem found in MERCURY, a hybrid symplectic integrator used for dynamical problems in Astronomy. The variable that keeps track of bodies' statuses is uninitialised, which can result in bodies disappearing from simulations in a non-physical manner. Some FORTRAN compilers implicitly initialise variables, preventing simulations from having this problem. With other compilers, simulations with a suitably large maximum number of bodies parameter value are also unaffected. Otherwise, the problem manifests at the first event after the integrator is started, whether from scratch or continuing a previously stopped simulation. Although the problem does not manifest in some conditions, explicitly initialising the variable solves the problem in a permanent and unconditional manner.

K. de Souza Torres; D. R. Anderson

2008-08-04T23:59:59.000Z

215

OpenEI Community - bug  

Open Energy Info (EERE)

Image upload with broken thumbnail image http:en.openei.orgcommunitydiscussionimage-upload-broken-thumbnail-image

OpenEI users can upload images to the wiki by typing a new...

216

Envisioning an Ecologically Sustainable Campus At New England College  

DOE Green Energy (OSTI)

Appropriation funding for our project Ecologically Sustainable Campus - New England College (NH). 67.09. supported five environmental initiatives: (1) a wood pellet boiler for our Science Building, (2) solar hot water panels and systems for five campus buildings, (3) campus-wide energy lighting efficiency project, (4) new efficiency boiler system in Colby Residence Hall, and (5) energy efficient lighting system for the new artificial athletic turf field. (1) New England College purchased and installed a new wood pellet boiler in the Science Building. This new boiler serves as the primary heating source for this building. Our boiler was purchased through New England Wood Pellet, LLC, located in Jaffrey, New Hampshire. The boiler selected was a Swebo, P500. 300KW wood pellet boiler. The primary goals, objectives, and outcomes of this initiative include the installation of a wood pellet boiler system that is environmentally friendly, highly efficient, and represents a sustainable and renewable resource for New England College. This project was completed on December 15, 2010. (2) New England College purchased and installed solar hot water panels and systems for the Science Building, the Simon Center (student center), the H. Raymond Danforth Library, Gilmore Dining Hall, and Bridges Gymnasium. The College worked with Granite State Plumbing & Heating, LLC, located in Weare, New Hampshire on this project. The solar panels are manufactured by Heat Transfer; the product is Heat Transfer 30-tube collector panels (Evacuated Tube Type) with stainless steel hardware. The interior equipment includes Super Stor Ultra stainless steel super insulated storage tank, Taco 009 Bronze circulator pump, Solar Relay Control Pack, and a Taco Thermal Expansion Tank. The primary goals, objectives, and outcomes of this initiative will allow the College to utilize the sun as an energy resource. These solar hot water panels and systems will alleviate our dependency on fossil fuel as our primary fuel resource and provide a reliable energy source that supplies the hot water needs for sanitation, dishwashing at our dining facilities, and shower facilities for our athletes. This project initiative was completed on June 30, 2010. (3) New England College has completed energy efficiency lighting projects throughout campus, which included upgrades and new systems throughout our buildings. This project also installed efficiency controls for the Lee Clement Arena and refrigeration equipment in the Gilmore Dining Hall. The College worked with Atlantic Energy Solutions, located in Foxboro, Massachusetts on our 50/50 energy efficiency lighting project and campus-wide audit. The actual implementation of the project was completed by D. Poole Electrical Services, located in Center Barnstead, New Hampshire. The primary goals, objectives, and outcomes of this initiative were to install energy efficient lighting systems throughout our campus buildings, which ultimately will provide New England College with a more efficient way to manage and control its energy use. This project initiative was completed on February 15, 2010. (4) New England College purchased and installed a high efficiency and clean burning system for the Colby Residence Hall, which is the primary housing for our freshman. We purchased and installed two Buderus Boilers, model number G515/10 with two Riello Burners, model number RL 38/2. The College worked with Granite State Plumbing & Heating, LLS, located in Weare, New Hampshire on the installation of this high efficiency and clean burning system for the Colby Residence Hall. The primary goals, objectives, and outcomes for this initiative included the installation of a designed system of two boilers to provide redundancy for backup measures. This new system will provide New England College the flexibility to utilize just one smaller boiler to provide heat and hot water during non-peak periods thus continued reduction in energy use and our carbon footprint. This project initiative was completed on September 18, 2009. (5) New England College purchased and

Paula Amato; Gregory Palmer

2010-09-30T23:59:59.000Z

217

Envisioning an Ecologically Sustainable Campus At New England College  

Science Conference Proceedings (OSTI)

Appropriation funding for our project Ecologically Sustainable Campus - New England College (NH). 67.09. supported five environmental initiatives: (1) a wood pellet boiler for our Science Building, (2) solar hot water panels and systems for five campus buildings, (3) campus-wide energy lighting efficiency project, (4) new efficiency boiler system in Colby Residence Hall, and (5) energy efficient lighting system for the new artificial athletic turf field. (1) New England College purchased and installed a new wood pellet boiler in the Science Building. This new boiler serves as the primary heating source for this building. Our boiler was purchased through New England Wood Pellet, LLC, located in Jaffrey, New Hampshire. The boiler selected was a Swebo, P500. 300KW wood pellet boiler. The primary goals, objectives, and outcomes of this initiative include the installation of a wood pellet boiler system that is environmentally friendly, highly efficient, and represents a sustainable and renewable resource for New England College. This project was completed on December 15, 2010. (2) New England College purchased and installed solar hot water panels and systems for the Science Building, the Simon Center (student center), the H. Raymond Danforth Library, Gilmore Dining Hall, and Bridges Gymnasium. The College worked with Granite State Plumbing & Heating, LLC, located in Weare, New Hampshire on this project. The solar panels are manufactured by Heat Transfer; the product is Heat Transfer 30-tube collector panels (Evacuated Tube Type) with stainless steel hardware. The interior equipment includes Super Stor Ultra stainless steel super insulated storage tank, Taco 009 Bronze circulator pump, Solar Relay Control Pack, and a Taco Thermal Expansion Tank. The primary goals, objectives, and outcomes of this initiative will allow the College to utilize the sun as an energy resource. These solar hot water panels and systems will alleviate our dependency on fossil fuel as our primary fuel resource and provide a reliable energy source that supplies the hot water needs for sanitation, dishwashing at our dining facilities, and shower facilities for our athletes. This project initiative was completed on June 30, 2010. (3) New England College has completed energy efficiency lighting projects throughout campus, which included upgrades and new systems throughout our buildings. This project also installed efficiency controls for the Lee Clement Arena and refrigeration equipment in the Gilmore Dining Hall. The College worked with Atlantic Energy Solutions, located in Foxboro, Massachusetts on our 50/50 energy efficiency lighting project and campus-wide audit. The actual implementation of the project was completed by D. Poole Electrical Services, located in Center Barnstead, New Hampshire. The primary goals, objectives, and outcomes of this initiative were to install energy efficient lighting systems throughout our campus buildings, which ultimately will provide New England College with a more efficient way to manage and control its energy use. This project initiative was completed on February 15, 2010. (4) New England College purchased and installed a high efficiency and clean burning system for the Colby Residence Hall, which is the primary housing for our freshman. We purchased and installed two Buderus Boilers, model number G515/10 with two Riello Burners, model number RL 38/2. The College worked with Granite State Plumbing & Heating, LLS, located in Weare, New Hampshire on the installation of this high efficiency and clean burning system for the Colby Residence Hall. The primary goals, objectives, and outcomes for this initiative included the installation of a designed system of two boilers to provide redundancy for backup measures. This new system will provide New England College the flexibility to utilize just one smaller boiler to provide heat and hot water during non-peak periods thus continued reduction in energy use and our carbon footprint. This project initiative was completed on September 18, 2009. (5) New England College purchased and

Paula Amato; Gregory Palmer

2010-09-30T23:59:59.000Z

218

New Member of EM's Leadership Team Envisions Success Following...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

think most of our sites have an accelerated strategy. Case in point is the expeditious closure of two high-level waste tanks at the Savannah River Site. Another example is...

219

SpringFestisanannualeventshowcasingthelightersideofhighereducation.Thisfreeeventisagreatopportunityforstudentsofallagestolearnaboutanimals,art,astronomy, andmuchmoreintwofulldaysofhands-onactivities.JointhefestivitiesApril13and14atPurdue'sWestLafayettecam  

E-Print Network (OSTI)

of Management · College of Liberal Arts · College of Pharmacy · College of Science · College of Technology College of Veterinary Medicine Open House · Purdue Engineering: ENvision · Science Outreach Showcase · 100th Annual Horticulture Show · 23rd Annual Entomology Bug Bowl Information · Programs and maps

Holland, Jeffrey

220

'Combinatorial' Approach Squashes Software Bugs Faster ...  

Science Conference Proceedings (OSTI)

... combinatorial testing.” The NIST-Texas tool, described at a recent conference,* could save software developers significant time and money when it ...

2013-09-26T23:59:59.000Z

Note: This page contains sample records for the topic "rsa envision bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

'Bugs' used to treat FGD wastewater  

SciTech Connect

Tough regulation of heavy metals may justify a bioreactor approach in addition to chemical treatment of FGD wastewater. Two of Duke Energy' coal-fired plants, Belews Creek and Allen (in North Carolina) have installed new biological reactor systems to increase selenium removal to levels not achievable by existing scrubber waste water systems. The ABMet system removes nitrate and selenium in a single step. Progress Energy has installed the system at Roxboro and Mayo Stations, also in North Carolina. 1 fig., 2 photos.

Blankinship, S.

2009-09-15T23:59:59.000Z

222

Predicting software bugs using ARIMA model  

Science Conference Proceedings (OSTI)

The number of software products available in market is increasing rapidly. Many a time, multiple companies develop software products of similar functionalities. Thus the competition among those owning companies is becoming tougher every day. Moreover, ... Keywords: ARIMA models, evaluation approach, information theory, prediction models

Lisham L. Singh; Al Muhsen Abbas; Flaih Ahmad; Srinivasan Ramaswamy

2010-04-01T23:59:59.000Z

223

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

August 29, 2011 August 29, 2011 T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password RSA enVision lets remote users view files and remote authenticated users obtain password. August 25, 2011 T-701: Citrix Access Gateway Enterprise Edition Input Validation Flaw in Logon Portal Permits Cross-Site Scripting Attacks Citrix Access Gateway Enterprise Edition Input Validation Flaw in Logon Portal Permits Cross-Site Scripting Attacks. August 22, 2011 T-698: Adobe ColdFusion Input Validation Flaw in 'probe.cfm' Permits Cross-Site Scripting Attacks Adobe ColdFusion Input Validation Flaw in 'probe.cfm' Permits Cross-Site Scripting Attacks. August 17, 2011 T-695: Avaya Aura Application Server Buffer Overflow in 'cstore.exe' Lets Remote Users Execute Arbitrary Code

224

RSA BSAFE Crypto-C Micro Edition 3.0.0.20 Security Policy  

Science Conference Proceedings (OSTI)

... EC Diffie-Hellman primitives must use curve domain parameters ... library for their platform, which loads the Crypto ... the module is first loaded, must be ...

2013-06-24T23:59:59.000Z

225

Reducing energy consumption on RSA mines through optimised compressor control / Walter Booysen.  

E-Print Network (OSTI)

??South Africa experienced a severe shortfall in electricity supply during 2008. Eskom, the national electricity supplier, implemented several strategies to alleviate the situation. The Power… (more)

Booysen, Walter

2010-01-01T23:59:59.000Z

226

Instructions for Using Two-Factor RSA Tokens with Citrix Workplace...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Login Procedure: Enter https:workplace.doe.gov in the address field of your Internet browser. The Citrix Workplace window appears. Enter your user name in the User name...

227

Envisioning Transmission Transition: Denmark’s Incremental Shifts Towards Energy Independence  

E-Print Network (OSTI)

themselves consume more fossil energy than can be producedfossil fuel mandates, Denmark is still struggling to attain energy

Cote, Michael

2010-01-01T23:59:59.000Z

228

EnVision: A Web-Based Tool for Scientific Visualization  

Science Conference Proceedings (OSTI)

Scientific visualization is the process of transforming raw numeric data into a visual form, and is a key element of computational science. While many tools exist, they are unnecessarily difficult to use. This complexity increases time to insight and ...

Gregory P. Johnson; Stephen A. Mock; Brandt M. Westing; Gregory S. Johnson

2009-05-01T23:59:59.000Z

229

Envisioning Transmission Transition: Denmark’s Incremental Shifts Towards Energy Independence  

E-Print Network (OSTI)

new businesses. Denmark’s energy technologies are exportedin partnership with energy technology firms Energy E2 andand export of new energy technologies, yet it is highly

Cote, Michael

2010-01-01T23:59:59.000Z

230

Envisioning Radical Futures -- New York City 2106: Back to the Future  

E-Print Network (OSTI)

proposes that tall curvilinear “water towers” would populatethe towers would trans- late New York’s tradition of tall

Yarinsky, Adam

2008-01-01T23:59:59.000Z

231

Re-envisioning the Indian city : informality and temporality Sabrina Kleinenhammans.  

E-Print Network (OSTI)

Although informality constitutes an omnipresent and growing phenomenon in the cities of developing countries, planners pay limited attention to this sector. Moreover, current development schemes project Western-planning ...

Kleinenhammans, Sabrina

2009-01-01T23:59:59.000Z

232

Fuel cycles and envisioned roles of fast neutron reactors and hybrids  

Science Conference Proceedings (OSTI)

Future innovative nuclear fuel cycles will require insuring sustainability in terms of safe operation, optimal use of resources, radioactive waste minimization and reduced risk of proliferation. The present paper introduces some basic notions and fundamental fuel cycle strategies. The simulation approach needed to evaluate the impact of the different fuel cycle alternatives will also be shortly discussed.

Salvatores, Massimo [CEA-Cadarache, DEN-Dir, Bat. 101, St-Paul-Lez-Durance 13108 (France)

2012-06-19T23:59:59.000Z

233

Re-Envisioning the Delta: Alternative Futures for the Heart of California  

E-Print Network (OSTI)

from earthquake, flood, or soil subsidence. These risks areor from an earthquake- or subsidence-induced levee failure.t reflect the further soil subsidence of the last 35 years.

William Eisenstein

2007-01-01T23:59:59.000Z

234

Pyrochemical separations technologies envisioned for the U. S. accelerator transmutation of waste system  

SciTech Connect

A program has been initiated for the purpose of developing the chemical separations technologies necessary to support a large Accelerator Transmutation of Waste (ATW) system capable of dealing with the projected inventory of spent fuel from the commercial nuclear power stations in the United States. The baseline process selected combines aqueous and pyrochemical processes to enable the efficient separation of uranium, technetium, iodine, and the transuranic elements from LWR spent fuel. The diversity of processing methods was chosen for both technical and economic factors. A six-year technology evaluation and development program is foreseen, by the end of which an informed decision can be made on proceeding with demonstration of the ATW system.

Laidler, J. J.

2000-02-17T23:59:59.000Z

235

Envisioning Competence: Learning, Problem Solving, and Children at Work in the Exploratory Bicycle Shop  

E-Print Network (OSTI)

incentive for many apprentices as the following perspectivemake new friends. Another apprentice at Cascade, 15-year oldas bicycle mechanics apprentices. It shares certain

Hammond, Charles Florian

2010-01-01T23:59:59.000Z

236

Frontiers in Microbiology: Envisioning a Curriculum Unit for High School Biology  

Science Conference Proceedings (OSTI)

Microbiology is undergoing a quiet revolution. Techniques such as polymerase chain reaction, high throughput DNA sequencing, whole genome shotgun sequencing, DNA microarrays, and bioinformatics analyses are greatly aiding our understanding of the estimated one billion species of microbes that inhabit the Earth. Unfortunately, the rapid pace of research in microbiology stands in contrast to the much slower pace of change in educational reform. Biological Sciences Curriculum Study (BSCS) hosted a two-day planning meeting to discuss whether or not a new curriculum unit on microbiology is desirable for the high school audience. Attending the meeting were microbiologists, high school biology teachers, and science educators. The consensus of the participants was that an inquiry-based unit dealing with advances in microbiology should be developed for a high school biology audience. Participants established content priorities for the unit, discussed the unit's conceptual flow, brainstormed potential student activities, and discussed the role of educational technology for the unit. As a result of the planning meeting discussions, BSCS staff sought additional funding to develop, disseminate, and evaluate the Frontiers in Microbiology curriculum unit. This unit was intended to be developed as a replacement unit suitable for an introductory biology course. The unit would feature inquiry-based student activities and provide approximately four weeks of instruction. As appropriate, activities would make use of multimedia. The development and production processes would require about two years for completion. Unfortunately, BSCS staff was not able to attract sufficient funding to develop the proposed curriculum unit. Since there were some unexpended funds left over from the planning meeting, BSCS requested and received permission from DOE to use the balance of the funds to prepare background materials about advances in microbiology that would be useful to teachers. These materials were developed and placed on the BSCS Web site (http://www.bscs.org).

