Powered by Deep Web Technologies
Note: This page contains sample records for the topic "rsa envision bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: RSA enVision Bugs Permit Cross-Site Scripting, SQL 9: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks March 20, 2012 - 7:00am Addthis PROBLEM: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks PLATFORM: 4.x, prior to 4.1 Patch 4 ABSTRACT: Several vulnerabilities were reported in RSA enVision. A remote user can access the system. A remote authenticated user can conduct cross-site scripting attacks. A remote authenticated user can inject SQL commands. A remote authenticated user can view files on the target system. Reference LINKS: SecurityTracker Alert ID: 1026819 CVE-2012-0403 IMPACT ASSESSMENT: High Discussion: The system does not properly filter HTML code from user-supplied input

2

U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Scripting, SQL Injection, and Directory Traversal Attacks PLATFORM: 4.x, prior to 4.1 Patch 4 ABSTRACT: Several vulnerabilities were reported in RSA enVision. A remote user can...

3

U-090: RSA enVision Discloses Environment Variable Information...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

and other fixes can be found in the Release Notes associated with RSA enVision 4.1, Patch 3 and enVision V4.0 Service Pack 4 Patch 5. Impact: Exposure of sensitive information...

4

V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting...  

Energy Savers (EERE)

V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions V-026: RSA Data Protection Manager Bugs Permit...

5

T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

704: RSA enVision Lets Remote Users View Files and Remote 704: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password August 29, 2011 - 3:45am Addthis PROBLEM: Allows remote attackers to obtain sensitive information by sniffing the network or leveraging access to a recipient mailbox. PLATFORM: RSA enVision Version(s): 3.x, 4.x ABSTRACT: RSA enVision lets remote users view files and remote authenticated users obtain password. reference LINKS: SecurityTracker Alert ID: 1025979 CVE-2011-2736 CVE-2011-2737 RSA enVision Product Security IMPACT ASSESSMENT: Medium Discussion: Two vulnerabilities were reported in RSA enVision. A remote user can view files on the target system. A remote authenticated user can obtain

6

T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: RSA enVision Lets Remote Users View Files and Remote 4: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password August 29, 2011 - 3:45am Addthis PROBLEM: Allows remote attackers to obtain sensitive information by sniffing the network or leveraging access to a recipient mailbox. PLATFORM: RSA enVision Version(s): 3.x, 4.x ABSTRACT: RSA enVision lets remote users view files and remote authenticated users obtain password. reference LINKS: SecurityTracker Alert ID: 1025979 CVE-2011-2736 CVE-2011-2737 RSA enVision Product Security IMPACT ASSESSMENT: Medium Discussion: Two vulnerabilities were reported in RSA enVision. A remote user can view files on the target system. A remote authenticated user can obtain

7

U-090: RSA enVision Discloses Environment Variable Information to Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: RSA enVision Discloses Environment Variable Information to 0: RSA enVision Discloses Environment Variable Information to Remote Users U-090: RSA enVision Discloses Environment Variable Information to Remote Users January 27, 2012 - 6:00am Addthis PROBLEM: A vulnerability was reported in RSA enVision PLATFORM: Version(s): 4.0 prior to 4.0 SP4 P5, 4.1 prior to 4.1 P3 ABSTRACT: A remote user can view potentially sensitive data on the target system. reference LINKS: CVE-2011-4143 SecurityTracker Alert ID: 1026591 Secunia Advisory IMPACT ASSESSMENT: Medium Discussion: The security issue is caused due to the application disclosing certain environment variables containing web system setup information via the web interface. Further information about this resolution and other fixes can be found in the Release Notes associated with RSA enVision 4.1, Patch 3 and

8

V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: RSA Data Protection Manager Bugs Permit Cross-Site Scripting 6: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions November 16, 2012 - 6:00am Addthis PROBLEM: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions. PLATFORM: RSA Data Protection Manager Appliance versions 2.7.x and 3.x ABSTRACT: Two vulnerabilities were reported in RSA Data Protection Manager. REFERENCE LINKS: SecurityTracker Alert ID: 1027781 EMC Identifier: ESA-2012-055 RSA Worldwide Customer Support CVE-2012-4612 CVE-2012-4613 IMPACT ASSESSMENT: Medium DISCUSSION: Two vulnerabilities were reported in RSA Data Protection Manager. A remote

9

U-027: RSA Key Manager Appliance Session Logout Bug Fails to Terminate  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: RSA Key Manager Appliance Session Logout Bug Fails to 7: RSA Key Manager Appliance Session Logout Bug Fails to Terminate Sessions U-027: RSA Key Manager Appliance Session Logout Bug Fails to Terminate Sessions November 4, 2011 - 8:00am Addthis PROBLEM: RSA Key Manager Appliance Session Logout Bug Fails to Terminate Sessions. PLATFORM: RSA Key Manager Appliance 2.7 Service Pack 1 ABSTRACT: A remote authenticated user session may not terminate properly. reference LINKS: SecurityTracker Alert ID: 1026276 SecurityFocus Bug Traq Seclists: ESA-2011-035 CVE-2011-2740 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in RSA Key Manager Appliance. A remote authenticated user session may not terminate properly. When using Firefox 4 and 5, an authenticated user session is not terminated properly when logging out.

10

U-061: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: RSA Adaptive Authentication Bugs Let Remote Users Bypass 1: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain Security Controls U-061: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain Security Controls December 14, 2011 - 8:17am Addthis PROBLEM: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain Security Controls. PLATFORM: 6.0.2.1 SP1 Patch 2 and SP1 Patch 3 6.0.2.1 SP2 and SP2 Patch 1 6.0.2.1 SP3 ABSTRACT: A remote user may be able to bypass certain security controls. reference LINKS: SecurityTracker Alert ID: 1026420 Security Focus: ESA-2011-036 IMPACT ASSESSMENT: Medium Discussion: Two vulnerabilities were reported in RSA Adaptive Authentication (On-Premise). A remote user may be able to bypass certain security controls. A remote user can send specially crafted data elements to affect the Device

11

U-061: RSA Adaptive Authentication Bugs Let Remote Users Bypass...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Bugs Let Remote Users Bypass Certain Security Controls. PLATFORM: 6.0.2.1 SP1 Patch 2 and SP1 Patch 3 6.0.2.1 SP2 and SP2 Patch 1 6.0.2.1 SP3 ABSTRACT: A remote user may...

12

Water Bugs  

NLE Websites -- All DOE Office Websites (Extended Search)

Bugs Bugs Nature Bulletin No. 221-A March 12, 1966 Forest Preserve District of Cook County Seymour Simon, President Roland F. Eisenbeis, Supt. of Conservation WATER BUGS It is fascinating to lie in a boat or on a log at the edge of the water and watch the drama that unfolds among the small water animals. Among the star performers in small streams and ponds are the Water Bugs. These are aquatic members of that large group of insects called the "true bugs", most of which live on land. Moreover, unlike many other types of water insects, they do not have gills but get their oxygen directly from the air. Those that do go beneath the surface usually carry an oxygen supply with them in the form of a shiny glistening sheath of air imprisoned among a covering of fine waterproof hairs. The common water insect known to small boys at the "Whirligig Bug" is not a water bug but a beetle.

13

Envision your future in engineering  

E-Print Network (OSTI)

because of my grandpa's history in engineering. He was a geological engineer and he encouraged me to give#12;e Envision your future in engineering © 2011 Montana State University #12;Table of Contents and personal success of minority and women students in the College of Engineering at Montana State University

Dyer, Bill

14

Using Two-Factor RSA Token  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Using Two-Factor RSA Token Using Two-Factor RSA Token with VPN User Guide November 2013 Using Your RSA token with WebVPN 1. Establish a connection to the Internet and connect to https://connect.doe.gov 2. Users who are using their RSA Token for the first time should follow the steps below for PIN creation. Others who have already set up their PIN and used their RSA token previously should enter their six digit numeric username and passcode; this is the PIN + the RSA token code. The result of this successful login will be Step 8 below. 3. A login page similar to the picture below will be displayed. Enter your VPN Username (six-digit numeric ID) and your Password by typing your generated RSA Token code and then click the Login button. Example; your generated RSA token code is 032848 (from above). In the Password box, you will enter

15

A bug's leaf | EMSL  

NLE Websites -- All DOE Office Websites (Extended Search)

A bug's leaf A bug's leaf Leaf-cutter ant fungus gardens give bioenergy-relevant information Leafcutter ants cultivate gardens of fungi and bacteria. Photo courtesy of Alejandro...

16

V-103: RSA Authentication Agent Lets Remote Users Bypass Authenticatio...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

RSA Authentication Agent Lets Remote Users Bypass Authentication Requirements March 4, 2013 - 12:27am Addthis PROBLEM: RSA Authentication Agent Lets Remote Users Bypass...

17

Envisioning and Communicating Dr. Katy Brner  

E-Print Network (OSTI)

1 Envisioning and Communicating Science Dr. Katy B�rner Cyberinfrastructure for Network Science Center, Director Information Visualization Laboratory, Director School of Library and Information Science Indiana University, Bloomington, IN katy@indiana.edu "Visualization in Science and Education" Gordon

Menczer, Filippo

18

Massive June Bug Emergence  

NLE Websites -- All DOE Office Websites (Extended Search)

Massive June Bug Emergence Massive June Bug Emergence Name: Cordell Location: N/A Country: N/A Date: N/A Question: We are infested with june bugs next to the street light near the end of my driveway. They have burrowed into the ground and underneath my driveway. Yesterday we shoveled 2/3 of a 33-gallon trash bag of just bugs. What can we spray or do to kill these june bugs? Replies: Not knowing which part of the country you are from and I could be wrong because of this fact buy this does not sound like June Bugs. This has to be a Circadia outbreak which are relatives to the June Bug. They run in 13, 17 or other year cycles and this depends upon the part of the country you are from. Ask a local garden center or naturalist and you'll probably see that this won't happen again for a number of years to come.