Mark Bloom

2004-06-18T23:59:59.000Z

237

Envisioning Transmission Transition: Denmark’s Incremental Shifts Towards Energy Independence  

E-Print Network (OSTI)

fuel types such as wood pellets, natural gas, straw, andof natural gas, straw, wood pellets, and other bio fuels.

Cote, Michael

2010-01-01T23:59:59.000Z

238

Economic impacts of the total nuclear waste management program envisioned for the United States  

SciTech Connect

This paper presents information on the costs of nuclear waste management and on the impacts of those costs on the price of power and on the capital and labor markets. It is assumed that the LWR would be the sole commercial reactor used through the year 2000. Two fuel cycle options are considered: the throwaway mode (spent fuel is waste), and the full recycle for comparison. Total costs are calculated for all facilities needed to store, package, and reposit all the spent fuel through the lifetime of 380 GW capacity installed by 2000 and operating for 30 y. The economic impact is: the price of power produced by the reactors would be increased by 1.4%; the capital for nuclear plants would apply to waste management; the average annual labor effort needed over the next 50 to 75 years is 3000 to 5000 man years; and the unit cost of spent fuel disposal is $129/kg ($119/kg for full recycle). 7 tables. (DLC)

Busch, L.; Zielen, A.J.; Parry, S.J.S.

1978-01-01T23:59:59.000Z

239

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

19, 2012 19, 2012 V-027: Adobe InDesign Server SOAP Interface Lets Remote Users Execute Arbitrary Commands Adobe InDesign Server "RunScript" SOAP Message Command Execution Vulnerability November 16, 2012 V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions Two vulnerabilities were reported in RSA Data Protection Manager. November 15, 2012 V-025: Bugzilla Multiple Cross Site Scripting and Information Disclosure Vulnerabilities Bugzilla Multiple Vulnerabilities November 14, 2012 V-024: Ubuntu update for libav Ubuntu Security Notice November 13, 2012 V-023: Microsoft Security Bulletin Advance Notification for November 2012 Microsoft Security Bulletin Advance Notification for November 2012. Microsoft has posted 4 Critical Bulletins and 1 Important Bulletins.

240

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

June 12, 2013 June 12, 2013 V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code A vulnerability was reported in Adobe Flash Player. June 10, 2013 V-174: RSA Authentication Manager Writes Operating System, SNMP, and HTTP Plug-in Proxy Passwords in Clear Text to Log Files A vulnerability was reported in RSA Authentication Manager. June 5, 2013 V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks Several vulnerabilities were reported in Apple Safari. June 4, 2013 V-170: Apache Subversion Hook Scripts Arbitrary Command Injection Vulnerability A vulnerability has been reported in Apache Subversion. June 3, 2013 V-169: Linux Kernel "iscsi_add_notunderstood_response()" Buffer Overflow

Note: This page contains sample records for the topic "rsa envision bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

July 5, 2012 July 5, 2012 U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System A vulnerability was reported in RSA Access Manager. A remote user can gain access to the target system. July 3, 2012 U-204: HP Network Node Manager i Input Validation Hole Permits Cross-Site Scripting Attacks Potential security vulnerabilities have been identified with HP Network Node Manager I (NNMi) for HP-UX, Linux, Solaris, and Windows. The vulnerabilities could be remotely exploited resulting in cross site scripting (XSS). June 29, 2012 U-202: Apple QuickTime Multiple Stack Overflow Vulnerabilities Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. June 28, 2012 U-201: HP System Management Homepage Bugs Let Remote Users Deny Service

242

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Medium Impact Medium Impact Assessment Bulletins JC3 Medium Impact Assessment Bulletins RSS December 4, 2012 V-039: Samsung and Dell printers Firmware Backdoor Unauthorized Access Vulnerability Samsung has issued a security advisory and an optional firmware update for all current Samsung networked laser printers and multifunction devices to enhance Simple Network Management Protocol (SNMP) security. November 30, 2012 V-037: Wireshark Multiple Bugs Let Remote Users Deny Service Several vulnerabilities were reported in Wireshark. November 29, 2012 V-036: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability Two vulnerabilities were reported in EMC Smarts Network Configuration Manager. November 27, 2012 V-034: RSA Adaptive Authentication (On-Premise) Input Validation Flaws

243

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

September 28, 2012 September 28, 2012 U-270:Trend Micro Control Manager Input Validation Flaw in Ad Hoc Query Module Lets Remote Users Inject SQL Commands Trend Micro has been notified of a potential product vulnerability in Control Manager. September 27, 2012 U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service A vulnerability was reported in Cisco IOS. September 26, 2012 U-268: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users A vulnerability was reported in Oracle Database. September 25, 2012 U-267: RSA® Authentication Agent 7.1 for Microsoft Windows® and RSA® Authentication Client 3.5 Access Control Vulnerability Multiple RSA Products Authentication Bypass Vulnerability September 21, 2012 U-265: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain

244

U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

file CVE-2012-1942. Version 12 on Windows is affected. The Content Security Policy's (CSP) inline-script blocking feature may not protect against some inline event handlers...

245

CTrigger: Exposing Atomicity Violation Bugs from Their Hiding Places  

E-Print Network (OSTI)

of the two molecules, broken down by atom, helps the user to understand which atoms of the drug and protein

Lu, Shan

246

T-652: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

that, when loaded by the target user, will access deleted memory (while JavaScript is disabled) and potentially execute arbitrary code on the target system CVE-2011-2373. A...

247

Got bugs? We've got a Goanna The Features  

E-Print Network (OSTI)

timetables on track. Working much like a sophisticated spell-checker for software, Goanna detects issues / Bldg 193 (Dept. of Electrical and Electronic Engineering) The University of Melbourne VIC 3010 Tel: +61 research. NICTA drives innovation through high-quality research, research training and technology transfer

248

U-074: Microsoft .NET Bugs Let Remote Users Execute Arbitrary...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

an authentication flaw and gain access to the target user's account CVE-2011-3416. A remote user can exploit a flaw in the handling of cached content when Forms Authentication...

249

U-130: JBoss Operations Network LDAP Authentication Bug Lets...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

to an error within the Lightweight Directory Access Protocol (LDAP) authentication when handling invalid bind account credentials, which can be exploited to log-in to LDAP-based...

250

What Keeps Bugs from Being Bigger? | Advanced Photon Source  

NLE Websites -- All DOE Office Websites (Extended Search)

effect is most pronounced in the orifices leading to the legs, where more and more of the space is taken up by tracheal tubes in larger species." The team then examined the...

251

Tracking system bugs: why are buffer overruns still around?  

Science Conference Proceedings (OSTI)

A buffer overrun is caused by the limited size of a string variable's allocated space and the unlimited size of the actual string that is stored in the space. In the C programming language, it is the programmer's responsibility to make sure the actual ... Keywords: buffer overrun, c programming, string overwrite

Cherry Keahey Owen

2007-10-01T23:59:59.000Z

252

American Journal of Botany 87(4): 727734. 2000. MITOCHONDRIAL AND CHLOROPLAST DNA-BASED  

E-Print Network (OSTI)

) Botterkloof,WCape,RSA;STEU2055(STEU) Steynsberg,EGreatKaroo,WCape,RSA;CPG8518(BM) Hogsback,ECape,RSA;STEU1872

Hammerton, James

253

Large-scale production, harvest and logistics of switchgrass (Panicum virgatum L.) - current technology and envisioning a mature technology  

SciTech Connect

Switchgrass (Panicum virgatum L.) is a promising cellulosic biomass feedstock for biorefineries and biofuel production. This paper reviews current and future potential technologies for production, harvest, storage, and transportation of switchgrass. Our analysis indicates that for a yield of 10 Mg ha 1, the current cost of producing switchgrass (after establishment) is about $41.50 Mg 1. The costs may be reduced to about half this if the yield is increased to 30 Mg ha 1 through genetic improvement, intensive crop management, and/or optimized inputs. At a yield of 10 Mg ha 1, we estimate that harvesting costs range from $23.72 Mg 1 for current baling technology to less than $16 Mg 1 when using a loafing collection system. At yields of 20 and 30 Mg ha 1 with an improved loafing system, harvesting costs are even lower at $12.75 Mg 1 and $9.59 Mg 1, respectively. Transport costs vary depending upon yield and fraction of land under switchgrass, bulk density of biomass, and total annual demand of a biorefinery. For a 2000 Mg d 1 plant and an annual yield of 10 Mg ha 1, the transport cost is an estimated $15.42 Mg 1, assuming 25% of the land is under switchgrass production. Total delivered cost of switchgrass using current baling technology is $80.64 Mg 1, requiring an energy input of 8.5% of the feedstock higher heating value (HHV). With mature technology, for example, a large, loaf collection system, the total delivered cost is reduced to about $71.16 Mg 1 with 7.8% of the feedstock HHV required as input. Further cost reduction can be achieved by combining mature technology with increased crop productivity. Delivered cost and energy input do not vary significantly as biorefinery capacity increases from 2000 Mg d 1 to 5000 Mg d 1 because the cost of increased distance to access a larger volume feedstock offsets the gains in increased biorefinery capacity. This paper outlines possible scenarios for the expansion of switchgrass handling to 30 Tg (million Mg) in 2015 and 100 Tg in 2030 based on predicted growth of the biorefinery industry in the USA. The value of switchgrass collection operations is estimated at more than $0.6 billion in 2015 and more than $2.1 billion in 2030. The estimated value of post harvest operations is $0.6 $2.0 billion in 2015, and $2.0 $6.5 billion in 2030, depending on the degree of preprocessing. The need for power equipment (tractors) will increase from 100 MW in 2015 to 666 MW in 2030, with corresponding annual values of $150 and $520 million, respectively. 2009 Society of Chemical Industry and John Wiley & Sons, Ltd

Sokhansanj, Shahabaddine [ORNL; Turhollow, Jr., Anthony [ORNL; Mani, Sudhagar [University of Georgia, Athens, GA; Kumar, Amit [University of Alberta; Bransby, David [Auburn University, Auburn, Alabama; Lynd, L. [Dartmouth College; Laser, Mark [Dartmouth College

2009-03-01T23:59:59.000Z

254

Transportation Sector Market Transition: Using History and Geography to Envision Possible Hydrogen Infrastructure Development and Inform Public Policy  

DOE Green Energy (OSTI)

This report covers the challenges to building an infrastructure for hydrogen, for use as transportation fuel. Deployment technologies and policies that could quicken deployment are addressed.

Brown, E.

2008-08-01T23:59:59.000Z

255

Existence challenged, progress envisioned, culture compromised: the effects of western influences on traditional values in South Korea  

E-Print Network (OSTI)

This thesis is an exploratory one, which examines the relationship between Western influences (such as the media, education, work, travel, and friendships) and traditional values in South Korea (such as those related to family, social relationships, nationalism, social order, leisure time, work, religion and womenÂ?s issues). The relationship between these was investigated in light of modernization theories and RiesmanÂ?s stages of societal progress. Furthermore, a survey was conducted among 579 individuals from the younger and older generations in Seoul and Daegu, to determine the degree of Western influences among the generations, and the adherence to traditional values. It was found that the younger generation clearly had more exposure to Western influences, and also adhered much less to traditional values, while the opposite held true for the older generation. A case was made that South KoreaÂ?s unprecedented development following Independence opened the country, especially the younger generation, to influences from the West as they had never experienced before. The generation gap that came as a result of this is extreme, and without express effort to preserve those traditional values that have shaped Korean society for so long, there may be serious ramifications for Korean society in the future.

Min, Crystal Dawn

256

Dr. Mae Jemison is the principal for the 100 Year Starship Project, which envisions human travel beyond our solar system  

E-Print Network (OSTI)

combustor coupled with a free-piston Stirling engine. The design and development of a catalytic combustor ratios varying in the 0.35­0.70 range. The combustor is interfaced with a free-piston Stirling engine combustion; Electrospray; Catalytic; Free-piston Stirling engine 1. Introduction Power generation is often

Collins, Gary S.

257

Microsoft Word - Title page K.docx  

NLE Websites -- All DOE Office Websites (Extended Search)

2003. Print. Dussling, Jennifer. Bugs bugs bugs. New York: DK Pub., 1998. Print. Fowler, Allan. From seed to plant. New York: Children's Press, 2001. Print. ---. It's a good...

258

Implementing Scanned Medical Record Systems in Australia: A Structured Case Study on Envisioned Changes to Elective Admissions Process in a Victorian Hospital  

Science Conference Proceedings (OSTI)

In recent years, influenced by the pervasive power of technology, standards and mandates, Australian hospitals have begun exploring digital forms of keeping this record. The main rationale is the ease of accessing different data sources at the same time ... Keywords: Australia, Change Management, Elective Admission Process, Electronic Health Records, Process Redesign, Scanned Medical Records, Victoria

Elise McAuley, Chandana Unnithan, Sofie Karamzalis

2012-10-01T23:59:59.000Z

259

Cyber Security, Information Technology Division, ITD  

NLE Websites -- All DOE Office Websites (Extended Search)

RSA SecurID User Guide VPN Home What is RSA SecurID? RSA SecurID two-factor authentication is based on something you know (a password or PIN) and something you have (an...

260

Feature Story --The Right Bugs | Miller-McCune Magazine Feature Story  

E-Print Network (OSTI)

an engineer, in a sense, because he works on how to use microbes to effect environmental change." In 1995 later patented them. Hazen began working at the Hanford Site in 2002, when hexavalent chromium with telephone poles is the only human signature for 10 miles beyond the security checkpoint at the Hanford Site

Hazen, Terry

Note: This page contains sample records for the topic "rsa envision bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

U-125: Cisco ASA Multiple Bugs Let Remote Users Deny Service...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Deny Service PLATFORM: Cisco ASA 5500 Series Adaptive Security Appliances and Cisco Catalyst 6500 Series ASA Services Module ABSTRACT: Several vulnerabilities were reported in...

262

V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Routers (ISRs) Cisco NM-AIR-WLC Module for Integrated Services Routers (ISRs) Cisco Catalyst 3750G Integrated WLCs Cisco Flex 7500 Series Cloud Controller Cisco Virtual Wireless...

263

X-ray science taps bug biology to design better materials and reduce  

NLE Websites -- All DOE Office Websites (Extended Search)

News News Press Releases Feature Stories In the News Experts Guide Media Contacts Social Media Photos Videos Fact Sheets, Brochures and Reports Summer Science Writing Internship Caddiesflies spin an adhesive silk underwater to build nets to capture food and build protective shelter. Pictured is that silk magnified. Courtesy: Bennett Addison. Click to enlarge. Caddiesflies spin an adhesive silk underwater to build nets to capture food and build protective shelter. Pictured is that silk magnified. Courtesy: Bennett Addison. Click to enlarge. "(Caddisfly silk) is really not much stronger than super glue, but try to put super glue in your bathtub without it ever getting a chance to dry," says Jeff Yarger, professor of chemistry, biochemistry and physics at Arizona State University. Courtesy: Bennett Addison. Click to enlarge.

264

V-077: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

property (via 'setSysProp.jsp') to bypass access restrictions and gain access to the API functionality. This can be exploited to download configuration files, download database...

265

U-155: WebCalendar Access Control and File Inclusion Bugs Let...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

request to 'pref.php' to include an arbitrary local file. magicquotesgpc must be disabled to exploit this flaw. Impact: A remote user may be able to execute arbitrary PHP code...

266

U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

input elements may be autocompleted even if the site specifies that autocomplete be disabled CVE-2012-0680. A remote user can create specially crafted HTML that, when loaded by...

267

U-233: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Oracle Database. This vulnerability is not remotely exploitable without authentication, i.e., may...

268

U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

the target system. A remote authenticated user can execute SQL commands on the underlying database. A remote user can spoof connections in certain cases. Solution: The vendor has...

269

V-063: Adobe ColdFusion Bugs Let Remote Users Gain Access and...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Gain Access and Obtain Information PLATFORM: ColdFusion 10, 9.0.2, 9.0.1 and 9.0 for Windows, Macintosh and UNIX ABSTRACT: Adobe has identified three vulnerabilities affecting...