19

V-103: RSA Authentication Agent Lets Remote Users Bypass Authentication  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: RSA Authentication Agent Lets Remote Users Bypass 3: RSA Authentication Agent Lets Remote Users Bypass Authentication Requirements V-103: RSA Authentication Agent Lets Remote Users Bypass Authentication Requirements March 4, 2013 - 12:27am Addthis PROBLEM: RSA Authentication Agent Lets Remote Users Bypass Authentication Requirements PLATFORM: RSA Authentication Agent 7.1, 7.1.1 for Microsoft Windows ABSTRACT: A vulnerability was reported in RSA Authentication Agent. REFERENCE LINKS: RSA SecurCare SecurityTracker Alert ID: 1028230 CVE-2013-0931 IMPACT ASSESSMENT: Medium DISCUSSION: On systems configured for Quick PIN Unlock, the system will request a PIN instead of a full Passcode when the session is activated from an active screensaver after the Quick PIN Unlock timeout has expired. RSA Authentication Agent on Windows Vista, Windows 7, Windows 2008, and

20

T-582: RSA systems has resulted in certain information being...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

certain information being extracted from RSA systems that relates to RSA SecurID March 17, 2011 - 11:45pm Addthis PROBLEM: Recently EMC's security systems identified an extremely...

Note: This page contains sample records for the topic "rsa envision bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

T-582: RSA systems has resulted in certain information being extracted from  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: RSA systems has resulted in certain information being 2: RSA systems has resulted in certain information being extracted from RSA systems that relates to RSA SecurID T-582: RSA systems has resulted in certain information being extracted from RSA systems that relates to RSA SecurID March 17, 2011 - 11:45pm Addthis PROBLEM: Recently EMC's security systems identified an extremely sophisticated cyber attack in progress, targeting their RSA business unit. RSA took a variety of aggressive measures against the threat to protect their business and their customers, including further hardening of their IT infrastructure. PLATFORM: RSA SecurID implementations ABSTRACT: RSA investigation has revealed that the attack resulted in certain information being extracted from RSA's systems. Some of that information is related to RSA's SecurID two-factor authentication products.

22

T-642: RSA SecurID update to Customers | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: RSA SecurID update to Customers 2: RSA SecurID update to Customers T-642: RSA SecurID update to Customers June 9, 2011 - 12:45am Addthis PROBLEM: Certain characteristics of the attack on RSA indicated that the perpetrator's most likely motive was to obtain an element of security information that could be used to target defense secrets and related IP, rather than financial gain, PII, or public embarrassment. PLATFORM: RSA SecurID implementations ABSTRACT: RSA investigation has revealed that the attack resulted in certain information being extracted from RSA's systems. Some of that information is related to RSA's SecurID two-factor authentication products. reference LINKS: Open Letter to RSA Customers (update) CVE-2011-0322 RSA Fraud Resource Center RSA Security Practice DOE-CIRC T-640: RSA Access Manager Server CVE-2011-0322 Update

23

Method-level bug prediction  

Science Journals Connector (OSTI)

Researchers proposed a wide range of approaches to build effective bug prediction models that take into account multiple aspects of the software development process. Such models achieved good prediction performance, guiding developers towards those parts ... Keywords: code metrics, fine-grained source code changes, method-level bug prediction

Emanuel Giger; Marco D'Ambros; Martin Pinzger; Harald C. Gall

2012-09-01T23:59:59.000Z

24

Executive Summary of Initiative Launching a Re-envisioning Initiative  

E-Print Network (OSTI)

, group work space, and virtual services. It is no longer possible for the Library to support the existing1 Executive Summary of Initiative Launching a Re-envisioning Initiative The UC Berkeley Library has embarked upon a process to re-envision library services that will result in a new service model

California at Berkeley, University of

25

T-640: RSA Access Manager Server CVE-2011-0322 Update | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: RSA Access Manager Server CVE-2011-0322 Update 0: RSA Access Manager Server CVE-2011-0322 Update T-640: RSA Access Manager Server CVE-2011-0322 Update June 7, 2011 - 5:18pm Addthis PROBLEM: ESA-2011-009 (revised): RSA, The Security Division of EMC, announces new fix for potential security vulnerability in RSA Access Manager Server. PLATFORM: RSA Access Manager Server version 5.5.x, 6.0.x, and 6.1.x ABSTRACT: RSA strongly recommends that all customers running RSA Access Manager Server versions 5.5.3, 6.0.4, and 6.1 apply the following updated security hot fixes, which contain the resolution to this issue, at the earliest opportunity. The hot fixes can be downloaded from SecurCare Online or by contacting RSA Security Customer Support. ?Security Hot fix # 5.5.3.174 for RSA Access Manager Server version 5.5.3

26

bug | OpenEI Community  

Open Energy Info (EERE)

bug bug Home Rmckeel's picture Submitted by Rmckeel(297) Contributor 20 July, 2012 - 07:55 Image upload with broken thumbnail image bug images wiki OpenEI users can upload images to the wiki by typing a new file name http://en.openei.org/wiki/File:My_new_file.jpg However, due to a caching timing issue, right after upload, the 120px-wide thumbnail has not yet been created by the time the fetier cache goes after it. Thus, the thumbnail appears broken. Is anyone up for debugging? For users uploading images, this can be fixed by forcing a reload of the page: Rmckeel's picture Submitted by Rmckeel(297) Contributor 19 June, 2012 - 08:04 "Ghost" entries bug utility rate There is an issue that Illinois State University has come across. From Nick B: Syndicate content 429 Throttled (bot load)

27

T-696: RSA Adaptive Authentication Has Unspecified Remote Authenticated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: RSA Adaptive Authentication Has Unspecified Remote 6: RSA Adaptive Authentication Has Unspecified Remote Authenticated Session Re-use Flaw T-696: RSA Adaptive Authentication Has Unspecified Remote Authenticated Session Re-use Flaw August 18, 2011 - 3:09pm Addthis PROBLEM: A vulnerability was reported in RSA Adaptive Authentication. PLATFORM: 6.0.2.1 SP1 Patch 2 and SP1 Patch 3, 6.0.2.1 SP2 and SP2 Patch 1, 6.0.2.1 SP3 ABSTRACT: An issue with Adaptive Authentication (On-Premise) was discovered which in certain circumstances might affect the out-of-the-box available authentication methods. In certain circumstances, when authentication information is compromised, and with the knowledge of additional session information, the authentication information might be reused within an active session. reference LINKS: Security Tracker: 1025956

28

MOTOR VEHICLE (Pursuant to RSA 260:14)  

E-Print Network (OSTI)

permitted pursuant to RSA 260:14, V (a ), other than for bulk distribution for surveys, marketing/I.D. #: _________________________________ Vehicle Identification #: _________________________________ Last Known Address/Town _______________________________ Other Identification Information: ________________________ ***Reverse Side Must Be Completed Before

New Hampshire, University of

29

V-174: RSA Authentication Manager Writes Operating System, SNMP...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

SNMP, and HTTP plug-in proxy passwords. SOLUTION: The vendor has issued a fix (8.0 Patch 1 (P1)). Addthis Related Articles V-195: RSA Authentication Manager Lets Local Users...

30

V-195: RSA Authentication Manager Lets Local Users View the Administrative  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

95: RSA Authentication Manager Lets Local Users View the 95: RSA Authentication Manager Lets Local Users View the Administrative Account Password V-195: RSA Authentication Manager Lets Local Users View the Administrative Account Password July 9, 2013 - 12:51am Addthis PROBLEM: RSA Authentication Manager Lets Local Users View the Administrative Account Password PLATFORM: RSA Authentication Manager 7.1, 8.0 ABSTRACT: A vulnerability was reported in RSA Authentication Manager. REFERENCE LINKS: SecurityTracker Alert ID: 1028742 CVE-2013-3273 RSA IMPACT ASSESSMENT: Medium DISCUSSION: When the RSA Authentication Manager Software Development Kit (SDK) is used to develop a custom application that connects with RSA Authentication Manager and the trace logging is set to verbose, the administrative account password used by the custom application is written in clear text to trace

31

Chinch Bugs in St. Augustine Lawns  

E-Print Network (OSTI)

Chinch bugs can be extremely damaging to home lawns. Their feeding causes small yellow or brown areas in lawns. Chinch bugs can usually be seen on careful inspection of the soil surface. Insecticides provide effective control....

Merchant, Michael E.; Mott, Dale

2006-10-17T23:59:59.000Z

32

Team Bug Bag Biogas For Nicaragua  

E-Print Network (OSTI)

Team Bug Bag Biogas For Nicaragua Project Recap The task for Team Bug Bag was to create for under $100 (USD), and be able to produce biogas that could boil water for a thirty minute time period

Demirel, Melik C.

33

Summary of Bugs Database Jeremy Kepner  

E-Print Network (OSTI)

written to create the current version of the bugs database. 1.2 Brief Project History Development1 Summary of Bugs Database Jeremy Kepner September, 1993 1. Introduction 1.1 Document Purpose of the Bugs database began in May of 1992. Initially, a very simple database model was used. By July

Kepner, Jeremy

34

New Member of EM's Leadership Team Envisions Success Following  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

New Member of EM's Leadership Team Envisions Success Following New Member of EM's Leadership Team Envisions Success Following Reorganization New Member of EM's Leadership Team Envisions Success Following Reorganization February 1, 2012 - 12:00pm Addthis Alice Williams was named EM’s Associate Principal Deputy Assistant Secretary on Jan. 1. Alice Williams was named EM's Associate Principal Deputy Assistant Secretary on Jan. 1. WASHINGTON, D.C. - Alice Williams was named EM's Associate Principal Deputy Assistant Secretary on Jan. 1. Williams recently talked with EM Update about her role in EM's new organizational structure, which is based on a matrix construct and facilitates collaborative decision-making around shared goals and objectives. This structure aims to better align the program to achieve success in the Cold War cleanup. As part of its

35

V-034: RSA Adaptive Authentication (On-Premise) Input Validation Flaws  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: RSA Adaptive Authentication (On-Premise) Input Validation 4: RSA Adaptive Authentication (On-Premise) Input Validation Flaws Permit Cross-Site Scripting Attacks V-034: RSA Adaptive Authentication (On-Premise) Input Validation Flaws Permit Cross-Site Scripting Attacks November 27, 2012 - 2:00am Addthis PROBLEM: RSA Adaptive Authentication (On-Premise) Input Validation Flaws Permit Cross-Site Scripting Attacks PLATFORM: RSA Adaptive Authentication (On-Premise) 6.x ABSTRACT: A vulnerability was reported in RSA Adaptive Authentication (On-Premise). REFERENCE LINKS: SecurityTracker Alert ID: 1027811 SecurityFocus Security Alert RSA Customer Support CVE-2012-4611 IMPACT ASSESSMENT: Medium DISCUSSION: A vulnerability was reported in RSA Adaptive Authentication (On-Premise). A remote user can conduct cross-site scripting attacks. The software does not

36

V-159: RSA SecurID Agent Discloses Node Secret Encryption Key...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Agent Discloses Node Secret Encryption Key to Local Users PLATFORM: RSA Authentication API versions prior to 8.1 SP1 RSA Web Agent for Apache Web Server versions prior to 5.3.5...