270

Researchers combat resurgence of bed bug in behavioral studies and monitor trials  

E-Print Network (OSTI)

pitfall traps baited with carbon dioxide, heat, and chemicalGibb, Bennett 2009). carbon dioxide and pheromones, and theywere disturbed with carbon dioxide (fig. 1, orange line).

Lewis, Vernard R; Moore, Sara E; Tabuchi, Robin L; Sutherland, Andrew M; Choe, Dong-Hwan; Tsutsui, Neil D

2013-01-01T23:59:59.000Z

271

The Natural History of Bugs: Using Formal Methods to Analyse Software Related Failures in Space Missions  

E-Print Network (OSTI)

Johnson,C.W. Formal Methods 2005, F. Fitzgerald, I.J. Hayes and A. Tarlecki (eds), Springer Verlag, LNCS 3582 pp 9-25 Springer Verlag

Johnson, C.W.

272

April 30, 2010 Getting the Bugs Out, a New Approach to Renewable  

E-Print Network (OSTI)

of the federal stimulus money. It hopes to generate the energy-rich fuel octanol. 'Magic' done on a rooftop "With you can run on a rooftop." And so, on a rooftop at UMass, the researchers grow bacteria on the surface of a graphite electrode. A nearby solar panel captures energy and delivers it to the bacteria-laden electrode

Lovley, Derek

273

U-029: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

The patch kits and installation instructions are available from: HP Support Center Home. Addthis Related Articles U-032: Microsoft Security Bulletin Windows TCPIP MS11-083...

274

V-015: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

ID: 56363 CVE-2012-3748 CVE-2012-3749 CVE-2012-3750 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will...

275

V-199: Solaris Bugs Let Local Users Gain Root Privileges, Remote...  

NLE Websites -- All DOE Office Websites (Extended Search)

of service conditions A local user can obtain root privileges on the target system A remote user can partially access and modify data on the target system SOLUTION: Vendor...

276

U-008: Symantec Data Loss Prevention Bugs in KeyView Filter Lets...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

crafted Applix spreadsheet can trigger this flaw CVE-2011-1216. A specially crafted Zip File Viewer document can trigger this flaw CVE-2011-1218. Impact: A remote user can...

277

Metabolic engineering of microorganisms for biofuels production: from bugs to synthetic biology to fuels  

E-Print Network (OSTI)

biomass to fuels will involve the development of dedicated energy plants that maximize solar energy conversion to chemical

Kuk Lee, Sung

2010-01-01T23:59:59.000Z

278

Metabolic engineering of microorganisms for biofuels production: from bugs to synthetic biology to fuels  

E-Print Network (OSTI)

economically viable biofuel production, all aspects of thesemany challenges on biofuel production [1,3 ,28-30]. Some ofhigh-flux reactions. Biofuel production efforts can benefit

Kuk Lee, Sung

2010-01-01T23:59:59.000Z

279

Metabolic engineering of microorganisms for biofuels production: from bugs to synthetic biology to fuels  

E-Print Network (OSTI)

of microbial hosts for biofuels production. Metab Eng 2008,delivers next-generation biofuels. Nat Biotechnol 27.furfural (HMF). Biotechnol Biofuels 2008, 1:12. 40. Trinh

Kuk Lee, Sung

2010-01-01T23:59:59.000Z

280

U-005: Apache mod_proxy Pattern Matching Bug Lets Remote Users...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

is configured in reverse proxy mode and uses the RewriteRule or ProxyPassMatch directives with a pattern match, a remote user can send a specially crafted request to access...

Note: This page contains sample records for the topic "rsa envision bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

T-633: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

with large RRSIG RRsets to act as the trigger. The attacker would then find ways to query an organization's caching resolvers for non-existent names in the domain served by the...

282

U-153: EMC Data Protection Advisor Server and Collector Bugs Let Remote Users Deny Service  

Energy.gov (U.S. Department of Energy (DOE))

Two vulnerabilities were reported in EMC Data Protection Advisor. A remote user can cause denial of service conditions.

283

V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

IMPACT ASSESSMENT: High DISCUSSION: A remote user can exploit the valueOf() method of window.location to, in combination with some plugins, inject scripting code to cause...

284

[Unfortunately due to a bug that slipped by in testing we never ...  

E-Print Network (OSTI)

... sage to magma by an order of magnitude [Reviewed by Martin Albrecht, Michael Abshoff] #4769: Minh Van Nguyen, Michael Abshoff: add 5 people to devmap ...

285

Metabolic engineering of microorganisms for biofuels production: from bugs to synthetic biology to fuels  

SciTech Connect

The ability to generate microorganisms that can produce biofuels similar to petroleum-based transportation fuels would allow the use of existing engines and infrastructure and would save an enormous amount of capital required for replacing the current infrastructure to accommodate biofuels that have properties significantly different from petroleum-based fuels. Several groups have demonstrated the feasibility of manipulating microbes to produce molecules similar to petroleum-derived products, albeit at relatively low productivity (e.g. maximum butanol production is around 20 g/L). For cost-effective production of biofuels, the fuel-producing hosts and pathways must be engineered and optimized. Advances in metabolic engineering and synthetic biology will provide new tools for metabolic engineers to better understand how to rewire the cell in order to create the desired phenotypes for the production of economically viable biofuels.

Kuk Lee, Sung; Chou, Howard; Ham, Timothy S.; Soon Lee, Taek; Keasling, Jay D.

2009-12-02T23:59:59.000Z

286

X-ray science taps bug biology to design better materials and...  

NLE Websites -- All DOE Office Websites (Extended Search)

and Reports Summer Science Writing Internship Caddiesflies spin an adhesive silk underwater to build nets to capture food and build protective shelter. Pictured is that silk...

287

Metabolic engineering of microorganisms for biofuels production: from bugs to synthetic biology to fuels  

E-Print Network (OSTI)

available as potential biofuel candidates and productionfuels and alternative biofuel molecules An understanding ofto consider when designing biofuel candidates ( Table 1).

Kuk Lee, Sung

2010-01-01T23:59:59.000Z

288

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

71 - 22680 of 26,764 results. 71 - 22680 of 26,764 results. Article Small Wind Electric Systems Small wind electric systems are one of the most cost-effective home-based renewable energy systems -- with zero emissions and pollution. http://energy.gov/energysaver/articles/small-wind-electric-systems Article T-642: RSA SecurID update to Customers RSA investigation has revealed that the attack resulted in certain information being extracted from RSA's systems. Some of that information is related to RSA's SecurID two-factor authentication products http://energy.gov/cio/articles/t-642-rsa-securid-update-customers Article T-582: RSA systems has resulted in certain information being extracted from RSA systems that relates to RSA SecurID RSA investigation has revealed that the attack resulted in certain

289

Myriad Mirids: The spectacular radiation of Pseudoloxops (Hemiptera: Miridae) plant bugs in French Polynesia (and the kids that love them!)  

E-Print Network (OSTI)

water (mixed with motor oil) Spray bottles Microscope Laptopspraying them with water and motor oil. They didn’t seem to

Balukjian, Bradley James

2013-01-01T23:59:59.000Z

290

Don’t Let the HumBUG Get Achoo - Tips for a healthy winter at work and home  

SciTech Connect

Safety-related article for recurrinig column in the Tri-City Area Journal of Business. Focuses on seasonal wellness tips for employers and employees - namely, cold and flu prevention through personal hygiene.

Schlender, Michael H.

2006-12-15T23:59:59.000Z

291

Myriad Mirids: The spectacular radiation of Pseudoloxops (Hemiptera: Miridae) plant bugs in French Polynesia (and the kids that love them!)  

E-Print Network (OSTI)

stripe ventrally and crossing hockey-stick-pattern dorsally,yellow with crossing red hockey stick-shaped stripes meetingyellow with red crossing hockey-stick pattern meeting in

Balukjian, Bradley James

2013-01-01T23:59:59.000Z

292

Security Policy  

Science Conference Proceedings (OSTI)

... RSA keypair • DSA pairwise consistency test upon generation of an ... before unwrapping the antistatic package, discharge static electricity from your ...

2012-10-12T23:59:59.000Z

293

Extended Abstract 1 International Kimberlite Conference Extended Abstract No. 9IKC-A-00387, 2008  

E-Print Network (OSTI)

, Johannesburg 2001, RSA; 11: ABB AB, HVDC, Ludvika, SE-77180, Sweden; 12: Other members of the SAMTEX team

Jones, Alan G.

294

"MfgCode","MfgName" "1","321 Studios" "10","ADS Tech" "100 ...  

Science Conference Proceedings (OSTI)

... Wind Technologies" "1928","Nuclear Coffee Software ... 204","Computer" "2040","Environmental Support Solutions ... 794","RSA Security" "795","RTsoft ...

2013-10-30T23:59:59.000Z

295

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... Nuclear Regulatory Commission; National Security Agency (File ... Richard S. Carson & Associates; RSA Securities; RU Consulting (File 1 of 2 ...

296

Aspect-Oriented Programming with Jiazzi Sean McDirmid, Wilson C. Hsieh  

E-Print Network (OSTI)

) to understand why atomicity violation bugs are hard to expose. Second, it proposes CTrigger to effectively

Utah, University of

297

Engineering the Synthesis of Five-Carbon Alcohols from Isopentenyl Diphosphate and Increasing its Production Using an Adaptive Control System  

E-Print Network (OSTI)

of microorganisms for biofuel production: from bugs tofor Direct Biofuel Production from Brown Microalgae. Science

Chou, Howard

2012-01-01T23:59:59.000Z

298

Bugs boost Cold War clean-up: Bacteria could scrub uranium from sites contaminated decades ago. updated at midnight GMTtoday is friday, november 14  

E-Print Network (OSTI)

.7% (no enrichment) and around 20% · Large amount of depleted uranium results from enrichment Energy an integrated facility (Integral Fast Reactor), where only small amounts of natural uranium or waste depleted nuclear fuel cycles Ore · All fuel cycles begin with uranium and/or thorium which are the only naturally

Lovley, Derek

299

Breathing rust -and new life into bug science | csmonitor.com WORLD USA COMMENTARY WORK & MONEY LEARNING LIVING SCI / TECH ARTS & LEISURE BOOKS THE HOME FORUM  

E-Print Network (OSTI)

has an alternative, successfully tested at a uranium mine in Colorado the past two summers. By pumping where uranium now poisons the groundwater, Lovley says, the cost would bankrupt the country. His team

Lovley, Derek

300

Gases to gases n Scanning the horizon n Hunting the last ice sheet n Bugs, bogs and gravity www.planetearth.nerc.ac.uk Summer2010  

E-Print Network (OSTI)

of the Rewa Head Anacondas and giant otters ­ experiencing Guyana's biodiversity up close! 15 Scanning

Note: This page contains sample records for the topic "rsa envision bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

March 21, 2011 March 21, 2011 T-584: Microsoft March 2011 Security Bulletin Release Microsoft released 3 bulletins to address vulnerabilities involving Microsoft Office Suites and Software in Windows OS. This Microsoft Bulletin contains 1 Critical vulnerabilities which require a restart after the applied patch. The Exploitability Index, displays both CVE and Microsoft bulletin ID associated to vulnerability. March 17, 2011 T-582: RSA systems has resulted in certain information being extracted from RSA systems that relates to RSA SecurID RSA investigation has revealed that the attack resulted in certain information being extracted from RSA's systems. Some of that information is related to RSA's SecurID two-factor authentication products. March 14, 2011 T-577: Security Advisory for Adobe Flash Player, Adobe Reader and Acrobat

302

Tech Beat April 1, 2008  

Science Conference Proceedings (OSTI)

... the key engineering challenges to building a clean ... RSA Conference 2008 in San Francisco, Calif. ... widely used today in commercial security products ...

2011-07-18T23:59:59.000Z

303

High Resolution Imaging of in situ Root Hair Development to Assess Oilseed Species Responses to Water Stress  

E-Print Network (OSTI)

3: Root hair geometry for canola, camelina, flax, and lentilof four crop species, canola (Brassica napus), camelina (RSA (Pcanola and camelina had the

Hammac, Warren Ashley; Pan, William; Bolton, Ronald; Koenig, Richard

2009-01-01T23:59:59.000Z

304

Answers To Frequently Asked Questions About Today's ...  

Science Conference Proceedings (OSTI)

... need for which has arisen with the proliferation of digital ... RSA's resistance to attack during many years of ... Factoring is a very active field of research ...

2000-07-19T23:59:59.000Z

305

Bedbugs  

NLE Websites -- All DOE Office Websites (Extended Search)

Bedbugs Bedbugs Nature Bulletin No. 487-A March 31, 1973 Forest Preserve District of Cook County George W. Dunne, President Roland F. Eisenbeis, Supt. of Conservation BEDBUGS The name "bug" frequently and carelessly applied to insects in general, really belongs only to certain special kinds. A true bug differs from other insects in having a beak with which it pierces the skin and sucks the juices from plants or animals, a characteristic odor, and peculiar wings. Further, instead of having four stages in its life history -- egg, larva, pupa and adult -- it has only three. The tiny young, or "nymphs", resemble their parents as soon as hatched from the egg. The water bugs, stink bugs, squash bug, chinch bug, boxelder bug -- and that hated blood-sucking parasite, the Bedbug -- are true bugs.

306

Urban Turbulence in Space and in Time  

Science Conference Proceedings (OSTI)

The utility of aggregating data from near-surface meteorological networks for initiating dispersion models is examined by using data from the “WeatherBug” network that is operated by Earth Networks, Inc. WeatherBug instruments are typically ...

Bruce B. Hicks; William J. Callahan; William R. Pendergrass III; Ronald J. Dobosy; Elena Novakovskaia

2012-02-01T23:59:59.000Z

307

Web sites and resources - SAMATE  

Science Conference Proceedings (OSTI)

... scanning open source "to uncover some of the most critical types of bugs". Software Assurance in the SCADA Community. ...

2013-05-22T23:59:59.000Z

308

Recent Corporate Combinations in the Natural Gas Industry  

U.S. Energy Information Administration (EIA)

Gas Inc plants and Energy Cogeneration, BUG sought to cogeneration maximize shareholder value and pursue other investment opportunities.

309

Tracking defect warnings across versions  

Science Conference Proceedings (OSTI)

Various static analysis tools will analyze a software artifact in order to identify potential defects, such as misused APIs, race conditions and deadlocks, and security vulnerabilities. For a number of reasons, it is important to be able to track the ... Keywords: FindBugs, Java, bug histories, bug tracking, static analysis

Jaime Spacco; David Hovemeyer; William Pugh

2006-05-01T23:59:59.000Z

310

A framework for the static verification of api calls  

Science Conference Proceedings (OSTI)

A number of tools can statically check program code to identify commonly encountered bug patterns. At the same time, programs are increasingly relying on external apis for performing the bulk of their work: the bug-prone program logic is being fleshed-out, ... Keywords: FindBugs, Library, Programming by contract, Static analysis, api

Diomidis Spinellis; Panagiotis Louridas

2007-07-01T23:59:59.000Z

311

Scaling up transit priority modelling using high-throughput computing  

Science Conference Proceedings (OSTI)

The optimization of Road Space Allocation (RSA) from a network perspective is computationally challenging. An analogue to the Network Design Problem (NDP), RSA can be classified NP-hard. In large-scale networks when the number of alternatives increases ... Keywords: genetic algorithm, high-performance computing, high-throughput computing, transport modelling

Mahmoud Mesbah, Majid Sarvi, Jefferson Tan, Fateme Karimirad

2012-01-01T23:59:59.000Z

312

Microsoft Word - SMail_Secure_Web-Based_Email_v3 _2_.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

HQ OCIO Instructions for Using Secure Email (SMail) via HQ OCIO Instructions for Using Secure Email (SMail) via Outlook Web Access with an RSA Token Instructions for Using Secure Email (SMail) via Outlook Web Access with an RSA Token Version 4 April 2010 Office of the Associate CIO for IT Support Services United States Department of Energy DOE HQ OCIO Instructions for Using Secure Email (SMail) via Outlook Web Access with an RSA Token Requirements SMail: 1. An Energy IT Services (EITS) provided Exchange email account. 1 2. An EITS provided RSA SecureID Token with an active account in the EITS-managed RSA Authentication Server. 2 3. Appropriate access granted Active Directory group membership. 3 4. DOEnet or Internet access and a supported web browser. Login Procedure for SMail:

313

Microsoft Word - Citrix_2FA_Authentication_12_3_2009.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Factor Factor RSA Tokens with Citrix Workplace Environment (CWE) Revision 1.13 December, 2009 Associate CIO for Operations (IM) United States Department of Energy DOE HQ OCIO Application Hosting Environment Instructions for Using RSA Token with Citrix Workplace Environment Using Your RSA Token with Citrix Note: If you access Citrix Workplace from within the DOE network (DOEnet or VPN) then you do not need an RSA Two-Factor token. The Citrix Workplace logon screen will prompt you only for your Windows User name and Password. Step 1 - Establish a connection to the Internet and connect to https://workplace.doe.gov. Step 2 - Click "OK" to bypass the Government warning banner. DOE HQ OCIO Application Hosting Environment Instructions for Using RSA Token with Citrix Workplace Environment

314

OSTI, US Dept of Energy, Office of Scientific and Technical Informatio...  