37

Transportation Center Seminar... Envisioning Autonomous Vehicle Pathways through  

E-Print Network (OSTI)

Transportation Center Seminar... Envisioning Autonomous Vehicle Pathways through the Lens of Air Transportation Planning Megan S. Ryerson, Ph.D. Assistant Professor Department of City & Regional Planning:00 pm Refreshments available at 3:30 pm Location: Transportation Center, Chambers Hall Lower Level, 600

Bustamante, Fabián E.

38

T-696: RSA Adaptive Authentication Has Unspecified Remote Authenticate...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

A vulnerability was reported in RSA Adaptive Authentication. PLATFORM: 6.0.2.1 SP1 Patch 2 and SP1 Patch 3, 6.0.2.1 SP2 and SP2 Patch 1, 6.0.2.1 SP3 ABSTRACT: An issue with...

39

U-063: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: RSA SecurID Software Token for Windows DLL Loading Error 3: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code U-063: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code December 16, 2011 - 8:00am Addthis PROBLEM: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code. PLATFORM: RSA SecurID Software Token 4.1 for Microsoft Windows ABSTRACT: A remote user can cause the target application to execute arbitrary code on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026426 ESA-2011-039 Secunia Advisory: SA45665 Securityfocus Advisory CVE-2011-4141 RSA Online Fraud Resource Center IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in RSA SecurID Software Token. A remote user

40

U-063: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

63: RSA SecurID Software Token for Windows DLL Loading Error 63: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code U-063: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code December 16, 2011 - 8:00am Addthis PROBLEM: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code. PLATFORM: RSA SecurID Software Token 4.1 for Microsoft Windows ABSTRACT: A remote user can cause the target application to execute arbitrary code on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026426 ESA-2011-039 Secunia Advisory: SA45665 Securityfocus Advisory CVE-2011-4141 RSA Online Fraud Resource Center IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in RSA SecurID Software Token. A remote user

Note: This page contains sample records for the topic "rsa envision bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

V-174: RSA Authentication Manager Writes Operating System, SNMP, and HTTP  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: RSA Authentication Manager Writes Operating System, SNMP, 4: RSA Authentication Manager Writes Operating System, SNMP, and HTTP Plug-in Proxy Passwords in Clear Text to Log Files V-174: RSA Authentication Manager Writes Operating System, SNMP, and HTTP Plug-in Proxy Passwords in Clear Text to Log Files June 10, 2013 - 12:47am Addthis PROBLEM: RSA Authentication Manager Writes Operating System, SNMP, and HTTP Plug-in Proxy Passwords in Clear Text to Log Files PLATFORM: RSA Authentication Manager 8.0 ABSTRACT: A vulnerability was reported in RSA Authentication Manager. REFERENCE LINKS: RSA SecurityTracker Alert ID: 1028638 CVE-2013-0947 IMPACT ASSESSMENT: Medium DISCUSSION: The system may write operating system, SNMP, and HTTP plug-in proxy passwords in clear text to log and configuration files. IMPACT: A local user can obtain operating system, SNMP, and HTTP plug-in proxy

42

V-202: Cisco Video Surveillance Manager Bugs Let Remote Users...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain Potentially Sensitive Information V-202: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain Potentially...

43

U-047: Siemens Automation License Manager Bugs Let Remote Users...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or...

44

U-012: BlackBerry Enterprise Server Collaboration Service Bug...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

12: BlackBerry Enterprise Server Collaboration Service Bug Lets Remote Users Impersonate Intra-organization Messages U-012: BlackBerry Enterprise Server Collaboration Service Bug...

45

Scale Insects and Mealy Bugs  

NLE Websites -- All DOE Office Websites (Extended Search)

Scale Insects and Mealy Bugs Scale Insects and Mealy Bugs Nature Bulletin No. 404-A January 30, 1971 Forest Preserve District of Cook County George W. Dunne, President Roland F. Eisenbeis, Supt. of Conservation SCALE INSECTS AND MEALY BUGS The insect world contains an enormous number and variety of species but, of them all, the Scale Insects and Mealy Bugs come nearest to being vegetables. Most insects are active animals that fly, hop, scamper, crawl or burrow, but these queer creatures spend most of their lives merely sitting in one spot, sucking plant juices from a branch, twig, leaf, or fruit. Some of our most destructive pests are included among the several hundred kinds of these highly specialized insects. They are so small that the average person seldom realizes that they are responsible for the sickly or dying condition of a tree or shrub. Adult scale insects are extremely variable in shape, and range in size from that of a pinhead up to forms which are a quarter of an inch long. Each hides under a hard protective shell, or scale, of wax secreted by pores on its body, and are frequently so numerous that they form a dense crust. The females molt a few times, and usually discard their legs and wings, before they mature. She lays eggs under the scale and then dies. These hatch into young (called "crawlers") which move around for a period varying from a few hours to a day or two before they settle down and build scales. Unlike the female, the male -always the smaller of the two -- goes through a cocoon stage from which he emerges with a pair of wings but with no means of taking food. He merely mates and dies. Males are scarce In most kinds and in many species have never been seen.

46

U-120: RSA SecurID Software Token Converter Unspecified Buffer Overflow  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: RSA SecurID Software Token Converter Unspecified Buffer 0: RSA SecurID Software Token Converter Unspecified Buffer Overflow Vulnerability U-120: RSA SecurID Software Token Converter Unspecified Buffer Overflow Vulnerability March 8, 2012 - 7:00am Addthis PROBLEM: RSA SecurID Software Token Converter Unspecified Buffer Overflow Vulnerability PLATFORM: RSA SecurID Software Token Converter 2.x ABSTRACT: Successful exploitation may allow execution of arbitrary code. reference LINKS: Secunia Advisory SA48297 CVE-2012-0397 IMPACT ASSESSMENT: High Discussion: A vulnerability has been reported in RSA SecurID Software Token Converter, which can be exploited by malicious people to compromise a user's system. Impact: An unspecified error can be exploited to cause a buffer overflow. Solution: Update to version 2.6.1. Addthis Related Articles

47

U-212: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: RSA Authentication Manager Flaws Permit Cross-Site and 2: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks U-212: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks July 13, 2012 - 7:00am Addthis PROBLEM: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks PLATFORM: RSA Authentication Manager 7.1 is vulnerable; other versions may also be affected. ABSTRACT: RSA Authentication Manager is prone to multiple security vulnerabilities because it fails to properly sanitize user-supplied input. Attackers can exploit these issues to execute arbitrary script or HTML code, steal cookie-based authentication credentials, and conduct phishing attacks. Other attacks may also be possible.

48

Dynamically fighting bugs : prevention, detection and elimination  

E-Print Network (OSTI)

This dissertation presents three test-generation techniques that are used to improve software quality. Each of our techniques targets bugs that are found by different stake-holders: developers, testers, and maintainers. ...

Artzi, Shay

2009-01-01T23:59:59.000Z

49

Bed Bugs: Clinical Relevance and Control Options  

Science Journals Connector (OSTI)

...most do not come with quality efficacy data; an industry standard can review these...Anonymous. 2010. Bedbug bites becoming bigger battle. CMAJ 182 : 1606. 19. Anonymous...bug (Hemiptera: Cimicidae) by static electricity and air currents. J. Entomol. Sci...

Stephen L. Doggett; Dominic E. Dwyer; Pablo F. Peas; Richard C. Russell

2012-01-01T23:59:59.000Z

50

V-223: RSA Authentication Agent for PAM Allows Remote Users to Make  

NLE Websites -- All DOE Office Websites (Extended Search)

3: RSA Authentication Agent for PAM Allows Remote Users to Make 3: RSA Authentication Agent for PAM Allows Remote Users to Make Unlimited Login Attempts V-223: RSA Authentication Agent for PAM Allows Remote Users to Make Unlimited Login Attempts August 21, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in RSA Authentication Agent for PAM PLATFORM: RSA Authentication Agent for PAM 7.0.2 and prior ABSTRACT: A remote user can make unlimited login attempts REFERENCE LINKS: Security Tracker Alert ID 1028930 CVE-2013-3271 IMPACT ASSESSMENT: Medium DISCUSSION: The system does not restrict the number of login attempts made via the agent IMPACT: System Access SOLUTION: Vendor has issued a fix Addthis Related Articles U-267: RSA® Authentication Agent 7.1 for Microsoft Windows® and RSA® Authentication Client 3.5 Access Control Vulnerability

51

V-234: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: EMC RSA Archer GRC Open Redirection Weakness and Security 4: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass Security Issue V-234: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass Security Issue September 4, 2013 - 6:00am Addthis PROBLEM: A weakness and a security issue have been reported in EMC RSA Archer GRC PLATFORM: EMC RSA Archer GRC 5.x ABSTRACT: This fixes multiple vulnerabilities, which can be exploited to bypass certain security restrictions and to conduct spoofing attacks REFERENCE LINKS: Secunia Advisory SA54717 SecurityTracker Alert ID 1028971 EMC Identifier: ESA-2013-057 CVE-2013-3276 CVE-2013-3277 IMPACT ASSESSMENT: Medium DISCUSSION: 1) The application does not properly restrict deactivated users. This can be exploited by deactivated users to login and gain access to otherwise

52

U-153: EMC Data Protection Advisor Server and Collector Bugs...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

53: EMC Data Protection Advisor Server and Collector Bugs Let Remote Users Deny Service U-153: EMC Data Protection Advisor Server and Collector Bugs Let Remote Users Deny Service...