Office of Scientific and Technical Information (OSTI)

space? How about microbes, bugs, or mutants? Related Topics: audio, DOE laboratories, open government plan, research, ScienceCinema, sciencecinema Read more... DOE research...

315

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

VNXVNXe Access Control Bug Lets Remote Authenticated Users Access FilesDirectories A vulnerability was reported in EMC CelerraVNXVNXe. A remote authenticated user can access...

316

OSTI, US Dept of Energy, Office of Scientific and Technical Informatio...  

Office of Scientific and Technical Information (OSTI)

about DOE's work in robotics, antimatter, or outer space? How about microbes, bugs, or mutants? Related Topics: audio indexing, DOE laboratories, open government plan, research...

317

Rapsodia  

NLE Websites -- All DOE Office Websites (Extended Search)

a code generator to efficiently compute higher order derivatives via operator overloading LEM3 logo Argonne logo Access -- API Documentation -- Manual -- Bugs -- Tests -- Contact...

318

NIST SP 800-155, BIOS Integrity Measurement Guidelines ...  

Science Conference Proceedings (OSTI)

... failure, information leakage, and other losses of confidentiality ... fix bugs in the power management subsystem ... hard disk or network management, or ...

2013-04-25T23:59:59.000Z

319

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

gain 'SYS' privileges on the target system. http:energy.govcioarticlesu-233-oracle-database-indextype-ctxsyscontext-bug-lets-remote-authenticated-users-gain Article Small...

320

The National Institute of Standards & Technology (NIST) is a ...  

Science Conference Proceedings (OSTI)

... including: power outages due to storms, failures in backup generators, software bugs ... average anti-fitness to drop and then climb back up during the ...

2012-11-02T23:59:59.000Z

Note: This page contains sample records for the topic "rsa envision bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

diff -crN oommf-1.0b2/CHANGES oommf/CHANGES  

Science Conference Proceedings (OSTI)

... Expanded Tcl/Tk support. ... agrees with Tcl/Tk 8.0.3 and later. + - optional optimization flags in config/cache/*.tcl comments. +. + * Bug fixes. ...

322

Error-correcting codes and cryptography  

Science Conference Proceedings (OSTI)

Oct 20, 2006 ... topics where error-correcting codes overlap with cryptography. In some of these ..... human errors, e.g., misconfigurations or bugs. If biological ...

323

SSRL Web Requests  

NLE Websites -- All DOE Office Websites (Extended Search)

pagesite Change Fix existing form or application Develop new form or application Web-ImagesGraphics Web-Flash Webserver bug - error report Login Help Details of your...

324

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Table' privileges can gain 'SYS' privileges on the target system. http:energy.govcioarticlesu-233-oracle-database-indextype-ctxsyscontext-bug-lets-remote-authenticated-u...

325

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Users Deny Service Several vulnerabilities were reported in Wireshark. http:energy.govcioarticlesv-037-wireshark-multiple-bugs-let-remote-users-deny-service Article Students...

326

PETSc: Documentation: AMS  

NLE Websites -- All DOE Office Websites (Extended Search)

- Argonne Memory Snooper Home Download Features Documentation Manual pages and Users Manual Citing PETSc Tutorials Installation AMS Changes Bug Reporting Code Management FAQ...

327

Mercury | RPC for High-Performance Computing  

NLE Websites -- All DOE Office Websites (Extended Search)

RPC for High-Performance Computing Skip to content Home About Overview Collaborators Downloads Documentation Getting Started Doxygen Publications Support Mailing Lists Bug Reports...

328

NATURE WALKS SCHEDULE - SPRING 2013  

NLE Websites -- All DOE Office Websites (Extended Search)

items include water, binoculars, field guide to birds, field guide to stars, bug spray if needed. We should see American woodcock flight displays, we will have a...

329

U-268: Oracle Database Authentication Protocol Discloses Session...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Bug Lets Remote Authenticated Users Gain Elevated Privileges V-104: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code T-535: Oracle Critical Patch Update -...

330

V-073: IBM Tivoli Federated Identity Manager Signature Verification...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users Inject Commands on the Target System V-145: IBM Tivoli Federated Identity Manager Products Java Multiple Vulnerabilities...

331

U-021: Cisco Unified Communications Manager Directory Traversal...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Information U-125: Cisco ASA Multiple Bugs Let Remote Users Deny Service T-703: Cisco Unified Communications Manager Open Query Interface Lets Remote Users Obtain Database Contents...

332

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Office of Science, announced... http:energy.govarticlesusstatements-international-fusion-reactor-iter-siting-decision Article U-121: Apple iOS Bugs Let Remote Users Execute...

333

PETSc: Documentation: Installation  

NLE Websites -- All DOE Office Websites (Extended Search)

Installation Home Download Features Documentation Manual pages and Users Manual Citing PETSc Tutorials Installation AMS Changes Bug Reporting Code Management FAQ License Linear...

334

ZeptoOS // Links  

NLE Websites -- All DOE Office Websites (Extended Search)

Links ZeptoOS-specific resources: Subversion repository Kernel GIT repository Bug tracking system Blue Gene resources: ALCF: Argonne Leadership Computing Facility Blue Gene...

335

Superurbeffimero n. 7: Umberto Eco’s Semiologia and the Architectural Rituals of the U.F.O.  

E-Print Network (OSTI)

Riedlinger. 1916. Cours de linguistique générale. Paris:Saussure’s Cours de linguistique générale and re-envisioned

Wolf, Amit

2011-01-01T23:59:59.000Z

336

OSP WEEKLY FUNDING BULLETIN Volume 4, Issue 38 27 September 2010  

E-Print Network (OSTI)

),Office of Nonproliferation and Verification Research and Development (NA-22). The envisioned cooperative agreement expertise in nonproliferation and nuclear security

Alabama in Huntsville, University of

337

News Briefs  

Science Conference Proceedings (OSTI)

... Nonetheless, building heating, ventilating, and air- conditioning equipment routinely fails to satisfy perfor- mance expectations envisioned at design ...

2001-07-18T23:59:59.000Z

338

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

10, 2011 10, 2011 T-644: Prenotification Security Advisory - Adobe Acrobat & Adobe Readers Updates A prenotification Security Advisory has been posted in regards to the upcoming quarterly Adobe Reader and Acrobat updates scheduled for Tuesday, June 14, 2011. The updates will address critical security issues in the products. June 9, 2011 T-643: HP OpenView Storage Data Protector Unspecified Code Execution Vulnerability A vulnerability has been reported in HP OpenView Storage Data Protector, which can be exploited by malicious people to compromise a vulnerable system. June 9, 2011 T-642: RSA SecurID update to Customers RSA investigation has revealed that the attack resulted in certain information being extracted from RSA's systems. Some of that information is related to RSA's SecurID two-factor authentication products

339

centre for telematics and information progress report  

E-Print Network (OSTI)

on the vulnerabil- ity of SCADA protocols. Security venues such as DEFCON, Blackhat, and RSA have recently included implementation vulnerabilities that allow attack- ers to execute arbitrary code in specific SCADA protocols

Al Hanbali, Ahmad

340

CyberPhysical System Security for the Electric Power Grid  

E-Print Network (OSTI)

on the vulnerabil- ity of SCADA protocols. Security venues such as DEFCON, Blackhat, and RSA have recently included implementation vulnerabilities that allow attack- ers to execute arbitrary code in specific SCADA protocols

Manimaran, Govindarasu

Note: This page contains sample records for the topic "rsa envision bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Remote Access to the BNL Network, Cyber Security, Information...  

NLE Websites -- All DOE Office Websites (Extended Search)

Virtual Private Network (VPN) at Brookhaven CryptoCard tokens (hard or soft) will not supported after December 31, 2010. Please switch to RSA SecureID tokens as soon as possible....

342

Citrix_2FA_Authentication-September09  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Factor RSA Token with Citrix Workplace Environment (CWE) Revision 1.13 September, 2009 Office of IT Operations (IM-621) United States Department of Energy DOE HQ OCIO Application...

343

Remote Access to the BNL Network, Cyber Security, Information Technology  

NLE Websites -- All DOE Office Websites (Extended Search)

Virtual Private Network (VPN) Virtual Private Network (VPN) at Brookhaven CryptoCard tokens (hard or soft) will not supported after December 31, 2010. Please switch to RSA SecurID tokens as soon as possible. Contact the ITD Helpdesk at x5522 (631-344-5522) or send an email to itdhelp@bnl.gov if you have questions or concerns. The VPN service allows remote users to securely access the Brookhaven internal network through their own personal Internet Service Provider, so that it appears as if their home computer is right on the BNL internal network. Requirements Some form of internet connectivity. Only BNL employees can access this service. You must have a RSA SecurID token. Desktop VPN Client Clientless VPN Obtain a RSA SecurID Token RSA SecurID User Guide Last Modified: September 23, 2013

344

Instructions for Using Secure Email via Outlook Web Access | Department of  

NLE Websites -- All DOE Office Websites (Extended Search)

Secure Email via Outlook Web Access Secure Email via Outlook Web Access Instructions for Using Secure Email via Outlook Web Access Outlook Web Access provides access to unencrypted email only and is suitable for use from any computer. Secure Email Requirements: An EITS provided Exchange email account An EITS provided RSA SecureID Token with an active account in the EITS-managed RSA Authentication Server Appropriate access granted Active Directory group membership DOEnet or Internet access and a supported web browser Secure Email Login Procedure: Enter https://smail.doe.gov/ in the address field of your Internet browser. The Outlook Web Access window appears. When using an RSA SecurID hardware token: Enter your user name in the User name field. Enter your password, which is your RSA token PIN plus the number

345

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

91 - 21200 of 26,764 results. 91 - 21200 of 26,764 results. Article T-672: Oracle Critical Patch Update Advisory- July 2011 Due to the threat posed by a successful attack, Oracle strongly recommends that customers apply CPU fixes as soon as possible. This Critical Patch Update contains 78 new security fixes across all product families. http://energy.gov/cio/articles/t-672-oracle-critical-patch-update-advisory-july-2011 Article T-640: RSA Access Manager Server CVE-2011-0322 Update RSA strongly recommends that all customers running RSA Access Manager Server versions 5.5.3, 6.0.4, and 6.1 apply the following updated security hot fixes, which contain the resolution to this issue, at the earliest opportunity. The hot fixes can be downloaded from SecurCare Online or by contacting RSA Security Customer Support.

346

Account Request  

NLE Websites -- All DOE Office Websites (Extended Search)

account or an RSA SecurID account, you should also apply for them now. Entrust Account DOE-supported application for exchanging encrypted e-mails with fellow DOE personnel. For...

347

Air Permitting for Stationary Sources (New Hampshire)  

Energy.gov (U.S. Department of Energy (DOE))

The permitting system implements the permitting requirements of RSA 125-C and 125-I to regulate the operation and modification of new and existing stationary sources, area sources, and devices to...

348

Assessment of Autonomic Control and Respiratory Sinus Arrhythmia Using Point Process Models of Human Heart Beat Dynamics  

E-Print Network (OSTI)

Tracking the autonomic control and respiratory sinus arrhythmia (RSA) from electrocardiogram and respiratory measurements is an important problem in cardiovascular control. We propose a point process adaptive filter algorithm ...

Chen, Zhe

349

SSH: secure login connections over the internet  

Science Conference Proceedings (OSTI)

SSH provides secure login, file transfer, X11, and TCP/IP connections over an untrusted network. It uses cryptographic authentication, automatic session encryption, and integrity protection for transferred data. RSA is used for key exchange and authentication, ...

Tatu Ylönen

1996-07-01T23:59:59.000Z

350

The ICSI SSL Notary: Lesssons and Insights from a Large ...  

Science Conference Proceedings (OSTI)

... Top ciphers Google TLS_RSA_WITH_RC4_128_MD5 ... Comodo: certificates for google, mozilla, live.com, login.yahoo.com www.google.com ...

2013-04-11T23:59:59.000Z

351

Production-run software failure diagnosis via hardware performance counters  

Science Conference Proceedings (OSTI)

Sequential and concurrency bugs are widespread in deployed software. They cause severe failures and huge financial loss during production runs. Tools that diagnose production-run failures with low overhead are needed. The state-of-the-art diagnosis techniques ... Keywords: concurrency bugs, failure diagnosis, performance counters, production run

Joy Arulraj; Po-Chun Chang; Guoliang Jin; Shan Lu

2013-04-01T23:59:59.000Z

352

Generating analyses for detecting faults in path segments  

Science Conference Proceedings (OSTI)

Although static bug detectors are extensively applied, there is a cost in using them. One challenge is that static analysis often reports a large number of false positives but little diagnostic information. Also, individual bug detectors need to be built ... Keywords: demand-driven, generate analysis, path segment, specification

Wei Le; Mary Lou Soffa

2011-07-01T23:59:59.000Z

353

UNIVERSITY RESEARCH 64 November 2007 www.pctonline.com  

E-Print Network (OSTI)

infestations as of May 2007. Insecticide sprays, steam machineapplications examining the bed bug distribution,weplacedthebeddingmateri- als in plastic bags and asked the residentsSultS.Theaveragenumberofbedbugs found per apartment was 157 (range: 3 to 425) (see Table 1, page 68). Distribution of the bed bugs

Wang, Changlu

354

Software change contracts  

Science Conference Proceedings (OSTI)

Incorrect program changes including regression bugs, incorrect bug-fixes, incorrect feature updates are pervasive in software. These incorrect program changes affect software quality and are difficult to detect/correct. In this paper, we propose the ... Keywords: JML, change contract, regression testing, software evolution

Dawei Qi; Jooyong Yi; Abhik Roychoudhury

2012-11-01T23:59:59.000Z

355

North Carolina Cooperative Extension Service  

E-Print Network (OSTI)

by leaf dip and spray tower against Bemisia argentifolii (Homoptera: Aleyrodidae). Pestic. Sci. 44, 317e extract of Chenopodium ambrosioides), BugOil (a mixture of four plant essential oils), and SunSpray oil (a on the leaves treated with SunSpray Oil, BugOil or Requiem 3 d after treatment. The repellency rates

356

LiteRace: effective sampling for lightweight data-race detection  

Science Conference Proceedings (OSTI)

Data races are one of the most common and subtle causes of pernicious concurrency bugs. Static techniques for preventing data races are overly conservative and do not scale well to large programs. Past research has produced several dynamic data race ... Keywords: concurrency bugs, dynamic data race detection, sampling

Daniel Marino; Madanlal Musuvathi; Satish Narayanasamy

2009-06-01T23:59:59.000Z

357

Do not blame users for misconfigurations  

Science Conference Proceedings (OSTI)

Similar to software bugs, configuration errors are also one of the major causes of today's system failures. Many configuration issues manifest themselves in ways similar to software bugs such as crashes, hangs, silent failures. It leaves users clueless ... Keywords: constraint, inference, misconfiguration, testing, vulnerability

Tianyin Xu, Jiaqi Zhang, Peng Huang, Jing Zheng, Tianwei Sheng, Ding Yuan, Yuanyuan Zhou, Shankar Pasupathy

2013-11-01T23:59:59.000Z

358

Accentuating the positive: atomicity inference and enforcement using correct executions  

Science Conference Proceedings (OSTI)

Concurrency bugs are often due to inadequate synchronization that fail to prevent specific (undesirable) thread interleavings. Such errors, often referred to as Heisenbugs, are difficult to detect, prevent, and repair. In this paper, we present a new ... Keywords: atomicity, concurrency bugs, debugging, locking, profile

Dasarath Weeratunge; Xiangyu Zhang; Suresh Jaganathan

2011-10-01T23:59:59.000Z

359

NEWTON, Ask a Scientist at Argonne National Labs  

NLE Websites -- All DOE Office Websites (Extended Search)

Bacteria Resistance Bacteria Resistance Name: Brittany Status: student Grade: 6-8 Location: AZ Country: USA Date: Spring 2012 Question: Why have bacteria evolved resistance so rapidly? Replies: Suppose you have a bug spray and you use it to exterminate a cloud of mosquitoes. In the cloud of mosquitoes there may be one or two that are immune to the effects of the bug spray. So what you do is kill all the mosquitoes that don't have resistance to the bug spray Leaving behind the mosquitoes that do, and then those remaining mosquitoes regenerate. That is the sad story of how bugs develop resistance to our countermeasures. So far, we have always been able to find a bug spray formula to take care of the present cloud of mosquitoes. Sincere regards, Mike Stewart Brittany, To answer your question, a couple of things need to be considered.