53

U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: RSA Access Manager Session Replay Flaw Lets Remote Users 5: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System July 5, 2012 - 7:02am Addthis PROBLEM: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System PLATFORM: Version(s): Server version 6.0.x, 6.1, 6.1 SP1, 6.1 SP2, 6.1 SP3; all Agent versions ABSTRACT: A vulnerability was reported in RSA Access Manager. A remote user can gain access to the target system. reference LINKS: SecurityFocus ESA-2012-026 SecurityTracker Alert ID: 1027220 CVE-2012-2281 RSA SecurCare Online MPACT ASSESSMENT: Medium Discussion: RSA Access Manager contains a vulnerability that can be potentially exploited by a malicious user to replay the session with compromised session tokens. This is due to improper invalidation of session tokens

54

U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

205: RSA Access Manager Session Replay Flaw Lets Remote Users 205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System July 5, 2012 - 7:02am Addthis PROBLEM: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System PLATFORM: Version(s): Server version 6.0.x, 6.1, 6.1 SP1, 6.1 SP2, 6.1 SP3; all Agent versions ABSTRACT: A vulnerability was reported in RSA Access Manager. A remote user can gain access to the target system. reference LINKS: SecurityFocus ESA-2012-026 SecurityTracker Alert ID: 1027220 CVE-2012-2281 RSA SecurCare Online MPACT ASSESSMENT: Medium Discussion: RSA Access Manager contains a vulnerability that can be potentially exploited by a malicious user to replay the session with compromised session tokens. This is due to improper invalidation of session tokens

55

V-084: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain Access,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

84: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain 84: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain Access, Clickjacking, and File Upload Attacks V-084: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain Access, Clickjacking, and File Upload Attacks February 5, 2013 - 12:01am Addthis PROBLEM: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain Access, Clickjacking, and File Upload Attacks PLATFORM: RSA Archer SmartSuite Framework version 4.x RSA Archer GRC version 5.x ABSTRACT: Several vulnerabilities were reported in RSA Archer eGRC. REFERENCE LINKS: Security Alert: ESA-2013-002 SecurityTracker Alert ID: 1028073 CVE-2012-1064 CVE-2012-2292 CVE-2012-2293 CVE-2012-2294 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can cause arbitrary scripting code to be executed by the target user's browser [CVE-2012-1064]. The code will originate from the

56

U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL  

NLE Websites -- All DOE Office Websites (Extended Search)

259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic 259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL Buffer Overflow Lets Remote Users Execute Arbitrary Code U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL Buffer Overflow Lets Remote Users Execute Arbitrary Code September 13, 2012 - 6:00am Addthis PROBLEM: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL Buffer Overflow Lets Remote Users Execute Arbitrary Code PLATFORM: RSA BSAFE SSL-C prior to 2.8.6 ABSTRACT: RSA BSAFE SSL-C Multiple Vulnerabilities reference LINKS: Secunia Advisory SA50601 SecurityTracker Alert ID: 1027514 SecurityTracker Alert ID: 1027513 CVE-2011-3389 CVE-2012-2110 CVE-2012-2131 IMPACT ASSESSMENT: High Discussion: EMC has acknowledged a weakness and a vulnerability in RSA BSAFE, which can

57

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

71 - 1880 of 28,905 results. 71 - 1880 of 28,905 results. Download EA-1388: Final Environmental Assessment Ground Water Compliance at the Shiprock Uranium Mill Tailings Site http://energy.gov/nepa/downloads/ea-1388-final-environmental-assessment Download Document Management & Control System (DMCS) http://energy.gov/cio/downloads/document-management-control-system-dmcs Article U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks Several vulnerabilities were reported in RSA enVision. A remote user can access the system. A remote authenticated user can conduct cross-site scripting attacks. A remote authenticated user can inject SQL commands. A remote authenticated user can view files on the target system. http://energy.gov/cio/articles/u-129-rsa-envision-bugs-permit-cross-site-scripting-sql-injection-and-directory

58

V-195: RSA Authentication Manager Lets Local Users View the Administra...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

can view the administrative account password SOLUTION: The vendor has issued a fix (Patch 26 (P26) for RSA Authentication Manager 7.1 Service Pack 4 (SP4) and Appliance 3.0...

59

U-212: RSA Authentication Manager Flaws Permit Cross-Site and...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

actions on the site acting as the target user. Solution: The vendor has issued a fix (Patch 14 (P14) for RSA Authentication Manager 7.1 SP4 and Appliance 3.0 SP4). Addthis...

60

Bed Bugs: Clinical Relevance and Control Options  

Science Journals Connector (OSTI)

...assist those who cannot pay the high price of control, bed bugs are set to...antigen and bronchial asthma in Egypt. J. Egypt. Soc. Parasitol. 21 : 735-746...Doggett, SL . 2009. Identification natural history, p 13-22. InSL Doggett...

Stephen L. Doggett; Dominic E. Dwyer; Pablo F. Peas; Richard C. Russell

2012-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "rsa envision bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Bug Lets Local Users Deny Service V-098: Linux Kernel Extended Verification Module Bug Lets Local Users Deny Service U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...

62

U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass...

63

U-163: PHP Command Parameter Bug Lets Remote Users Obtain Potentially...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

63: PHP Command Parameter Bug Lets Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code U-163: PHP Command Parameter Bug Lets Remote Users Obtain...

64

Microsoft Word - Final BUGS article final.docx  

NLE Websites -- All DOE Office Websites (Extended Search)

of a good peak resource (Figure 1). Characteristics of a Good Peak Resource Demand Response Program Central- Station Peaker BUGS for Peaks Close to the Load ...

65

U-052: HP Protect Tools Device Access Manager Unspecified Bug...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Flaw Lets Remote Users Update Firmware with Arbitrary Code U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code U-049:...

66

ndergraduates in computer science and engi-neering are helping Boeing envision the future  

E-Print Network (OSTI)

U ndergraduates in computer science and engi- neering are helping Boeing envision the future performance. According to Don Akers, a Boeing associate technical fellow and sys- tems software architect to offer students a project that could be useful to Boeing -- one that has real- world impact, involving

67

An Efficient Abuse-Free Fair Contract-Signing Protocol Based on RSA Signature and -protocol  

E-Print Network (OSTI)

An Efficient Abuse-Free Fair Contract-Signing Protocol Based on RSA Signature and -protocol Xi in this paper. The proposed protocol is not only fair and optimistic, but also efficient and abuse the Internet. In such scenario, fairness is critical, because they may be potentially mistrusted. That is

68

Research Student Handbook www.leeds.ac.uk/rsa/handbooks.html  

E-Print Network (OSTI)

that the information contained in this Handbook is accurate it does not accept liability for any inaccuraciesResearch Student Handbook 2011-2012 www.leeds.ac.uk/rsa/handbooks.html This Handbook should be read;Research Student Handbook 2011-2012 Important This Handbook was published in August 2011. Whilst

Haase, Markus

69

History's Worst Software Bugs By Simson Garfinkel Story location: http://www.wired.com/news/technology/bugs/0,2924,69355,00.html  

E-Print Network (OSTI)

they lurk within our cell phones and our pacemakers, our power plants and medical equipment. And now, in our working for the U.S. Central Intelligence Agency allegedly (.pdf) plant a bug in a Canadian computer: "first actual case of a bug being found." Sixty years later, computer bugs are still with us, and show

Overstreet, C. Michael

70

U-141: Sourcefire Defense Center Bugs | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Sourcefire Defense Center Bugs 1: Sourcefire Defense Center Bugs U-141: Sourcefire Defense Center Bugs April 5, 2012 - 8:30am Addthis PROBLEM: Sourcefire Defense Center Bugs Let Remote Users Traverse the Directory, Access the Database, and Conduct Cross-Site Scripting Attacks PLATFORM: Version(s): prior to 4.10.2.3 ABSTRACT: Several vulnerabilities were reported in Sourcefire Defense Center. A remote user can conduct cross-site scripting attacks. A remote user can access the database. A remote user can view files on the target system reference LINKS: Original Advisory Security Tracker ID 1026890 Secunia Advisory 48667 IMPACT ASSESSMENT: Medium Discussion: A remote user can cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the Sourcefire Defense

71

U-141: Sourcefire Defense Center Bugs | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Sourcefire Defense Center Bugs 1: Sourcefire Defense Center Bugs U-141: Sourcefire Defense Center Bugs April 5, 2012 - 8:30am Addthis PROBLEM: Sourcefire Defense Center Bugs Let Remote Users Traverse the Directory, Access the Database, and Conduct Cross-Site Scripting Attacks PLATFORM: Version(s): prior to 4.10.2.3 ABSTRACT: Several vulnerabilities were reported in Sourcefire Defense Center. A remote user can conduct cross-site scripting attacks. A remote user can access the database. A remote user can view files on the target system reference LINKS: Original Advisory Security Tracker ID 1026890 Secunia Advisory 48667 IMPACT ASSESSMENT: Medium Discussion: A remote user can cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the Sourcefire Defense

72

V-098: Linux Kernel Extended Verification Module Bug Lets Local...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

reported in the Linux Kernel. REFERENCE LINKS: The Linux Kernel Archives Linux Kernel Red Hat Bugzilla - Bug 913266 SecurityTracker Alert ID: 1028196 CVE-2013-0313 IMPACT...

73

V-149: Microsoft Internet Explorer Object Access Bug Lets Remote...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code...

74

V-128: Xen Event Channel Tracking Pointer Bug Local Privilege...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

privileges on the target host system. SOLUTION: The vendor has issued a fix (xsa47-4.1.patch, xsa47-4.2-unstable.patch). Addthis Related Articles U-232: Xen p2mteardown() Bug...