360

Author manuscript, published in "13th International Conference on Quality Software (QSIC 2013), Nanjing: China (2013)" An Empirical Study of Adoption of Software Testing in Open Source Projects  

E-Print Network (OSTI)

Abstract—Testing is an indispensable part of software development efforts. It helps to improve the quality of software systems by finding bugs and errors during development and deployment. Huge amount of resources are spent on testing efforts. However, to what extent are they used in practice? In this study, we investigate the adoption of testing in open source projects. We study more than 20,000 non-trivial software projects and explore the correlation of test cases with various project development characteristics including: project size, development team size, number of bugs, number of bug reporters, and the programming languages of these projects. Keywords-Empirical study, Software testing, Adequacy, Test cases

Pavneet Singh Kochhar; Tegawendé F. Bissy; David Lo; Lingxiao Jiang

2013-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "rsa envision bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Proxy Documentation, Cyber Security, Information Technology Division, ITD  

NLE Websites -- All DOE Office Websites (Extended Search)

Proxy Configuration Proxy Configuration Here you will find instructions for using the FTP and Web proxies. Keep in mind that depending on where you access the proxies from (whether you are inside or outside of the BNL network), the process will differ slightly. For FTP, you will not be required to enter any passwords to use the proxies while on the BNL network. However, when accessing the proxies from an outside network (e.g. anything not .bnl.gov), you will be required to authenticate using a RSA SecurID Token. If you do not already have one of these, please visit the RSA SecurID User Guide for instructions on obtaining one. Users who are only interested in configuring their web browsers need NOT bother with RSA SecurID, as the web proxies will not be needed when you are outside the BNL network.

362

U-267: RSA® Authentication Agent 7.1 for Microsoft Windows® and RSA®  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: RSA® Authentication Agent 7.1 for Microsoft Windows® and 7: RSA® Authentication Agent 7.1 for Microsoft Windows® and RSA® Authentication Client 3.5 Access Control Vulnerability U-267: RSA® Authentication Agent 7.1 for Microsoft Windows® and RSA® Authentication Client 3.5 Access Control Vulnerability September 25, 2012 - 6:00am Addthis PROBLEM: RSA® Authentication Agent 7.1 for Microsoft Windows® and RSA® Authentication Client 3.5 Access Control Vulnerability PLATFORM: Product: RSA Authentication Agent for Microsoft Windows version 7.1 Platforms: Windows XP and Windows 2003 Product: RSA Authentication Client 3.5 Platforms: Windows XP and Windows 2003 ABSTRACT: RSA Authentication Agent Lets Remote Authenticated Users Bypass an Authentication Step reference LINKS: SecurityTracker Alert ID: 1027559 Bugtraq ID: 55662

363

The Fueling of Nuclear Activity: II. The Bar Properties of Seyfert and Normal Galaxies  

E-Print Network (OSTI)

We use a recent near-infrared imaging survey of samples of Seyfert and normal galaxies to study the role of bars in the fueling of nuclear activity. The active galaxy sample includes Seyfert galaxies in the Revised Shapely-Ames (RSA) and Sandage & Tammann's (1987) extension to this catalog. The normal galaxies were selected to match the Seyfert sample in Hubble type, redshift, inclination and blue luminosity. All the galaxies in both samples classified as barred in the RSA catalog are also barred in the near-infrared. In addition, ~55% of the galaxies classified as non-barred in the RSA show evidence for bars at 2.1 microns. Overall, ~70% of the galaxies observed show evidence for bar structures. The incidence of bars in the Seyfert and normal galaxies is similar, suggesting Seyfert nuclei do not occur preferentially in barred systems. Furthermore, a slightly higher percentage of normal galaxies have multiple-bar structures.

John S. Mulchaey; Michael W. Regan

1997-04-11T23:59:59.000Z

364

Infrastructural Optimism  

E-Print Network (OSTI)

means envisioning a new mobility network that incorporatesproposed plans for new public mobility infrastructure. Among2 For them, New Orleans’ damaged mobility infrastructure was

Samuels, Linda C.

2009-01-01T23:59:59.000Z

365

Piglet and the Pumpkin Field - Argonne's Nuclear Science and...  

NLE Websites -- All DOE Office Websites (Extended Search)

scientists describe the historic events which brought them to understand nuclear fission Anniversary - 80 years ago, Leo Szilard envisioned neutron chain reaction blog...

366

Automated Voltage Standard Ready  

Science Conference Proceedings (OSTI)

... “We wanted a standard that was ... as envisioned, then within our lifetimes there will no longer be a need for voltage transfer standards that have to be ...

2013-04-08T23:59:59.000Z

367

The Systems Realization Laboratory, Georgia Institute of Technology  

Science Conference Proceedings (OSTI)

design performance in terms of economic, environmental and social impact. ... and social impact assessments, we envision an integration of industrial models.

368

Install renewable energy systems | ENERGY STAR  

NLE Websites -- All DOE Office Websites (Extended Search)

Directory of Solar PPA Providers (listing does not imply endorsement): Envision Solar Green Energy Finder Photon Energy Services PVOne Recurrent Energy Sun Edison SunPower Corp...

369

Control Strategies for the Next Generation Microgrids.  

E-Print Network (OSTI)

??In the context of the envisioned electric power delivery system of the future, the smart grid, this dissertation focuses on control and management strategies for… (more)

Ali, Mehrizi-Sani

2012-01-01T23:59:59.000Z

370

NETL: Oil & Natural Gas Technologies Reference Shelf - Presentation...  

NLE Websites -- All DOE Office Websites (Extended Search)

and environmentally sound regulation of the exploration and production of natural gas and crude oil. The items envisioned for the IOGCC to undertake are national in scope....

371

Building Construction Technology Extension Program (BCTEP ...  

Science Conference Proceedings (OSTI)

... with the goal of having a single, national program curriculum available." Our question is: We envision creating an e-book, usable nationally by other ...

2012-04-03T23:59:59.000Z

372

New York Independent System Operator, Smart Grid RFI: Addressing...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Register, the New York Independent System Operator, Inc. (NYISO) offers the attached white paper entitled Envisioning a Smarter Grid for New York Consumers. New York...

373

Development of Alternative Engine Materials  

Science Conference Proceedings (OSTI)

ature strength(31,32), and reinforced rings are envisioned in various IHPTET engine tests. The development of r-based materials with a balance of properties.

374

Thermal Aging Effect on Fracture Toughness of Modified 9Cr-1Mo ...  

Science Conference Proceedings (OSTI)

Since the material is envisioned for long-term elevated temperature applications, thermal aging effects on the mechanical and microstructural properties of the ...

375

Compound Photovoltaics - Programmaster.org  

Science Conference Proceedings (OSTI)

Sep 15, 2009 ... The growing prospects of current and coming solar-photovoltaic (PV) technologies are envisioned, arguing this solar-electricity source is ...

376

2 0 1 0 Sandia National Laboratories ECONOMIC IMPACT  

cybersecurity, high-performance computing, and nonproliferation. As currently envisioned, the LVOC will consist of a 110-acre parcel along the eastern ...

377

OSTI, US Dept of Energy, Office of Scientific and Technical Informatio...  

Office of Scientific and Technical Information (OSTI)

- the ENIAC-was nearing completion. At a post-war Los Alamos National Laboratory (LANL), mathematician Stanislaw Ulam envisioned the possibilities of reviving statistical...

378

NETL: News Release - Solid Oxide Fuel Cells to Advance Zero-Emissions...  

NLE Websites -- All DOE Office Websites (Extended Search)

20 percent, focus on solving the remaining issues in developing solid oxide fuel cell (SOFC) systems for commercial use. "The President's Hydrogen and Climate Initiatives envision...

379

Understanding the product distribution from biomass fast pyrolysis.  

E-Print Network (OSTI)

??Fast pyrolysis of biomass is an attractive route to transform solid biomass into a liquid bio-oil, which has been envisioned as a renewable substitute for… (more)

Patwardhan, Pushkaraj Ramchandra

2010-01-01T23:59:59.000Z

380

Temporal vs. Stochastic Granularity in Thermal Generation Capacity ...  

E-Print Network (OSTI)

renewable energy resources make wind, solar, bio-mass, and hydro increasingly appealing. The US Department of Energy envisions that 20% of the nation's ...

Note: This page contains sample records for the topic "rsa envision bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

REMOTE ACCESS SERVICES | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

REMOTE ACCESS SERVICES REMOTE ACCESS SERVICES REMOTE ACCESS SERVICES Access the information you need... Anywhere. Anytime. Different service providers within the Department offer remote access services based on your specific work requirements. If you need assistance, please contact your individual service provider. Energy IT Services (EITS) Remote Access Services Outlook Web Access RSA Token Login RSA Token Instructions HSPD-12 Login HSPD-12 Badge Instructions Virtual Private Network Instructions Citrix Workplace Instructions Energy Information Administration (EIA) Remote Access Services Outlook Web Access EIA VPN Office of Intelligence and Counterintelligence (IN) Remote Access Services Outlook Web Access Office of Science (SC) Remote Access Services Citrix Workplace Help for EITS Customers

382

Final Progress Report  

SciTech Connect

The objective of this project was to complete the specifications and drawings for a variable speed kitchen exhaust system and the boiler heating system which when implemented will improve the heating efficiency of the building. The design work was focused in two key areas: kitchen ventilation and heating for the Ernie Turner Center building (ETC). RSA completed design work and issued a set of 100% drawings. RSA also worked with a cost estimator to put together a detailed cost estimate for the project. The design components are summarized.

Amy Fredeen

2011-03-21T23:59:59.000Z

383

TAO: Contact Us  

NLE Websites -- All DOE Office Websites (Extended Search)

The TAO e-mail address tao-comments@mcs.anl.gov is provided for users to communicate with the TAO developers on topics such as reporting bugs, asking for clarification, asking for help in tracking down bugs, and requesting new features within TAO. We try to respond to this email promptly. Please do not send maintenance requests to the individual TAO authors; all e-mail to tao-comments@mcs.anl.gov is automatically distributed to all of the TAO authors, so our response time using this address will be faster. Guidelines for Bug Reports: The more information that you convey about a bug, the easier it will be for us to target the problem. We suggest providing the following information: If the problem involves installation, then send the entire log file from running make.

384

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

61 - 28570 of 31,917 results. 61 - 28570 of 31,917 results. Article U-141: Sourcefire Defense Center Bugs Several vulnerabilities were reported in Sourcefire Defense Center. A remote user can conduct cross-site scripting attacks. A remote user can access the database. A remote user can view files on the target system. http://energy.gov/cio/articles/u-141-sourcefire-defense-center-bugs Article U-075: Apache Struts Bug Lets Remote Users Overwrite Files and Execute Arbitrary Code A remote user can execute arbitrary Java code on the target system. http://energy.gov/cio/articles/u-075-apache-struts-bug-lets-remote-users-overwrite-files-and-execute-arbitrary-code Article U-044: HP Operations Agent and Performance Agent Lets Local Users Access a Restricted Directory A local user can access a directory on the target system.

385

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

28, 2011 28, 2011 U-046: Apache mod_proxy/mod_rewrite Bug Lets Remote Users Access Internal Servers Apache mod_proxy/mod_rewrite Bug Lets Remote Users Access Internal Servers. November 25, 2011 U-045: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny Service Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny November 23, 2011 U-044: HP Operations Agent and Performance Agent Lets Local Users Access a Restricted Directory A local user can access a directory on the target system. November 22, 2011 U-043: Attachmate Reflection Buffer Overflow in FTP Client Lets Remote Servers Execute Arbitrary Code A remote server can execute arbitrary code on the connected target system. November 21, 2011 U-042: Mac RealPlayer Multiple Vulnerabilities Multiple vulnerabilities have been reported in Mac RealPlayer, which can be

386

Developer | OpenEI Community  

Open Energy Info (EERE)

bug bug Type Term Title Author Replies Last Post sort icon Discussion bug Image upload with broken thumbnail image Rmckeel 1 13 Aug 2012 - 08:22 Discussion bug "Ghost" entries Rmckeel 1 19 Jun 2012 - 08:05 Groups Menu You must login in order to post into this group. Recent content Thank you Jon, I know about th... Hi Yury-Thank you for your i... source code for OpenEI extensions Timo,My apologies for the ... Browse by region (RaphaelSVGMap) more Group members (19) Managers: Rmckeel Recent members: Yury Katkov Sangduen Timo.Kouwenhoven Jwkropf KingJahfy Graham7781 Ianjkalin Autumn1 Mvdv Sprzesmi Satish Cdonnelly Wzeng Twong Jayhuggins Jorn.aabakken Jweers NickL 429 Throttled (bot load) Error 429 Throttled (bot load) Throttled (bot load) Guru Meditation: XID: 2142253338

387

Operation Epsilon: Science, History, and Theatrical Narrative  

E-Print Network (OSTI)

In 1945, shortly after VE day, the Anglo-American forces rounded up ten renowned nuclear scientists and interned them at Farm Hall, an estate near Cambridge, England. All the rooms on the estate had been bugged. The ...

Brody, Alan

388

Open Issues  

NLE Websites -- All DOE Office Websites (Extended Search)

FIXED] JGI data loss in /projectb/sandbox area [purge] FIXED] JGI data loss in /projectb/sandbox area [purge] August 19, 2013 by Kjiersten Fagnan | 0 Comments We have discovered a serious bug in our purge scripts on /global/projectb. The */global/projectb/sandbox* areas are supposed to be immune from the purge (like the project directories); however, there is a bug in the purge script that caused some files to be deleted if they had not been touched for 90+ days (like data in the scratch directories). *The sandbox areas are not backed up*, so if this data was not in more than one location on disk or in HPSS, it has been lost. We have found the bug and have suspended the purge script until the bug is fixed. 0 comments | Read the full post [FIXED] perl 5.16.0 File::Glob() causes crashes August 15, 2013 by Doug Jacobsen | 1 Comments

389

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

bugs, and others likely to follow shortly. April 25, 2013 V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code A vulnerability was reported in Oracle...

390

Ladder Metamodeling and PLC Program Validation through Time Petri Nets  

Science Conference Proceedings (OSTI)

Ladder Diagram (LD) is the most used programming language for Programmable Logical Controllers (PLCs). A PLC is a special purpose industrial computer used to automate industrial processes. Bugs in LD programs are very costly and sometimes are even a ...

Darlam Fabio Bender; Benoît Combemale; Xavier Crégut; Jean Marie Farines; Bernard Berthomieu; François Vernadat

2008-06-01T23:59:59.000Z

391

October 12, 2010  

NLE Websites -- All DOE Office Websites (Extended Search)

kernel bug. Were down for a day recently due to a security problem and there was also a power outage at OSF. Upcoming downtimes: Nothing in October. New hardware: End of fiscal...

392

Staged symbolic execution  

Science Conference Proceedings (OSTI)

Recent advances in constraint solving technology and raw computation power have led to a substantial increase in the effectiveness of techniques based on symbolic execution for systematic bug finding. However, scaling symbolic execution remains a challenging ...

Junaid Haroon Siddiqui; Sarfraz Khurshid

2012-03-01T23:59:59.000Z

393

Tk Japanization Patch  

Science Conference Proceedings (OSTI)

... to fix the bug in the original Tcl/Tk. ... ѬÑ?Ñ?Ñ?Ñ?ñ? Tcl/Tk ñ?ѽÑ?Ñ? Ñ?Ñ?Ñ?Ñó????Ñ?í?Ñ»Ñ?Ññ??ñ? John Ousterhout. ...