75

T-633: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

33: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets Remote Users Deny Service T-633: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets Remote Users Deny Service May 31,...

76

T-579: BlackBerry Device Software Bug in WebKit Lets Remote Users...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

79: BlackBerry Device Software Bug in WebKit Lets Remote Users Execute Code T-579: BlackBerry Device Software Bug in WebKit Lets Remote Users Execute Code March 15, 2011 - 5:05pm...

77

T-563: Red Hat Directory Server Bugs Let Local Users Gain Elevated...  

Office of Environmental Management (EM)

T-563: Red Hat Directory Server Bugs Let Local Users Gain Elevated Privileges and Remote and Local Users Deny Service T-563: Red Hat Directory Server Bugs Let Local Users Gain...

78

U-201: HP System Management Homepage Bugs Let Remote Users Deny...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

01: HP System Management Homepage Bugs Let Remote Users Deny Service U-201: HP System Management Homepage Bugs Let Remote Users Deny Service June 28, 2012 - 7:00am Addthis PROBLEM:...

79

U-053: Linux kexec Bugs Let Local and Remote Users Obtain Potentially...  

Energy Savers (EERE)

and enhancement update U-068:Linux Kernel SGIO ioctl Bug Lets Local Users Gain Elevated Privileges T-712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update...

80

V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets...  

Office of Environmental Management (EM)

71: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service...

Note: This page contains sample records for the topic "rsa envision bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

V-015: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information V-015: Apple iOS Bugs Let Remote...

82

V-203: HP LoadRunner Multiple Bugs Let Remote Users Deny Service...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

system. SOLUTION: The vendor has issued a fix(11.52) Addthis Related Articles V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code V-171: Apple Safari Bugs Let...

83

U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

21: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-121: Apple iOS Bugs Let Remote...

84

Microsoft Word - Final BUGS article final.docx  

NLE Websites -- All DOE Office Websites (Extended Search)

October 18, 2010 DOE/NETL-2010/1435 BUGS: The Next Smart Grid Peak Resource? BUGS: The Next Smart Grid Peak Resource? 2 Prepared by: Booz Allen Hamilton (BAH) Steve Pullins Horizon Energy Group DOE Contract number: DE-FE000400 BUGS: The Next Smart Grid Peak Resource? 3 Acknowledgements This report was prepared by Booz Allen Hamilton, Inc. (BAH) for the United States Department of Energy's National Energy Technology Laboratory. This work was completed under DOE NETL Contract Number DE-FE000400, and performed under BAH Task 430.04. The authors wish to acknowledge the excellent guidance, contributions, and cooperation of the NETL staff, particularly: Steven Bossart, Integrated Electric Power Systems Division Director Keith Dodrill, Integrated Electric Power Systems Division NETL Technical Monitor

85

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

31, 2011 31, 2011 T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass Authentication or Obtain Information Apache Tomcat AJP protocol processing bug lets remote users bypass authentication or obtain information. August 30, 2011 T-706: Microsoft Fraudulent Digital Certificate Issued by DigiNotar Fraudulent Digital Certificate Issued by DigiNotar, a Certification Authority Present in the Trusted Root Certification Authorities August 30, 2011 T-705: Linux Kernel Weakness in Sequence Number Generation Facilitates Packet Injection Attacks Linux Kernel Weakness in Sequence Number Generation Facilitates Packet Injection Attacks. August 29, 2011 T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password RSA enVision lets remote users view files and remote authenticated users

86

Lockout: Efficient Testing for Deadlock Bugs Ali Kheradmand  

E-Print Network (OSTI)

Lockout: Efficient Testing for Deadlock Bugs Ali Kheradmand School of Computer and Communication introduce Lockout, a technique and a tool that increases the proba- bility of deadlock manifestation and the testing infrastructure. Lockout produces binaries that are more prone to deadlock compared to native

Candea, George

87

Foiling the Flu Bug Global Partnerships for Nuclear Energy  

E-Print Network (OSTI)

1 1663 Foiling the Flu Bug Global Partnerships for Nuclear Energy Dark Universe Mysteries WILL NOT NEED TESTING Expanding Nuclear Energy the Right Way GLOBAL PARTNERSHIPS AND AN ADVANCED FUEL CYCLE sense.The Laboratory is operated by Los Alamos National Security, LLC, for the Department of Energy

88

The application of hyperspectral image techniques on MODIS data for the detection of oil spills in the RSA1  

E-Print Network (OSTI)

The application of hyperspectral image techniques on MODIS data for the detection of oil spills Oceanography Centre, Empress Dock, Southampton, S014 3ZH, UK ABSTRACT Oil spills pose a serious threat to the sensitive marine ecosystem of the RSA. The study aims to detect and identify oil spills using remote sensing

Quartly, Graham

89

Assets at Risk: Menstrual Cycle Variation in the Envisioned Formidability of a Potential Sexual Assailant Reveals a Component of Threat Assessment  

E-Print Network (OSTI)

M. T. (2013). Sizing up the threat: The envisioned physicalconceptual links between threat, social status, and physicalReveals a Component of Threat Assessment Daniel M.T.

Fessler, Daniel M.T.; Holbrook, Colin; Fleischman, Diana S.

2014-01-01T23:59:59.000Z

90

T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

68: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site 68: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request Forgery Attacks and Execute Arbitrary Code T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request Forgery Attacks and Execute Arbitrary Code March 2, 2011 - 3:05pm Addthis PROBLEM: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request Forgery Attacks and Execute Arbitrary Code. PLATFORM: Firefox, Thunderbird, SeaMonkey ABSTRACT: Mozilla developers identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and Mozilla presume that with enough effort at least some of these could be exploited to run arbitrary code. reference LINKS:

91

Re-envisioning the role of hydrogen in a sustainable energy economy  

Science Journals Connector (OSTI)

This paper addresses the fundamental question of where hydrogen might fit into a global sustainable energy strategy for the 21st century that confronts the three-pronged challenge of irreversible climate change, uncertain oil supply, and rising pollution. We re-envision the role of hydrogen at national and international strategic levels, relying entirely on renewable energy and energy efficiency. It is suggested the time for an exclusive hydrogen economy has passed, since electricity and batteries would be used extensively as well. Yet hydrogen would still play a crucial role: in road and rail vehicles requiring a range comparable to todays petrol and diesel vehicles; in coastal and international shipping; in air transport; and for longer-term seasonal storage on electricity grids relying mainly on renewables. Hydrogen fuel cell vehicles are proposed where medium and long distance trips are required, with plug-in battery electric vehicles reserved for just short trips. A hierarchy of spatially-distributed hydrogen production, storage and distribution centers relying on local renewable energy sources and feedstocks would be created to limit the required hydrogen pipeline network to the main metropolitan areas and regions by complementary use of electricity as a major energy vector. Bulk hydrogen storage would provide the strategic energy reserve to guarantee national and global energy security in a world relying increasingly on renewable energy. It is recommended that this vision next be applied to specific countries by conducting detailed energy-economic-environmental modeling to quantify its net benefits.

John Andrews; Bahman Shabani

2012-01-01T23:59:59.000Z

92

T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct...

93

U-049: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users...  

Energy Savers (EERE)

Netcool Reporter Support and Downloads . Addthis Related Articles U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code U-048:...

94

U-045: Windows Win32k.sys Keyboard Layout Bug Lets Local Users...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Restrict access to trusted users only. Addthis Related Articles U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code U-046:...

95

OpenEI/URDB Bug? | OpenEI Community  

Open Energy Info (EERE)

OpenEI/URDB Bug? OpenEI/URDB Bug? Home > Groups > Utility Rate Clarknd's picture Submitted by Clarknd(20) Member 26 November, 2012 - 07:39 I ran into a problem today on the Utility Rate Database (URDB). Every time I select the "Assume net metering (buy = sell)" box and go to save the page for some reason it doesn't save that change and reverts back to "No" rather than "Yes". Groups: Utility Rate Login to post comments Latest discussions Rmckeel New page curation tool Posted: 7 May 2013 - 08:16 by Rmckeel Rmckeel Considering removing "Show Preview" button on utility rate form edit Posted: 22 Apr 2013 - 13:55 by Rmckeel 5 comment(s) 1 of 10 ›› Groups Menu You must login in order to post into this group. Latest discussion comments NickL

96

Entrapment of bed bugs by leaf trichomes inspires microfabrication of biomimetic surfaces  

Science Journals Connector (OSTI)

...18 h; the total area impacted by 60 bug feet with eight locomotory cycles per minute...generally occurred on the underside of the foot. The same legs that appeared irreversibly...potential to harness the bed bug-entrapping power of natural leaf surfaces using purely physical...

2013-01-01T23:59:59.000Z

97

Using Combinatorial Benchmark Construction to Improve the Assessment of Concurrency Bug Detection Tools  

E-Print Network (OSTI)

of performance measures. The inclusion of performance measures ensure that we can assess the fitnessUsing Combinatorial Benchmark Construction to Improve the Assessment of Concurrency Bug Detection, it is difficult to assess the fitness of a particular con- currency bug detection method and to compare

Bradbury, Jeremy S.

98

V-098: Linux Kernel Extended Verification Module Bug Lets Local Users Deny  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Linux Kernel Extended Verification Module Bug Lets Local 8: Linux Kernel Extended Verification Module Bug Lets Local Users Deny Service V-098: Linux Kernel Extended Verification Module Bug Lets Local Users Deny Service February 25, 2013 - 12:12am Addthis PROBLEM: Linux Kernel Extended Verification Module Bug Lets Local Users Deny Service PLATFORM: The Linux Kernel prior to 3.7.5 ABSTRACT: A vulnerability was reported in the Linux Kernel. REFERENCE LINKS: The Linux Kernel Archives Linux Kernel Red Hat Bugzilla - Bug 913266 SecurityTracker Alert ID: 1028196 CVE-2013-0313 IMPACT ASSESSMENT: Medium DISCUSSION: A local user can exploit a null pointer dereference in the evm_update_evmxattr() function in 'security/integrity/evm/evm_crypto.c' to cause the target system to crash. IMPACT: A local user can cause denial of service conditions.