394

Brede tools and federating online neuroinformatics databases Finn Arup Nielsen  

E-Print Network (OSTI)

Information Framework (NIF) that uses the Neuro- science Information Framework standardized (NIF- STD) ontology (Bug et al, 2008). With this ontology NIF performs term expansion from a user query. The expanded

395

Lens-array PDV Probe Using a Pyramid Prism  

SciTech Connect

A bug eye probe is shown using a pyramid prism, and its advantages and disadvantages are enumerated. Also shown is abug eye imaging probe, with its advantages and disadvantages enumerated.

Malone, R. M., Kaufman, M. I., Cox, B., Romero, V., Cata B., Sorenson, D. Pazuchanics, P.

2011-11-01T23:59:59.000Z

396

Provably good race detection that runs in parallel  

E-Print Network (OSTI)

A multithreaded parallel program that is intended to be deterministic may exhibit nondeterminism clue to bugs called determinacy races. A key capability of race detectors is to determine whether one thread executes logically ...

Fineman, Jeremy T

2005-01-01T23:59:59.000Z

397

U-221: ISC BIND 9 DNSSEC Validation CVE-2012-3817 Denial of Service...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Off-by-one Bug Lets Remote Users Deny Service U-260: ISC BIND RDATA Processing Flaw Lets Remote Users Deny Service U-183: ISC BIND DNS Resource Records Handling Vulnerability...

398

V-079: ISC BIND AAAA Record Lookup Handling Assertion Failure...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Lets Remote Users Deny Service T-633: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets Remote Users Deny Service U-183: ISC BIND DNS Resource Records Handling Vulnerability...

399

U-220: Google Android DNS Resolver Randomization Flaw Lets Remote...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Off-by-one Bug Lets Remote Users Deny Service U-271: Google Android Dialer TEL URL Handling Flaw Lets Remote Users Deny Service V-065: Adobe Flash Player Buffer Overflow...

400

Fermilab Today  

NLE Websites -- All DOE Office Websites (Extended Search)

for bugs and butterflies, doing what many youngsters do - catch them and put them in a jar with holes punctured in the top. By the time he was 10 he had an entire collection....

Note: This page contains sample records for the topic "rsa envision bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Michigan | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

- CEAM Phase 3 - Working Bug LLC CX(s) Applied: B5.1 Date: 02082011 Location(s): Michigan Office(s): Energy Efficiency and Renewable Energy, Golden Field Office February 1,...

402

All | OpenEI Community  

Open Energy Info (EERE)

API (2) APIs (2) appropriations (1) Apps (2) ask queries (1) author (1) auto (1) BHFS (3) Big Data (3) bug (2) building load (1) building load data (1) campus (1) Categorical...

403

U-230: Sudo on Red Hat Enterprise Linux %postun Symlink Flaw...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Users Gain Elevated Privileges T-671: Red Hat system-config-firewall Lets Local Users Gain Root Privileges U-092: Sudo Format String Bug Lets Local Users Gain Elevated Privileges...

404

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Execute Arbitrary Code A vulnerability was reported in HP SiteScope. http:energy.govcioarticlesu-265-hp-sitescope-bugs-sitescope-soap-feature-let-remote-users-obtain-inform...

405

Measuring architecture quality by structure plus history analysis  

Science Conference Proceedings (OSTI)

This case study combines known software structure and revision history analysis techniques, in known and new ways, to predict bug-related change frequency, and uncover architecture-related risks in an agile industrial software development project. We ...

Robert Schwanke, Lu Xiao, Yuanfang Cai

2013-05-01T23:59:59.000Z

406

EXPGUI Revision Log  

Science Conference Proceedings (OSTI)

... 03/24 fix bug in save options Add unix capability to print selected text (should work on OS X if lpr points to desired printer -- I think) orient.tcl 1.9 2005 ...

407

TransDPOR: a novel dynamic partial-order reduction technique for testing actor programs  

Science Conference Proceedings (OSTI)

To detect hard-to-find concurrency bugs, testing tools try to systematically explore all possible interleavings of the transitions in a concurrent program. Unfortunately, because of the nondeterminism in concurrent programs, exhaustively exploring all ...

Samira Tasharofi; Rajesh K. Karmani; Steven Lauterburg; Axel Legay; Darko Marinov; Gul Agha

2012-06-01T23:59:59.000Z

408

The Entire Veterinary Science Archive  

NLE Websites -- All DOE Office Websites (Extended Search)

Dying Cat Behavior Cat and Dog Age Rabies Transmission Dogs and Health Field Mice and Lyme Disease Feline Leukemia Shed less Dogs Dogs and Rubber Trees June Bug Meals Cedar and...

409

V-002: EMC NetWorker Module for Microsoft Applications Lets Remote...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Network LDAP Authentication Bug Lets Remote Users Bypass Authentication V-104: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code T-699: EMC AutoStart Buffer Overflows Let...

410

LBNL Windows & Daylighting Software -- WINDOW Documentation  

NLE Websites -- All DOE Office Websites (Extended Search)

1 (7.1.73 -- August 30, 2013) Release Notes Updated: 083013 If you find bugs, or have comments about this version, please do not hesitate to send an email to WINDOWHelp@lbl.gov...

411

OSTI, US Dept of Energy, Office of Scientific and Technical Informatio...  

Office of Scientific and Technical Information (OSTI)

blackout Topic Keeping the lights on by Kathy Chambers 18 Jul, 2013 in Products and Content New York City skyline at nightfall, August 14 On August 14, 2003, a software bug at a...

412

OSTI, US Dept of Energy, Office of Scientific and Technical Informatio...  

Office of Scientific and Technical Information (OSTI)

lights Topic Keeping the lights on by Kathy Chambers 18 Jul, 2013 in Products and Content New York City skyline at nightfall, August 14 On August 14, 2003, a software bug at a...

413

Natural Reds  

NLE Websites -- All DOE Office Websites (Extended Search)

Europeans discovered the only chemical, tin oxide, that would deposit the pigment on wool or other fiber so that it would not wash off. Eventually the bugs were imported and...

414

V-231: Cisco Identity Services Engine Discloses Authentication...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update T-703: Cisco Unified Communications Manager Open Query Interface Lets Remote Users Obtain Database Contents...

415

CryptDB: Protecting confidentiality with encrypted query processing  

E-Print Network (OSTI)

Online applications are vulnerable to theft of sensitive information because adversaries can exploit software bugs to gain access to private data, and because curious or malicious administrators may capture and leak data. ...

Popa, Raluca Ada

416

Sayings of Southern Indiana and Illinois  

NLE Websites -- All DOE Office Websites (Extended Search)

Full as a tick. I put a bug in his ear (started him to thinking). Like a blind dog in a meat-house"; "dark as the inside of a cow, "proud as a dog with two tails";...

417

Failure recovery: when the cure is worse than the disease  

Science Conference Proceedings (OSTI)

Cloud services inevitably fail: machines lose power, networks become disconnected, pesky software bugs cause sporadic crashes, and so on. Unfortunately, failure recovery itself is often faulty; e.g. recovery can accidentally recursively replicate small ...

Zhenyu Guo, Sean McDirmid, Mao Yang, Li Zhuang, Pu Zhang, Yingwei Luo, Tom Bergan, Peter Bodik, Madan Musuvathi, Zheng Zhang, Lidong Zhou

2013-05-01T23:59:59.000Z

418

LBNL Windows & Daylighting Software -- COMFEN3: Knowledge Base  

NLE Websites -- All DOE Office Websites (Extended Search)

(IGDB) NFRC Procedure for Creating Laminates Information about IGDB Some of the windows in Optics are bigger than my screen. How can I solve this? Report a bug or ask a...

419

LBNL Windows & Daylighting Software -- WINDOW  

NLE Websites -- All DOE Office Websites (Extended Search)

downloading and installing Optics 6, as it has a few bug fixes and works with Windows 7 and 8. NFRC (National Fenestration Rating Council) will "sunset" use of Optics 5.1...

420

Insect Repellent For Older 4-H'ers  

E-Print Network (OSTI)

seen with West Nile Virus and Lyme disease). Forms and Concentrations: Aerosol and pump-spray products Now sold as 3M Ultrathon Avon Skin-So-Soft Bug Guard Pump spray, .1% citronella 0.67 n/a Not labeled oil 0.46 2­4 hours Not labeled for ticks Renamed Blocker BugOut Aerosol, 15% deet 0.11 3­7 hours 1

Note: This page contains sample records for the topic "rsa envision bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Missing data outside the detector range: application to continuous variable entanglement verification and quantum cryptography  

E-Print Network (OSTI)

In continuous-variable quantum information processing detectors are necessarily coarse grained and of finite range. We discuss how especially the latter feature is a bug and may easily lead to overoptimistic estimates of entanglement and of security, when missed data outside the detector range are ignored. We show that entropic separability or security criteria are much superior to variance-based criteria for mitigating the negative effects of this bug.

Megan R. Ray; S. J. van Enk

2013-02-20T23:59:59.000Z

422

Characterization of Oxide Layers Formed During Corrosion in Supercritical Water  

E-Print Network (OSTI)

.edu ABSTRACT The Supercritical Water Reactor is one of the Generation IV nuclear power plant designs envisioned of the Generation IV nuclear power plant designs envisioned for its high thermal efficiency and plant simplification for the study of oxide growth in steels and in zirconium alloys during exposure to supercritical water. A very

Motta, Arthur T.

423

Performance analysis of TLS Web servers  

Science Conference Proceedings (OSTI)

TLS is the protocol of choice for securing today's e-commerce and online transactions but adding TLS to a Web server imposes a significant overhead relative to an insecure Web server on the same platform. We perform a comprehensive study of the performance ... Keywords: Internet, RSA accelerator, TLS, e-commerce, secure Web servers

Cristian Coarfa; Peter Druschel; Dan S. Wallach

2006-02-01T23:59:59.000Z

424

Yet Another Fault Injection Technique : by Forward Body Biasing Injection  

E-Print Network (OSTI)

expensive fault injection tech- niques, like clock or voltage glitches, are well taken into accountYet Another Fault Injection Technique : by Forward Body Biasing Injection K. TOBICH1,2, P. MAURINE1 Injection, Electromag- netic Attacks, RSA, Chinese Remainder Theorem 1 Introduction Fault injection

425

Energy Harvesting by Sweeping Voltage-Escalated Charging of a Reconfigurable Supercapacitor Array  

E-Print Network (OSTI)

Energy Harvesting by Sweeping Voltage-Escalated Charging of a Reconfigurable Supercapacitor Array charge pump to perform maximum power-transfer track- ing (MPTT) while charging a reservoir supercapacitor. The supercapacitors in the RSA can be dynamically configured for series or parallel topologies by means of a switch

Shinozuka, Masanobu

426

Email for you (only?): design and implementation of a context-based learning process on internetworking and cryptography  

Science Conference Proceedings (OSTI)

The didactical approach of teaching computer science in context aims at enabling learners to understand concepts of computer science better through the help of concrete illustration and meaning. This paper describes a learning arrangement in which students ... Keywords: IniK, RSA, communication protocol, communication security, computer science in context, context-based computer science education, cryptology, email protocol

Andreas Gramm; Malte Hornung; Helmut Witten

2012-11-01T23:59:59.000Z

427

Untraceable blind signature schemes based on discrete logarithm problem  

Science Conference Proceedings (OSTI)

With the help of a blind signature scheme, a requester can obtain a signature on a message from a signer such that the signer knows nothing about the content of the messages and is unable to link the resulting message-signature pair; namely, a blind ... Keywords: DSA, RSA, blind signature, cryptography

Cheng-Chi Lee; Wei-Pang Yang; Min-Shiang Hwang

2002-09-01T23:59:59.000Z

428

A Polysilicon Active Matrix Organic Light Emitting Diode Display with Integrated Drivers R.M.A. Dawson, Z. Shen, D.A. Furst, S. Connor, J. Hsu, M.G. Kane, R.G. Stewart, A. Ipri  

E-Print Network (OSTI)

A Polysilicon Active Matrix Organic Light Emitting Diode Display with Integrated Drivers R.S.A. Abstract The design of an active matrix organic light emitting diode (AMOLED) display using a polysilicon. Introduction Organic light emitting diodes (OLEDs) are presently of great interest due to their potential

429

Modeling and implementing an agent-based system for prediction of protein relative solvent accessibility  

Science Conference Proceedings (OSTI)

In this paper, an agent-based system for prediction of relative solvent accessibility (RSA) of proteins is proposed. Since, it is believed that the 3D-structure of most proteins is defined by their sequences, utilizing data mining methods to extract ... Keywords: Data mining, Feature selection methods, Intelligent agents, Physicochemical properties of amino acids

Alireza Meshkin; Nasser Ghasem Aghaee; Mehdi Sadeghi

2011-05-01T23:59:59.000Z

430

Overview of physical oceanographic measurements taken during the Mt. Mitchell Cruise to the ROPME Sea Area  

Science Conference Proceedings (OSTI)

The ROPME Sea Area (RSA) is one of the most important commercial waterways in the world. However, the number of direct oceanographic observations is small. An international program to study the effect of the Iraqi oil spill on the environment was sponsored by the ROPME, the Intergovernmental Oceanographic Commission, and the National Oceanic and Atmospheric Administration (NOAA).

Reynolds, R.M.

1993-03-31T23:59:59.000Z

431

Agency datasets monthly list | Data.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Vocational Rehabilitation Programs - Core Data View tables and charts with key data and download tables on basic Vocational Rehabilitation (VR) programs for each state agency. Ah Hoc Query allows you to run customized queries on the fly against RSA data. You may run a previously saved query, or you can create a new query from scratch by choosing from the RSA forms listed at http://rsa.ed.gov/choose.cfm?menu=mb_ahq ED OSERS Labor Force, Employment, and Earnings 2013-03-04 08:42:04 Vocational Rehabilitation Programs - Core Data View tables and charts with key data and download tables on basic Vocational Rehabilitation (VR) programs for each state agency. Ah Hoc Query allows you to run customized queries on the fly against RSA data. You may run a previously saved query, or you can create a new query from scratch by choosing from the RSA forms listed at http://rsa.ed.gov/choose.cfm?menu=mb_ahq ED OSERS Labor Force, Employment, and Earnings 2013-03-04 08:42:04 Teacher Shortage Areas (TSA) Nationwide Listing for 1990-1991 through 2013-2014 Annual publication of the Teacher Shortage Area Nationwide Listing designated by the Department of Education as required under the following program regulations: 34 CFR 682.210(q) enables a borrower who had no outstanding Federal Family Education Loan (FFEL) Program loan on July 1, 1987 but who had an outstanding FFEL Program loan on July 1, 1993 to qualify for deferment of loan repayment under the Federal Stafford Program anytime within the life of the borrower's loan(s); 34 CFR 674.53(c) enables Federal Perkins Loan borrowers who are full time teachers of mathematics, science, foreign languages, bilingual education or any other field of expertise where the State educational agency determined there is a shortage of qualified teachers to qualify for cancellation of up to 100 percent of their loan; and 34 CFR 686.12(d) enables grant recipients to fulfill their teaching obligation under the Teacher Education Assistance for College and Higher Education (TEACH) Grant Program. ED OPE Education 2013-06-03 12:06:02

432

HPC_Tools-Gerber.pptx  

NLE Websites -- All DOE Office Websites (Extended Search)

6, 2012 6, 2012 * Introduction * Debugging * Performance / Optimization Outline Videos, presentations, and references: http://www.nersc.gov/users/training/courses/CS267/ Also see the DOE Advanced Computational Tools: http://acts.nersc.gov 3 * Today's Talks - Strategies for parallel performance (D. Skinner) - Debugging and optimization tools (R. Gerber) * Take Aways - Common problems to look out for - How tools work in general - A few specific tools you can try - Where to get more information Introduction Debugging 4 * A bug is when your code - crashes - hangs (doesn't finish) - gets inconsistent answers - produces wrong answers - behaves in any way you didn't want it to What is a Bug? * The term "bug" was popularized by Grace Hopper (motivated by the

433

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

71 - 1280 of 29,416 results. 71 - 1280 of 29,416 results. Article V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code PROBLEM: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code http://energy.gov/cio/articles/v-012-mozilla-firefox-windowlocation-bugs-permit-cross-site-scripting-attacks-and-may Article Agencies Decide to Dig Up Contaminated Soil at Hanford Site- Federal and state agencies determine cleanup plans for four areas near central Hanford RICHLAND, Wash. -The Department of Energy (DOE) and the U.S. Environmental Protection Agency (EPA), in coordination with the Washington Department of Ecology, have made plans for remediating contaminated soil at