99

U-068:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated 8:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated Privileges U-068:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated Privileges December 23, 2011 - 8:45am Addthis PROBLEM: Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated Privileges PLATFORM: Red Hat Enterprise Linux Desktop (v. 6) Red Hat Enterprise Linux HPC Node (v. 6) Red Hat Enterprise Linux Server (v. 6) Red Hat Enterprise Linux Server AUS (v. 6.2) Red Hat Enterprise Linux Server EUS (v. 6.2.z) Red Hat Enterprise Linux Workstation (v. 6) ABSTRACT: A local privileged user on the guest operating system can obtain elevated privileges on the target system. reference LINKS: Red Hat kernel security and bug fix update SecurityTracker Alert ID: 1026453 SecurityTracker Alert ID: 1026454

100

T-700:Red Hat: kernel security, bug fix, and enhancement update |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

700:Red Hat: kernel security, bug fix, and enhancement update 700:Red Hat: kernel security, bug fix, and enhancement update T-700:Red Hat: kernel security, bug fix, and enhancement update August 24, 2011 - 3:45pm Addthis PROBLEM: Updated kernel packages that fix several security issues, various bugs, and add two enhancements are now available for Red Hat Enterprise Linux 6. PLATFORM: Red Hat Enterprise Linux Desktop (v. 6) Red Hat Enterprise Linux HPC Node (v. 6) Red Hat Enterprise Linux Server (v. 6) Red Hat Enterprise Linux Server EUS (v. 6.1.z) Red Hat Enterprise Linux Workstation (v. 6) ABSTRACT: Red Hat: kernel security, bug fix, and enhancement update. reference LINKS: RHSA-2011: 1189-1 Secunia Advisory: SA45746 Red Hat Download CVE-2011-1182 , CVE-2011-1576 CVE-2011-1593 , CVE-2011-1776 CVE-2011-1898 , CVE-2011-2183

Note: This page contains sample records for the topic "rsa envision bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

V-040: Apache Tomcat Bug Lets Remote Users Bypass Security Constraints |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Apache Tomcat Bug Lets Remote Users Bypass Security 0: Apache Tomcat Bug Lets Remote Users Bypass Security Constraints V-040: Apache Tomcat Bug Lets Remote Users Bypass Security Constraints December 5, 2012 - 1:00am Addthis PROBLEM: Apache Tomcat Bug Lets Remote Users Bypass Security Constraints PLATFORM: Version(s): 6.0.0 - 6.0.35, 7.0.0 - 7.0.29 ABSTRACT: A vulnerability was reported in Apache Tomcat. REFERENCE LINKS: Apache Tomcat Red Hat Bugzilla - Bug 883634 SecurityTracker Alert ID: 1027833 CVE-2012-3546 IMPACT ASSESSMENT: High DISCUSSION: When using FORM authentication it was possible to bypass the security constraint checks in the FORM authenticator by appending /j_security_check to the end of the URL if some other component (such as the Single-Sign-On valve) had called request.setUserPrincipal() before the call to

102

U-210: Linux Kernel epoll_ctl() Bug Lets Local Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

10: Linux Kernel epoll_ctl() Bug Lets Local Users Deny Service 10: Linux Kernel epoll_ctl() Bug Lets Local Users Deny Service U-210: Linux Kernel epoll_ctl() Bug Lets Local Users Deny Service July 11, 2012 - 7:00am Addthis PROBLEM: Linux Kernel epoll_ctl() Bug Lets Local Users Deny Service PLATFORM: Version(s): 2.6.x ABSTRACT: A vulnerability was reported in the Linux Kernel. A local user can cause denial of service conditions. reference LINKS: The Vendor's Advisory SecurityTracker Alert ID: 1027237 SecurityTracker Alert ID: 1027240 Red Hat advisory CVE-2012-3375 IMPACT ASSESSMENT: Medium Discussion: The Linux kernel's Event Poll (epoll) subsystem does not properly handle resource clean up when an ELOOP error code is returned. A local user can exploit this to cause the target system to crash. Impact: A local user can cause the target system to crash.

103

U-008: Symantec Data Loss Prevention Bugs in KeyView Filter Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

08: Symantec Data Loss Prevention Bugs in KeyView Filter Lets 08: Symantec Data Loss Prevention Bugs in KeyView Filter Lets Remote Users Deny Service U-008: Symantec Data Loss Prevention Bugs in KeyView Filter Lets Remote Users Deny Service October 11, 2011 - 8:00am Addthis PROBLEM: Symantec Data Loss Prevention Bugs in KeyView Filter Lets Remote Users Deny Service PLATFORM: Symantec Data Loss Prevention Enforce/Detection Servers for Windows 10.x, 11.x ABSTRACT: A remote user can create a file that, when processed by the target filter, will cause partial denial of service conditions. reference LINKS: Symantec Security Advisory SYM11-013 SecurityTracker Alert ID: 1026157 IMPACT ASSESSMENT: Medium Discussion: Multiple vulnerabilities were reported in Symantec Data Loss Prevention. A remote user can cause denial of service conditions on the target system.A

104

U-217: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Red Hat Certificate System Bugs Let Remote Users Conduct 7: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site Scripting and Denial of Service Attacks U-217: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site Scripting and Denial of Service Attacks July 20, 2012 - 7:00am Addthis PROBLEM: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site Scripting and Denial of Service Attacks PLATFORM: Red Hat Certificate System v8 ABSTRACT: Two vulnerabilities were reported in Red Hat Certificate System. A remote user can conduct cross-site scripting attacks. A remote authenticated user can revoke the CA certificate. reference LINKS: Advisory: RHSA-2012:1103-1 SecurityTracker Alert ID: 1027284 CVE-2012-2662 CVE-2012-3367 IMPACT ASSESSMENT: Medium Discussion: The Agent and End Entity pages do not properly filter HTML code from

105

U-168: EMC Documentum Information Rights Management Server Bugs Let Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

168: EMC Documentum Information Rights Management Server Bugs Let 168: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service U-168: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service May 14, 2012 - 7:00am Addthis PROBLEM: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service PLATFORM: Information Rights Management Server 4.x, 5.x ABSTRACT: Two vulnerabilities were reported in EMC Documentum Information Rights Management Server. A remote authenticated user can cause denial of service conditions. Reference links: SecurityTracker Alert ID: 1027058 CVE-2012-2276 CVE-2012-2277 IMPACT ASSESSMENT: High Discussion: A remote authenticated user can send specially crafted data to trigger a NULL pointer dereference and cause the target service to crash. A remote

106

U-130: JBoss Operations Network LDAP Authentication Bug Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: JBoss Operations Network LDAP Authentication Bug Lets Remote 0: JBoss Operations Network LDAP Authentication Bug Lets Remote Users Bypass Authentication U-130: JBoss Operations Network LDAP Authentication Bug Lets Remote Users Bypass Authentication March 21, 2012 - 7:00am Addthis PROBLEM: JBoss Operations Network LDAP Authentication Bug Lets Remote Users Bypass Authentication PLATFORM: JBoss Operations Network 2.x ABSTRACT: A vulnerability was reported in JBoss Operations Network. A remote user can login with an arbitrary password in certain cases. reference LINKS: SecurityTracker Alert ID: 1026826 Secunia Advisory SA48471 CVE-2012-1100 IMPACT ASSESSMENT: Medium Discussion: The vulnerability is caused due to an error within the Lightweight Directory Access Protocol (LDAP) authentication when handling invalid bind account credentials, which can be exploited to log-in to LDAP-based

107

V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

10: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 10: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code March 13, 2013 - 12:04am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): 1.6.602.171 and prior for Windows/Mac; other versions on other platforms ABSTRACT: Several vulnerabilities were reported in Adobe Flash Player. REFERENCE LINKS: Adobe Vulnerability identifier: APSB13-09 SecurityTracker Alert ID: 1028277 CVE-2013-0646 CVE-2013-0650 CVE-2013-1371 CVE-2013-1375 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user.

108

U-074: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Microsoft .NET Bugs Let Remote Users Execute Arbitrary 4: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users U-074: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users January 4, 2012 - 8:00am Addthis PROBLEM: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users . PLATFORM: Windows XP Service Pack 3 Windows XP Professional x64 Edition Service Pack 2 Windows Server 2003 Service Pack 2 Windows Server 2003 x64 Edition Service Pack 2 Windows Server 2003 with SP2 for Itanium-based Systems Windows Vista Service Pack 2 Windows Vista x64 Edition Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 Windows Server 2008 for x64-based Systems Service Pack 2

109

U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain 9: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication May 1, 2012 - 7:00am Addthis PROBLEM: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication PLATFORM: Red Hat Enterprise MRG v2 for Red Hat Enterprise Linux (version 6) ABSTRACT: A vulnerability was reported in Red Hat Enterprise MRG Messaging. A remote user can access cluster messages and view the internal configuration. reference LINKS: SecurityTracker Alert ID: 1026990 CVE-2011-3620 Red Hat advisory IMPACT ASSESSMENT: High Discussion: Qpid may accept arbitrary passwords and SASL mechanims. A remote user on the local private interconnect network with knowledge of a valid cluster

110

V-016: HP Performance Insight Bugs with Sybase Database Let Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: HP Performance Insight Bugs with Sybase Database Let Remote 6: HP Performance Insight Bugs with Sybase Database Let Remote Users Deny Service and Take Full Control of the Target System V-016: HP Performance Insight Bugs with Sybase Database Let Remote Users Deny Service and Take Full Control of the Target System November 5, 2012 - 6:00am Addthis PROBLEM: HP Performance Insight Bugs with Sybase Database Let Remote Users Deny Service and Take Full Control of the Target System PLATFORM: HP Performance Insight v5.31, v5.40 and v5.41 running on HP-UX, Solaris, Linux, and Windows and using Sybase as the database ABSTRACT: Two vulnerabilities were reported in HP Performance Insight. REFERENCE LINKS: HP Support Document ID: c03555488 SecurityTracker Alert ID: 1027719 CVE-2012-3269 CVE-2012-3270 IMPACT ASSESSMENT: High DISCUSSION:

111

U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

57: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny 57: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service September 12, 2012 - 6:00am Addthis PROBLEM: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service PLATFORM: ColdFusion 10, 9.0.2, 9.0.1, 9.0, 8.0.1, and 8.0 for Windows, Macintosh and UNIX ABSTRACT: Adobe ColdFusion is prone to a remote denial-of-service vulnerability. reference LINKS: Adobe Security bulletins and advisories Adobe Vulnerability identifier: APSB12-21 SecurityTracker Alert ID: 1027516 Bugtraq ID: 55499 CVE-2012-2048 IMPACT ASSESSMENT: Medium Discussion: Adobe has released a security hotfix for ColdFusion 10 and earlier versions for Windows, Macintosh and UNIX. This update resolves a vulnerability which

112

V-146: HP Service Manager Bugs Permit Cross-Site Scripting and Information  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: HP Service Manager Bugs Permit Cross-Site Scripting and 6: HP Service Manager Bugs Permit Cross-Site Scripting and Information Disclosure Attacks V-146: HP Service Manager Bugs Permit Cross-Site Scripting and Information Disclosure Attacks May 1, 2013 - 12:43am Addthis PROBLEM: HP Service Manager Bugs Permit Cross-Site Scripting and Information Disclosure Attacks PLATFORM: Service Manager v9.31 Web Tier ABSTRACT: Two vulnerabilities were reported in HP Service Manager REFERENCE LINKS: HP Document ID: c03748875 SecurityTracker Alert ID: 1028496 CVE-2012-5222 CVE-2013-2321 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can obtain potentially sensitive information [CVE-2012-5222]. Service Manager Web Tier does not properly filter HTML code from user-supplied input before displaying the input [CVE-2013-2321]. A remote

113

U-079: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

79: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute 79: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code U-079: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code January 11, 2012 - 8:00am Addthis PROBLEM: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code. PLATFORM: Adobe Acrobat/Reader Version(s): 9.x prior to 9.5, 10.x prior to 10.1.2 ABSTRACT: A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026496 Adobe Security Bulletin APSB12-01 CVE-2011-2462, CVE-2011-4369, CVE-2011-4370, CVE-2011-4371, CVE-2011-4372, CVE-2011-4373. IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in Adobe Acrobat/Reader. A remote

114

U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

21: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, 21: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information March 9, 2012 - 7:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information PLATFORM: Apple iOS Version(s): prior to 5.1 ABSTRACT: Multiple vulnerabilities were reported in Apple iOS. reference LINKS: SecurityTracker Alert ID: 1026774 Apple Security Updates About the security content of iOS 5.1 Software Update CVE-2012-0641, CVE-2012-0642, CVE-2012-0643, CVE-2011-3453, CVE-2012-0644,

115

U-233: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote 3: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote Authenticated Users Gain Elevated Privileges U-233: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote Authenticated Users Gain Elevated Privileges August 13, 2012 - 7:00am Addthis PROBLEM: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote Authenticated Users Gain Elevated Privileges PLATFORM: Oracle Database Server versions 10.2.0.3, 10.2.0.4, 10.2.0.5, 11.1.0.7, 11.2.0.2, 11.2.0.3 ABSTRACT: A remote authenticated user with 'Create Table' privileges can gain 'SYS' privileges on the target system. Reference LINKS: Oracle Security Alert Oracle Security Alert - CVE-2012-3132 Risk Matrices SecurityTracker Alert ID: 1027367 CVE-2012-3132 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Oracle Database. This vulnerability is not

116

U-026: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Cisco Small Business SRP500 Series Bug Lets Remote Users 6: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject Commands U-026: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject Commands November 3, 2011 - 8:15am Addthis PROBLEM: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject Commands. PLATFORM: The following models are affected when running firmware prior to version 1.1.24: Cisco SRP521W Cisco SRP526W Cisco SRP527W The following models are affected when running firmware prior to version 1.2.1: Cisco SRP541W Cisco SRP546W Cisco SRP547W ABSTRACT: A remote user can create a URL that, when loaded by the target authenticated administrative user, will execute arbitrary commands on the target system. reference LINKS: Advisory ID: cisco-sa-20111102-srp500 SecurityTracker Alert ID: 1026266

117

U-155: WebCalendar Access Control and File Inclusion Bugs Let Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: WebCalendar Access Control and File Inclusion Bugs Let 5: WebCalendar Access Control and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code U-155: WebCalendar Access Control and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code April 25, 2012 - 7:00am Addthis PROBLEM: WebCalendar Access Control and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code PLATFORM: 1.2.4 and prior versions ABSTRACT: Two vulnerabilities were reported in WebCalendar. A remote user may be able to execute arbitrary PHP code on the target system. reference links: SecurityTracker Alert ID: 1026966 CVE-2012-1495 CVE-2012-1496 IMPACT ASSESSMENT: Medium Discussion: A remote user can access '/install/index.php' to potentially modify '/includes/settings/' with arbitrary values or PHP code. A remote

118

T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3:Adobe Flash Player Multiple Bugs Let Remote Users Obtain 3:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code September 22, 2011 - 8:00am Addthis PROBLEM: Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code. PLATFORM: Adobe Flash Player 10.3.183.7 and earlier versions for Windows, Macintosh, Linux and Solaris. Adobe Flash Player 10.3.186.6 and earlier versions for Android. ABSTRACT: An attacker can exploit this issue by enticing an unsuspecting victim into visiting a malicious website. reference LINKS: Adobe Security Bulletin

119

V-037: Wireshark Multiple Bugs Let Remote Users Deny Service | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Wireshark Multiple Bugs Let Remote Users Deny Service 7: Wireshark Multiple Bugs Let Remote Users Deny Service V-037: Wireshark Multiple Bugs Let Remote Users Deny Service November 30, 2012 - 3:30am Addthis PROBLEM: Wireshark Multiple Bugs Let Remote Users Deny Service PLATFORM: Version(s): prior to 1.6.12, 1.8.4 ABSTRACT: Several vulnerabilities were reported in Wireshark. REFERENCE LINKS: Wireshark Security Advisories Secunia Advisory SA51422 Seclists SecurityTracker Alert ID: 1027822 CVE-2012-5592 CVE-2012-5593 CVE-2012-5594 CVE-2012-5595 CVE-2012-5596 CVE-2012-5597 CVE-2012-5598 CVE-2012-5599 CVE-2012-5600 CVE-2012-5601 CVE-2012-5602 IMPACT ASSESSMENT: Medium DISCUSSION: Several vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions. A user can obtain potentially sensitive information.

120

U-163: PHP Command Parameter Bug Lets Remote Users Obtain Potentially  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: PHP Command Parameter Bug Lets Remote Users Obtain 3: PHP Command Parameter Bug Lets Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code U-163: PHP Command Parameter Bug Lets Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code May 7, 2012 - 7:00am Addthis PROBLEM: PHP Command Parameter Bug Lets Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code PLATFORM: Prior to 5.3.12 and 5.4.2 ABSTRACT: A vulnerability was reported in PHP. A remote user can obtain potentially sensitive information. A remote user can execute arbitrary code on the target system. reference LINKS: SecurityTracker Alert ID: 1027022 CVE-2012-1823 CVE-2012-2311 IMPACT ASSESSMENT: High Discussion: A remote user can submit a specially crafted request containing a command

Note: This page contains sample records for the topic "rsa envision bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Apple Safari Bugs Let Remote Users Execute Arbitrary Code 1: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks June 5, 2013 - 1:05am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks PLATFORM: Apple Safari prior to 6.0.5 ABSTRACT: Several vulnerabilities were reported in Apple Safari. REFERENCE LINKS: Apple Article: HT5785 SecurityTracker Alert ID: 1028627 CVE-2013-0926 CVE-2013-1009 CVE-2013-1012 CVE-2013-1013 CVE-2013-1023 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary

122

U-076: OpenSSL Bugs Let Remote Users Deny Service, Obtain Information, and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

76: OpenSSL Bugs Let Remote Users Deny Service, Obtain 76: OpenSSL Bugs Let Remote Users Deny Service, Obtain Information, and Potentially Execute Arbitrary Code U-076: OpenSSL Bugs Let Remote Users Deny Service, Obtain Information, and Potentially Execute Arbitrary Code January 6, 2012 - 8:15am Addthis PROBLEM: OpenSSL Bugs Let Remote Users Deny Service, Obtain Information, and Potentially Execute Arbitrary Code PLATFORM: OpenSSL prior to 0.9.8s; 1.x prior to 1.0.0f ABSTRACT: A remote user may be able to execute arbitrary code on the target system. reference LINKS: SecurityTracker Alert ID: 1026485 OpenSSL Security Advisory IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in OpenSSL. A remote user can cause denial of service conditions. A remote user can obtain sensitive information. A remote user may be able to execute arbitrary code on the

123

V-135: Cisco ASA Multiple Bugs Let Remote Users Deny Service | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Cisco ASA Multiple Bugs Let Remote Users Deny Service 5: Cisco ASA Multiple Bugs Let Remote Users Deny Service V-135: Cisco ASA Multiple Bugs Let Remote Users Deny Service April 16, 2013 - 12:21am Addthis PROBLEM: Cisco ASA Multiple Bugs Let Remote Users Deny Service PLATFORM: Cisco ASA Software for Cisco ASA 5500 Series Adaptive Security Appliances, Cisco ASA Services Module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers, and Cisco ASA 1000V Cloud Firewall are affected by multiple vulnerabilities. Affected versions of Cisco ASA Software will vary depending on the specific vulnerability. ABSTRACT: Several vulnerabilities were reported in Cisco ASA. REFERENCE LINKS: Cisco Security Advisory Secunia Advisory SA52989 SecurityTracker Alert ID: 1028415 CVE-2013-1149 CVE-2013-1150 CVE-2013-1151 CVE-2013-1152