434

U-223: Bugzilla May Disclose Confidential Information to Remote Users |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Bugzilla May Disclose Confidential Information to Remote 3: Bugzilla May Disclose Confidential Information to Remote Users U-223: Bugzilla May Disclose Confidential Information to Remote Users July 30, 2012 - 7:00am Addthis PROBLEM: Bugzilla May Disclose Confidential Information to Remote Users PLATFORM: Version(s): 2.17.5 to 3.6.9, 3.7.1 to 4.0.6, 4.1.1 to 4.2.1, 4.3.1 ABSTRACT: Two vulnerabilities were reported in Bugzilla. reference LINKS: The Vendor's Advisory Security Advisories CVE-2012-1969 CVE-2012-1968 SecurityTracker Alert ID: 1027320 Bug 777586 IMPACT ASSESSMENT: High Discussion: Bugzilla is a Web-based bug-tracking system used by a large number of software projects. The following security issues have been discovered in Bugzilla: In HTML bugmails, an improper validation of the permissions of the addressee can lead to confidential information about bugs and attachments

435

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

81 - 19790 of 28,905 results. 81 - 19790 of 28,905 results. Article U-045: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny Service Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny http://energy.gov/cio/articles/u-045-windows-win32ksys-keyboard-layout-bug-lets-local-users-deny-service Article T-650: Microsoft Word Unspecified Flaw Lets Remote Users Execute Arbitrary Code Microsoft Word Unspecified Flaw Lets Remote Users Execute Arbitrary Code. http://energy.gov/cio/articles/t-650-microsoft-word-unspecified-flaw-lets-remote-users-execute-arbitrary-code Article T-639: Debian update for libxml2 Libxml2 XPath Nodeset Processing Vulnerability http://energy.gov/cio/articles/t-639-debian-update-libxml2 Article T-613: Microsoft Excel Axis Properties Remote Code Execution

436

Open Issues  

NLE Websites -- All DOE Office Websites (Extended Search)

Open Issues Open Issues Open Issues [PATCHED] python/2.7.4 gzip package fails September 24, 2013 by Doug Jacobsen | 0 Comments The modules version of python (python/2.7.4) had a bug in the default gzip python package. This was due to problems introduced in python 2.7.4 and fixed in python 2.7.5. Receiving a TypeError or structError upon opening and reading a gzip'ped file were the phenotypes of this bug. This has been corrected by installing the python 2.7.5 version of gzip.py into our python distribution. 0 comments | Read the full post [FIXED] JGI data loss in /projectb/sandbox area [purge] August 19, 2013 by Kjiersten Fagnan | 0 Comments We have discovered a serious bug in our purge scripts on /global/projectb. The */global/projectb/sandbox* areas are supposed to be immune from the

437

LBNL Windows & Daylighting Software -- WINDOW5: Knowledge Base  

NLE Websites -- All DOE Office Websites (Extended Search)

6.3 Knowledge Base 6.3 Knowledge Base Tip - use the Find function in your browser to search this page Last update:11/04/13 01:16 PM Download WINDOW 6.3 Send feedback via email to WindowHelp@lbl.gov. Also as bugs and comments are submitted by testers, the will be posted on this Knowledge Base, so check here for the latest information about the program. CONTENTS INSTALLATION KNOWN BUGS ** Operating Systems -- Microsoft Windows 7 and Vista ** Environmental Conditions -- Kimura convection model not working Locked Files with Install/De-install Environmental Conditions -- Fixed Combined Coefficient Bug Installation Problems Error Message during Calc due to decimal point of "," Minimum computer requirements Importing THERM file into WINDOW generates "Unnamed file has a bad format" error message

438

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3, 2011 3, 2011 U-026: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject Commands A remote user can create a URL that, when loaded by the target authenticated administrative user, will execute arbitrary commands on the target system. November 2, 2011 U-025: HP OpenView Network Node Manager Bugs Let Remote Users Execute Arbitrary Code A remote user can execute arbitrary code on the target system. November 1, 2011 U-024: IBM Lotus Sametime Configuration Servlet Lets Remote Users Obtain Configuration Data A remote user can obtain configuration information. October 31, 2011 U-023: Debian update for phpldapadmin All versions of phpldapadmin - all released versions as of today are vulnerable to a remote code execution bug. October 28, 2011 U-022: Apple QuickTime Multiple Vulnerabilities

439

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

November 28, 2012 November 28, 2012 V-035: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code Several vulnerabilities were reported in Google Chrome. November 22, 2012 V-031: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated Users Gain Elevated Privileges and Remote Users Deny Service Several vulnerabilities were reported in IBM WebSphere DataPower. November 21, 2012 V-030: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service Adobe ColdFusion Denial of Service Vulnerability November 21, 2012 V-029: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks Multiple vulnerabilities were reported in Mozilla Firefox November 14, 2012 V-024: Ubuntu update for libav Ubuntu Security Notice

440

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

21 - 20030 of 28,905 results. 21 - 20030 of 28,905 results. Article T-700:Red Hat: kernel security, bug fix, and enhancement update Red Hat: kernel security, bug fix, and enhancement update. http://energy.gov/cio/articles/t-700red-hat-kernel-security-bug-fix-and-enhancement-update Download TBU-0045- In the Matter of William Cor William Cor (the complainant or the employee), appeals the dismissal of his complaint of retaliation filed under 10 C.F.R. Part 708, the Department of Energy (DOE) Contractor Employee Protection... http://energy.gov/oha/downloads/tbu-0045-matter-william-cor Download FIA-13-0009- In the Matter of Sierra Club On March 18, 2013, the Department of Energy's (DOE) Office of Hearings and Appeals (OHA) denied a Freedom of Information Act (FOIA) Appeal filed by the Sierra Club (Appellant) of a determination...

Note: This page contains sample records for the topic "rsa envision bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

CX-005162: Categorical Exclusion Determination | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Categorical Exclusion Determination 2: Categorical Exclusion Determination CX-005162: Categorical Exclusion Determination Green Chemistry - CEAM Phase 3 - Working Bug LLC CX(s) Applied: B5.1 Date: 02/08/2011 Location(s): Michigan Office(s): Energy Efficiency and Renewable Energy, Golden Field Office Working Bugs, LLC is proposing to use $248,000 in State Energy Program American Recovery and Reinvestment Act funding to design, procure, and install three, 4,000 gallon fermenters, as well as energy optimization equipment for their n-butanol production process. Initially, three, 4,000 gallon fermenters would contribute a minimum of 300 gallons per week to the n-butanol production. This award will enable Working Bugs to purchase and install key equipment to fill in manufacturing gaps and meet a portion of

442

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

11 - 9520 of 28,905 results. 11 - 9520 of 28,905 results. Article V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code PROBLEM: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code http://energy.gov/cio/articles/v-012-mozilla-firefox-windowlocation-bugs-permit-cross-site-scripting-attacks-and-may Download Letter: Transition of Closure Sites from the Office of Environmental Management to other DOE Organizations From: Deputy Secretary of Energy, Kyle E. McSlarrow (DS-1) To: Todd Martin, Chair, Hanford Advisory Board http://energy.gov/em/downloads/letter-transition-closure-sites-office-environmental-management-other Rebate Georgia Hazardous Site Response Act (Georgia)

443

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6, 2012 6, 2012 U-076: OpenSSL Bugs Let Remote Users Deny Service, Obtain Information, and Potentially Execute Arbitrary Code A remote user may be able to execute arbitrary code on the target system. January 5, 2012 U-075: Apache Struts Bug Lets Remote Users Overwrite Files and Execute Arbitrary Code A remote user can execute arbitrary Java code on the target system. January 4, 2012 U-074: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users A remote user can execute arbitrary commands on the target system. A remote user can access a target user's account. A remote user can redirect users to arbitrary sites. January 3, 2012 U-073: Bugzilla Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks Several vulnerabilities were reported in Bugzilla. A remote user can

444

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

91 - 18800 of 28,905 results. 91 - 18800 of 28,905 results. Article T-712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update. http://energy.gov/cio/articles/t-712-red-hat-enterprise-mrg-grid-20-security-bug-fix-and-enhancement-update-0 Download FIA-12-0023- In the Matter of Thomas R. Thielen The Department of Energy's (DOE) Office of Hearings and Appeals (OHA) Director granted in part and denied in all other respects a Privacy Act Appeal filed by Thomas R. Thielen. Mr. Thielen filed a request with the DOE's Richland Operations Office for documents regarding a safety concern he raised to CH2M Hill Plateau Remediation Company (CHPRC). http://energy.gov/oha/downloads/fia-12-0023-matter-thomas-r-thielen

445

U-223: Bugzilla May Disclose Confidential Information to Remote Users |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Bugzilla May Disclose Confidential Information to Remote 3: Bugzilla May Disclose Confidential Information to Remote Users U-223: Bugzilla May Disclose Confidential Information to Remote Users July 30, 2012 - 7:00am Addthis PROBLEM: Bugzilla May Disclose Confidential Information to Remote Users PLATFORM: Version(s): 2.17.5 to 3.6.9, 3.7.1 to 4.0.6, 4.1.1 to 4.2.1, 4.3.1 ABSTRACT: Two vulnerabilities were reported in Bugzilla. reference LINKS: The Vendor's Advisory Security Advisories CVE-2012-1969 CVE-2012-1968 SecurityTracker Alert ID: 1027320 Bug 777586 IMPACT ASSESSMENT: High Discussion: Bugzilla is a Web-based bug-tracking system used by a large number of software projects. The following security issues have been discovered in Bugzilla: In HTML bugmails, an improper validation of the permissions of the addressee can lead to confidential information about bugs and attachments

446

Entrepreneurial experiments in science policy: Analyzing the Human Genome Project  

E-Print Network (OSTI)

We re-conceptualize the role of science policy makers, envisioning and illustrating their move from being simple investors in scientific projects to entrepreneurs who create the conditions for entrepreneurial experiments ...

Huang, Kenneth G.

447

A spectroscopic system for near infrared glucose measurement  

E-Print Network (OSTI)

Noninvasive blood glucose monitoring has been long envisioned to serve as an invaluable tool in the treatment of diabetes. The current invasive method makes it difficult for diabetic patients to perform frequent blood ...

Saptari, Vidi Alfandi, 1975-

2004-01-01T23:59:59.000Z

448

Wearable Sensors and Systems  

E-Print Network (OSTI)

It is now more than 50 years since the time when clinical monitoring of individuals in the home and community settings was first envisioned. Until recently, technologies to enable such vision were lacking. However, wearable ...

Bonato, Paolo

449

The case for psychological computing  

Science Conference Proceedings (OSTI)

This paper envisions a new research direction that we call psychological computing. The key observation is that, even though computing systems are missioned to satisfy human needs, there has been little attempt to bring understandings of human need/psychology ...

Xuan Bao; Mahanth Gowda; Ratul Mahajan; Romit Roy Choudhury

2013-02-01T23:59:59.000Z

450

Thermal Conductivity Database of Various Structural Carbon-Carbon  

Science Conference Proceedings (OSTI)

Advanced thermal protection materials envisioned for use on future hypersonic vehicles will likely be subjected to temperatures in excess of 1811 K (2800F) and, therefore, will require the rapid conduction of heat away from the stagnation regions of ...

Ohlhorst Craig W.; Vaughn Wallace L.; Ransone Philip O.; Tsou Hwa-Tsu

1997-11-01T23:59:59.000Z

451

Energy Department Announces New SunShot Investment in Solar Energy...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Related Articles Energy Department Announces Funding to Develop "Plug-and-Play" Solar Energy Systems for Homeowners A plug-and-play PV system is envisioned as a consumer...

452

Linking electromagnetic and gravitational radiation in coalescing binary neutron stars Carlos Palenzuela1  

E-Print Network (OSTI)

a fundamental role in the production of gamma ray bursts. These compact binary systems are also among the most model of short, hard gamma ray bursts (SGRBs) (see e.g. [2] for a review). This model envisions

Lumsdaine, Andrew

453

Electric power: a government priority  

Science Conference Proceedings (OSTI)

Keenly aware of the serious obstruction to future development, the Government of India has made generating capacity and transmission system additions a priority in its five year economic plans. The current plan, for the period 1992-97, originally envisioned ...

M. Ramamoorty

1994-03-01T23:59:59.000Z

454

A review of wireless and PLC propagation channel characteristics for smart grid environments  

Science Conference Proceedings (OSTI)

Wireless, power line communication (PLC), fiber optic, Ethernet, and so forth are among the communication technologies on which smart grid communication infrastructure is envisioned to be built. Among these, wireless and PLC-based solutions are attractive ...

Sabih Güzelgöz; Hüseyin Arslan; Arif Islam; Alexander Domijan

2011-01-01T23:59:59.000Z

455

The design of a microfabricated air electrode for liquid electrolyte fuel cells  

E-Print Network (OSTI)

In this dissertation, the microfabricated electrode (MFE) concept was applied to the design of an air electrode for liquid electrolyte fuel cells. The catalyst layer of the electrode is envisioned to be fabricated by using ...

Pierre, Fritz, 1977-

2007-01-01T23:59:59.000Z

456

Good grief, i can speak it! Preliminary experiments in audio restaurant reviews  

E-Print Network (OSTI)

In this paper, we introduce a new envisioned application for speech which allows users to enter restaurant reviews orally via their mobile device, and, at a later time, update a shared and growing database of consumer-provided ...

Polifroni, Joseph

457

Requirements engineering in the year 00: a research perspective  

Science Conference Proceedings (OSTI)

Requirements engineering (RE) is concerned with the identification of the goals to be achieved by the envisioned system, the operationalization of such goals into services and constraints, and the assignment of responsibilities for the resulting requirements ...

Axel van Lamsweerde

2000-06-01T23:59:59.000Z

458

Development of New Building Blocks for Constructing Novel Polymer Semiconductors for Organic Thin Film Transistors.  

E-Print Network (OSTI)

??Organic semiconductors are envisioned to have widespread applications in flexible displays, radio-frequency identification (RFID) tags, bio- and chem-sensors, as well as organic solar cells. Polymer… (more)

Yan, Zhuangqing

2013-01-01T23:59:59.000Z

459

Distinguishing the Roles of Natural and Anthropogenically Forced Decadal Climate Variability  

Science Conference Proceedings (OSTI)

Given that over the course of the next 10–30 years the magnitude of natural decadal variations may rival that of anthropogenically forced climate change on regional scales, it is envisioned that initialized decadal predictions will provide ...

Amy Solomon; Lisa Goddard; Arun Kumar; James Carton; Clara Deser; Ichiro Fukumori; Arthur M. Greene; Gabriele Hegerl; Ben Kirtman; Yochanan Kushnir; Matthew Newman; Doug Smith; Dan Vimont; Tom Delworth; Gerald A. Meehl; Timothy Stockdale

2011-02-01T23:59:59.000Z

460

Design of hybrid optio-vision tracking system with active RFID  

E-Print Network (OSTI)

An investigation in current RFID technology with an envision design of a hybrid setup with Active RFID and camera technology. Current Active RFID technologies focus on dynamic mesh networks with complex functionality on ...

Hilton, Eric, S. B. Massachusetts Institute of Technology

2008-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "rsa envision bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Human-automation collaborative RRT for UAV mission path planning  

E-Print Network (OSTI)

Future envisioned Unmanned Aerial Vehicle (UAV) missions will be carried out in dynamic and complex environments. Human-automation collaboration will be required in order to distribute the increased mission workload that ...

Caves, Américo De Jesús (Caves Corral)

2010-01-01T23:59:59.000Z

462

Analyzing the proliferation resistance of advanced nuclear fuel cycles : in search of an assessment methodology for use in fuel cycle simulations  

E-Print Network (OSTI)

A methodology to assess proliferation resistance of advanced nuclear energy systems is investigated. The framework, based on Multi-Attribute Utility Theory (MAUT), is envisioned for use within early-stage fuel cycle ...

Pierpoint, Lara Marie

2008-01-01T23:59:59.000Z

463

Retrieving monitoring and accounting information from constrained devices in internet-of-things applications  

Science Conference Proceedings (OSTI)

Internet-of-Things (IoT) is envisioned to provide connectivity to a vast number of sensing or actuating devices with limited computational and communication capabilities. For the organizations that manage these constrained devices, the monitoring of ...

Oleksiy Mazhelis, Martin Waldburger, Guilherme Sperb Machado, Burkhard Stiller, Pasi Tyrväinen

2013-06-01T23:59:59.000Z

464

Improving the probability of effective organizational change in the Coast Guard through the combined use of System Dynamics and Enterprise Value Stream Mapping & Analysis  

E-Print Network (OSTI)

Most major organizational changes never reap the benefits the original planners envisioned, they often take longer to implement than expected and in a dynamic environment that can spell disaster for a large enterprise. The ...

Johnston, Michael J., S.M. Massachusetts Institute of Technology

2008-01-01T23:59:59.000Z

465

Clean Cities 20th Anniversary Agenda  

NLE Websites -- All DOE Office Websites (Extended Search)

Clean Cities 20 th Anniversary: Celebrating Today, Envisioning Tomorrow June 24, 2013 Washington Convention Center 801 Mt. Vernon Place, NW, Room 207B Washington, D.C. 20001 1:30...

466

VRCodes : embedding unobtrusive data for new devices in visible light  

E-Print Network (OSTI)

This thesis envisions a public space populated with active visible surfaces which appear different to a camera than to the human eye. Thus, they can act as general digital interfaces that transmit machine-compatible data ...

Woo, Grace R

2012-01-01T23:59:59.000Z

467

Communication and energy delivery architectures for personal medical devices  

E-Print Network (OSTI)

Advances in sensor technologies and integrated electronics are revolutionizing how humans access and receive healthcare. However, many envisioned wearable or implantable systems are not deployable in practice due to high ...

Mercier, Patrick Philip

2012-01-01T23:59:59.000Z

468

Proceedings of the 2002 ACM/IEEE conference on Supercomputing  

Science Conference Proceedings (OSTI)

This 15th Annual SC conference brings together a worldwide community to celebrate its achievements and envision the future of high performance computing, networking, and data technologies. Our theme, "From Terabytes to Insights," emphasizes the opportunity ...

Roscoe Giles; Kathryn Kelley; Daniel Reed

2002-11-01T23:59:59.000Z

469

LuminAR : a compact and kinetic projected augmented reality interface  

E-Print Network (OSTI)

For quite some time, researchers and designers in the field of human computer interaction have strived to better integrate information interfaces into our physical environment. They envisioned a future where computing and ...

Linder, Natan

2011-01-01T23:59:59.000Z

470

PennState LIVE Blight-resistant American chestnut trees nearing reality  

E-Print Network (OSTI)

to a chestnut expert in Penn State's College of Agricultural Sciences, who envisions a day in the not-so-distant (Cryphonectria parasitica) carried on exotic plant materials imported by plant explorers in the late 1800s

Kaye, Jason P.

471

DOE JGI Announces 2008 Genome Sequencing Targets  

NLE Websites -- All DOE Office Websites (Extended Search)

It is envisioned that pearl millet would be useful as a supplement or replacement for corn in ethanol plants in regions that suffer from drought and low-fertility soils. The...

472

Propulsion system concepts for silent aircraft  

E-Print Network (OSTI)

The noise emitted by commercial aircraft is a major inhibitor of the growth of commercial air transport and is a critical environmental issue in air transportation. A functionally-silent aircraft is envisioned to achieve ...

Manneville, Alexis, 1978-

2004-01-01T23:59:59.000Z

473

Hail Formation via Microphysical Recycling  

Science Conference Proceedings (OSTI)

It is suggested that alternation of low-density riming and wet growth processes play a role in hailstone formation. Such alternation of growth processes, which has been called microphysical recycling, is envisioned to operate in the following ...

John C. Pflaum

1980-01-01T23:59:59.000Z

474

Evidence-based medicine  

Science Conference Proceedings (OSTI)

Whether for the generation or application of evidence to guide healthcare decisions, the success of evidence-based medicine is grounded in principles common to engineering. In the Learning Healthcare System envisioned by the Institute of Medicine's (IOM) ...

J. Michael Mcginnis

2009-01-01T23:59:59.000Z

475

EMSL: Science: Research Campaigns  

NLE Websites -- All DOE Office Websites (Extended Search)

EMSL Research Campaigns NMR To accelerate scientific progress in areas of high importance to DOE and the nation, EMSL launched a new concept for user proposals in 2010. Envisioned...

476

Particle Physics Experiment  

NLE Websites -- All DOE Office Websites (Extended Search)

What Is A Particle Physics Experiment? The word "experiment" often makes people envision a scientist in white lab coat and goggles walking into the lab, pouring some test tubes...

477

Piggy bank: experience the semantic web inside your web browser  

Science Conference Proceedings (OSTI)

The Semantic Web Initiative envisions a Web wherein information is offered free of presentation, allowing more effective exchange and mixing across web sites and across web pages. But without substantial Semantic Web content, few tools will be written ...

David Huynh; Stefano Mazzocchi; David Karger

2005-11-01T23:59:59.000Z

478

In The Name Of The Father, The Governor, And "A-1 Good Men": Performing Gender and Statehood In Territorial New Mexico, 1880 - 1912  

E-Print Network (OSTI)

men of energy and enterprise” to New Mexico. Paying a salaryenergy and enterprise” comprised what he envisioned as New Mexico’Mexico as land ready to flourish only if financially independent “men of energy and

Sanchez, Sabrina

2013-01-01T23:59:59.000Z

479

In-situ backplane inspection of fiber optic ferrules  

E-Print Network (OSTI)

The next generation of supercomputers, routers, and switches are envisioned to have hundreds and thousands of optical interconnects among components. An optical interconnect attains a bandwidth-distance product as high as ...

Wilson, Andrew Kirk, 1977-

2006-01-01T23:59:59.000Z

480

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8, 2013 8, 2013 V-087: Adobe Flash Player Two Vulnerabilities Two vulnerabilities are reported as 0-day which can be exploited by malicious people to compromise a user's system. February 7, 2013 V-086: IntegraXor ActiveX Control Buffer Overflow Vulnerability The vulnerability is caused due to an error in the PE3DO32A.ocx ActiveX control and can be exploited to cause a buffer overflow. February 6, 2013 V-085: Cisco Unity Express Input Validation Hole Permits Cross-Site Request Forgery Attacks A vulnerability was reported in Cisco Unity Express. February 5, 2013 V-084: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain Access, Clickjacking, and File Upload Attacks Several vulnerabilities were reported in RSA Archer eGRC. February 4, 2013 V-083: Oracle Java Multiple Vulnerabilities

Note: This page contains sample records for the topic "rsa envision bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

September 13, 2012 September 13, 2012 U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL Buffer Overflow Lets Remote Users Execute Arbitrary Code RSA BSAFE SSL-C Multiple Vulnerabilities September 12, 2012 U-258: Adobe Flash Player Flaw Lets Remote Users Execute Arbitrary Code A remote user can cause arbitrary code to be executed on the target user's system. September 11, 2012 U-256: Microsoft Security Bulletin Advance Notification for September 2012 Microsoft Security Bulletin Advance Notification for September 2012. Microsoft has posted 0 Critical Bulletins and 2 Important Bulletins. Bulletins with the Maximum Severity Rating and Vulnerability Impact of "Critical" may allow remote execution of code. Microsoft is hosting a webcast to address customer questions on these bulletins on September 12,

482

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

May 20, 2013 May 20, 2013 V-159: RSA SecurID Agent Discloses Node Secret Encryption Key to Local Users A vulnerability was reported in RSA SecurID Products. May 15, 2013 V-156: Linux Kernel Array Bounds Checking Flaw Lets Local Users Gain Elevated Privileges A vulnerability was reported in the Linux Kernel. May 10, 2013 V-153: Symantec Brightmail Gateway Input Validation Flaw Permits Cross-Site Scripting Attacks Symantec's Brightmail Gateway management console is susceptible to stored cross-site scripting (XSS) issues found in some of the administrative interface pages. May 9, 2013 V-152: Cisco Unified Customer Voice Portal (CVP) Multiple Vulnerabilities Various components of Cisco Unified CVP are affected. These vulnerabilities can be exploited independently; however, more than one vulnerability could

483

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6, 2012 6, 2012 U-206: WordPress Flaws Permit Cross-Site Scripting, Cross-Site Request Forgery, and Information Disclosure Attacks Several vulnerabilities were reported in WordPress. A remote authenticated user can conduct cross-site scripting attacks. A remote user can conduct cross-site request forgery attacks. A remote authenticated user can obtain potentially sensitive information. July 5, 2012 U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System A vulnerability was reported in RSA Access Manager. A remote user can gain access to the target system. July 3, 2012 U-204: HP Network Node Manager i Input Validation Hole Permits Cross-Site Scripting Attacks Potential security vulnerabilities have been identified with HP Network Node Manager I (NNMi) for HP-UX, Linux, Solaris, and Windows. The

484

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

61 - 23670 of 28,905 results. 61 - 23670 of 28,905 results. Download Financing Renewable Energy- No Pain, No Gain U.S. Department of Energy (DOE) Office of Energy Efficiency and Renewable Energy (EERE) Community Renewable Energy Success Stories Webinar series presentation by Rob Holden, New Resource Bank, on financing renewable energy systems from a banker's perspective. http://energy.gov/eere/downloads/financing-renewable-energy-no-pain-no-gain Article Delaware Company Breathes New Life into Old Post Office Building Learn how the Energy Department helped a Delaware company revitalize a historic building while cutting energy consumption. http://energy.gov/articles/delaware-company-breathes-new-life-old-post-office-building Download Using Two-Factor RSA Token with WebVPN Instructions on how to use your RSA token to login to DOE VPN Services

485

MARSAME Appendix C C. EXAMPLES OF COMMON RADIONUCLIDES  

E-Print Network (OSTI)

2003 · Fungus catches radioactive fallout 8 May 2002 · Depleted uranium soils battlefields 12 MarchBugs boost Cold War clean-up: Bacteria could scrub uranium from sites contaminated decades ago boost Cold War clean-up Bacteria could scrub uranium from sites contaminated decades ago. 13 October

486

Chapter 1. Introduction Uranium is a common element in nature that has for centuries been used as a coloring agent in  

E-Print Network (OSTI)

2003 · Fungus catches radioactive fallout 8 May 2002 · Depleted uranium soils battlefields 12 MarchBugs boost Cold War clean-up: Bacteria could scrub uranium from sites contaminated decades ago boost Cold War clean-up Bacteria could scrub uranium from sites contaminated decades ago. 13 October

487

Parameterizing random test data according to equivalence classes  

Science Conference Proceedings (OSTI)

We are concerned with the problem of detecting bugs in machine learning applications. In the absence of sufficient real-world data, creating suitably large data sets for testing can be a difficult task. To address this problem, we have developed an approach ... Keywords: random test data generation, software testing

Christian Murphy; Gail Kaiser; Marta Arias

2007-11-01T23:59:59.000Z

488

Divide-and-query and subterm dependency tracking in the mercury declarative debugger  

Science Conference Proceedings (OSTI)

We have implemented a declarative debugger for Mercury that is capable of finding bugs in large, long-running programs. This debugger implements several search strategies. We discuss the implementation of two of these strategies and the conditions under ... Keywords: algorithmic debugging, declarative debugging, divide-and-query, program slicing

Ian MacLarty; Zoltan Somogyi; Mark Brown

2005-09-01T23:59:59.000Z

489

Semantic errors in SQL queries: a quite complete list  

Science Conference Proceedings (OSTI)

We investigate classes of SQL queries which are syntactically correct, but certainly not intended, no matter for which task the query was written. For instance, queries that are contradictory, i.e. always return the empty set, are obviously not intended. ... Keywords: SQL, SQL exams, bugs, database courses, databases, errors, logical errors, queries, semantic errors, software correctness, static analysis, teaching

Stefan Brass; Christian Goldberg

2006-05-01T23:59:59.000Z

490

E: Commerce: The Dark Side: What to Do When the Worst Happens!  

Science Conference Proceedings (OSTI)

The last few weeks have been full of news that confirms the advice we've been presenting to readers of this column. The Love Bug virus was one example, it demonstrated the current pitiful state we find ourselves in when we have global electronic commerce, ...

Bill Boni

2000-07-01T23:59:59.000Z

491

Environmental Considerations for Backup Generation Applications to Demand Response  

Science Conference Proceedings (OSTI)

This report investigates the pros and cons of customer backup generation (BUG) for offsetting electric demand through demand response programs. The report examines the environmental issues related to this technology and contrasts this information with air quality and environmental agency regulations prevalent in California, Texas, and the model emissions standards being developed in the United States.

2002-11-22T23:59:59.000Z

492

SoftBound: highly compatible and complete spatial memory safety for c  

Science Conference Proceedings (OSTI)

The serious bugs and security vulnerabilities facilitated by C/C++'s lack of bounds checking are well known, yet C and C++ remain in widespread use. Unfortunately, C's arbitrary pointer arithmetic, conflation of pointers and arrays, and programmer-visible ... Keywords: buffer overflows, c, spatial memory safety

Santosh Nagarakatte; Jianzhou Zhao; Milo M.K. Martin; Steve Zdancewic

2009-06-01T23:59:59.000Z

493

Efficient code distribution in wireless sensor networks  

Science Conference Proceedings (OSTI)

The need to reprogramme a wireless sensor network may arise from changing application requirements, bug fixes, or during the application development cycle. Once deployed, it will be impractical at best to reach each individual node. Thus, a scheme is ... Keywords: code distribution, compression, reprogramming, sensor networks, string distance, wireless

Niels Reijers; Koen Langendoen

2003-09-01T23:59:59.000Z

494

How to keep your head above water while detecting errors  

Science Conference Proceedings (OSTI)

Today's distributed systems need runtime error detection to catch errors arising from software bugs, hardware errors, or unexpected operating conditions. A prominent class of error detection techniques operates in a stateful manner, i.e., it keeps track ... Keywords: J2EE multi-tier systems, hidden markov model, high throughput distributed applications, intelligent sampling, stateful error detection

Ignacio Laguna; Fahad A. Arshad; David M. Grothe; Saurabh Bagchi

2009-11-01T23:59:59.000Z

495

C++ Gotchas: Avoiding Common Problems in Coding and Design  

Science Conference Proceedings (OSTI)

From the Book:This book is the result of nearly two decades of minor frustrations, serious bugs, late nights, and weekends spent involuntarily at the keyboard. This collection consists of 99 of some of the more common, severe, or interesting C++ gotchas, ...

Stephen Dewhurst

2002-12-01T23:59:59.000Z

496

Liability for Bad Software and Support Software Support Professionals Association  

E-Print Network (OSTI)

you learn that it has a serious bug. Handle your defects gracefully and responsibly. 2. Brummel v. Leading Edge Products and G.E. Computer Service Answer the phone. 3. Step-Saver Data Systems, Inc. v. Wyse, make the software reasonably fit for its ordinary purposes. 4. Daughtrey v. Ashe Test your

497

Insect Repellent Picking the right insect repellent could protect your health! Mosquitoes, biting flies, and ticks  

E-Print Network (OSTI)

Nile Virus and Lyme disease). Forms and Concentrations: Aerosol and pump-spray products are intended Avon Skin-So-Soft Bug Guard Pump spray, .1% citronella 0.67 n/a Not labeled for ticks Avon Skin version may still be available Bite Blocker Light Country Scent Lotion, 2% soybean oil 0.46 2­4 hours

498

Proceedings of the ASHRAE/DOE/BTECC Conference, Thermal Performance of the Exterior Envelopes of Buildings VII, Clearwater Beach, Florida, December 7-11, 1998  

E-Print Network (OSTI)

of the Exterior Envelopes of Buildings VII, Clearwater Beach, Florida, December 7-11, 1998 The research reported and to increase comfort. This limited proof-of-concept test was designed to work out practical "bugs" and refine variation in daylight availability and solar radiation due to diurnal and seasonal changes in sun position

499

RaceTrack: efficient detection of data race conditions via adaptive tracking  

Science Conference Proceedings (OSTI)

Bugs due to data races in multithreaded programs often exhibit non-deterministic symptoms and are notoriously difficult to find. This paper describes RaceTrack, a dynamic race detection tool that tracks the actions of a program and reports a warning ... Keywords: race detection, virtual machine instrumentation

Yuan Yu; Tom Rodeheffer; Wei Chen

2005-10-01T23:59:59.000Z

500

TRaDe, a topological approach to on-the-fly race detection in java programs  

Science Conference Proceedings (OSTI)

Debugging multi-threaded programs is notoriusly hard. Probably the worst type of bug occurring in multi-threaded programs is a data race. There is therefore a great need for tools to automatically detect data races during execution. This article presents, ...

Mark Christiaens; Koen De Bosschere

2001-04-01T23:59:59.000Z