124

V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site 0: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information April 23, 2013 - 12:26am Addthis PROBLEM: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information PLATFORM: Apache ActiveMQ versions prior to 5.8.0 ABSTRACT: Several vulnerabilities were reported in Apache ActiveMQ. REFERENCE LINKS: Apache ActiveMQ SecurityTracker Alert ID: 1028457 CVE-2012-6092 CVE-2012-6551 CVE-2013-3060 IMPACT ASSESSMENT: High DISCUSSION: Several web demos do not properly filter HTML code from user-supplied input

125

T-589: Citrix XenApp and Citrix Presentation Server Bug | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Citrix XenApp and Citrix Presentation Server Bug 9: Citrix XenApp and Citrix Presentation Server Bug T-589: Citrix XenApp and Citrix Presentation Server Bug March 28, 2011 - 3:05pm Addthis PROBLEM: Citrix XenApp and Citrix Presentation Server Bug in ActiveSync Lets Remote Users Execute Arbitrary Code. PLATFORM: Citrix XenApp Presentation versions 4.5, 5 ABSTRACT: A vulnerability was reported in Citrix XenApp (Presentation Server). A remote user can execute arbitrary code on the target system. -------------------------------------------------------------------------------- LINKS: DOE-CIRC BULLETIN: http://www.doecirc.energy.gov/bulletins/t-589.shtml OTHER LINKS: Citrix Document: CTX128366 SecurityTracker Alert ID: 1025254 Citrix Support Technical Support Downloads --------------------------------------------------------------------------------

126

U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny 7: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service September 12, 2012 - 6:00am Addthis PROBLEM: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service PLATFORM: ColdFusion 10, 9.0.2, 9.0.1, 9.0, 8.0.1, and 8.0 for Windows, Macintosh and UNIX ABSTRACT: Adobe ColdFusion is prone to a remote denial-of-service vulnerability. reference LINKS: Adobe Security bulletins and advisories Adobe Vulnerability identifier: APSB12-21 SecurityTracker Alert ID: 1027516 Bugtraq ID: 55499 CVE-2012-2048 IMPACT ASSESSMENT: Medium Discussion: Adobe has released a security hotfix for ColdFusion 10 and earlier versions for Windows, Macintosh and UNIX. This update resolves a vulnerability which

127

V-046: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

46: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 46: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code V-046: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code December 13, 2012 - 3:30am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): 11.5.502.110 and prior for Windows/Mac; 11.2.202.251 and prior for Linux ABSTRACT: Several vulnerabilities were reported in Adobe Flash Player. REFERENCE LINKS: Adobe Vulnerability identifier: APSB12-27 SecurityTracker Alert ID: 1027854 Secunia Advisory SA51560 RHSA-2012:1569-1 CVE-2012-5676 CVE-2012-5677 CVE-2012-5678 IMPACT ASSESSMENT: High DISCUSSION: A buffer overflow can trigger code execution [CVE-2012-5676]. An integer overflow can trigger code execution [CVE-2012-5677]. A memory corruption flaw can trigger code execution [CVE-2012-5678].

128

V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote  

NLE Websites -- All DOE Office Websites (Extended Search)

71: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets 71: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service January 17, 2013 - 12:00am Addthis PROBLEM: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service PLATFORM: The vulnerability is reported in versions 8.7.1 and 8.7.1.1. ABSTRACT: A vulnerability has been reported in Cisco ASA 1000V Cloud Firewall REFERENCE LINKS: Cisco Advisory ID: cisco-sa-20130116-asa1000v SecurityTracker Alert ID: 1028005 Secunia Advisory SA51897 CVE-2012-5419 IMPACT ASSESSMENT: Medium DISCUSSION: A vulnerability has been reported in Cisco ASA 1000V Cloud Firewall, which can be exploited by malicious people to cause a DoS (Denial of Service).

129

T-708:Pidgin Bugs Let Remote Users Deny Service and Potentially Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

T-708:Pidgin Bugs Let Remote Users Deny Service and Potentially T-708:Pidgin Bugs Let Remote Users Deny Service and Potentially Execute Arbitrary Code T-708:Pidgin Bugs Let Remote Users Deny Service and Potentially Execute Arbitrary Code September 1, 2011 - 12:00pm Addthis PROBLEM: gtkutils.c in Pidgin before 2.10.0 on Windows allows user-assisted remote attackers to execute arbitrary programs via a file: URL in a message. PLATFORM: Pidgin before 2.10.0 on Windows ABSTRACT: Pidgin bugs let remote users deny service and potentially execute arbitrary code. reference LINKS: CVE-2011-3185 CVE-2011-2943 CVE-2011-3184 SecurityTracker Alert ID: 1025961 Pidgin Security Advisories IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in Pidgin. A remote user can cause denial of service conditions. A remote user can cause arbitrary code to be

130

U-047: Siemens Automation License Manager Bugs Let Remote Users Deny  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Siemens Automation License Manager Bugs Let Remote Users 7: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code November 29, 2011 - 9:00am Addthis PROBLEM: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code. PLATFORM: Siemens Automation License Manager 500.0.122.1 ABSTRACT: Several vulnerabilities were reported in Siemens Automation License Manager. reference LINKS: SecurityTracker Alert ID: 1026354 Bugtraq Siemens Advisory Services IMPACT ASSESSMENT: Medium Discussion: A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions. A remote user can send specially crafted *_licensekey commands to trigger a

131

T-667: Red Hat Enterprise Linux kernel security and bug fix update |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Red Hat Enterprise Linux kernel security and bug fix update 7: Red Hat Enterprise Linux kernel security and bug fix update T-667: Red Hat Enterprise Linux kernel security and bug fix update July 13, 2011 - 7:24am Addthis PROBLEM: Red Hat Enterprise Linux kernel security and bug fix update PLATFORM: Vulnerable Linux Kernels; Red Hat Enterprise Linux Desktop (v. 6), Red Hat Enterprise Linux HPC Node (v. 6), Red Hat Enterprise Linux Server (v. 6), Red Hat Enterprise Linux Server EUS (v. 6.1.z), Red Hat Enterprise Linux Workstation (v. 6) ABSTRACT: It was found that the receive hook in the ipip_init() function in the ipip module, and in the ipgre_init() function in the ip_gre module, could be called before network namespaces setup is complete. If packets were received at the time the ipip or ip_gre module was still being loaded into

132

U-075: Apache Struts Bug Lets Remote Users Overwrite Files and Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

075: Apache Struts Bug Lets Remote Users Overwrite Files and 075: Apache Struts Bug Lets Remote Users Overwrite Files and Execute Arbitrary Code U-075: Apache Struts Bug Lets Remote Users Overwrite Files and Execute Arbitrary Code January 5, 2012 - 8:15am Addthis PROBLEM: Apache Struts Bug Lets Remote Users Overwrite Files and Execute Arbitrary Code PLATFORM: Version(s): 2.1.0 - 2.3.1 ABSTRACT: A remote user can execute arbitrary Java code on the target system. reference LINKS: SecurityTracker Alert ID: 1026484 Secunia Advisory SA47393 Bugtraq ID: 51257 Apache Struts 2 Documentation S2-008 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Apache Struts. A remote user can execute arbitrary Java code on the target system. A remote user can overwrite arbitrary files on the target system. A remote user can send specially

133

V-030: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

30: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny 30: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service V-030: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service November 21, 2012 - 3:00am Addthis PROBLEM: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service PLATFORM: ColdFusion 10 Update 1 and above for Windows ABSTRACT: Adobe ColdFusion Denial of Service Vulnerability REFERENCE LINKS: Adobe Vulnerability identifier: APSB12-25 SecurityTracker Alert ID: 1027787 Secunia Advisory SA51335 CVE-2012-5674 IMPACT ASSESSMENT: High DISCUSSION: A vulnerability was reported in Adobe ColdFusion. A remote user can cause denial of service conditions. A remote user can send specially crafted data to cause unspecified denial of service conditions on the target ColdFusion service on Windows Internet

134

V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Mozilla Firefox 'window.location' Bugs Permit Cross-Site 2: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code October 29, 2012 - 6:00am Addthis PROBLEM: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code PLATFORM: Firefox, Thunderbird, SeaMonkey ABSTRACT: Three vulnerabilities were reported in Mozilla Firefox. REFERENCE LINKS: Mozilla Foundation Security Advisory 2012-90 SecurityTracker Alert ID: 1027701 SecurityTracker Alert ID: 1027702 Advisory: RHSA-2012:1407-1 CVE-2012-4194 CVE-2012-4195 CVE-2012-4196 IMPACT ASSESSMENT: High DISCUSSION: A remote user can exploit the valueOf() method of window.location to, in

135

U-045: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny Service  

NLE Websites -- All DOE Office Websites (Extended Search)

5: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny 5: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny Service U-045: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny Service November 25, 2011 - 9:00am Addthis PROBLEM: A vulnerability was reported in the Windows Kernel. A local user can cause denial of service conditions. PLATFORM: Windows Win32k.sys ABSTRACT: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny reference LINKS: SecurityTracker Alert ID: 1026347 Secunia ID: SA46919 IMPACT ASSESSMENT: Low Discussion: A vulnerability has been discovered in Microsoft Windows, which can be exploited by malicious, local users to cause a DoS (Denial of Service). The vulnerability is caused due to an indexing error in the win32k.sys driver when loading a keyboard layout file. This can be exploited to access

136

V-091: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary 1: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary Code V-091: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary Code February 14, 2013 - 12:22am Addthis PROBLEM: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary Code PLATFORM: Adobe Reader XI (11.0.01 and earlier) for Windows and Macintosh Adobe Reader X (10.1.5 and earlier) for Windows and Macintosh Adobe Reader 9.5.3 and earlier 9.x versions for Windows and Macintosh Adobe Acrobat XI (11.0.01 and earlier) for Windows and Macintosh Adobe Acrobat X (10.1.5 and earlier) for Windows and Macintosh Adobe Acrobat 9.5.3 and earlier 9.x versions for Windows and Macintosh ABSTRACT: Adobe has identified critical vulnerabilities in Adobe Reader and Acrobat REFERENCE LINKS: Adobe Reader and Acrobat Vulnerability Report

137

V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code 3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code March 18, 2013 - 1:53am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 6.0.3 ABSTRACT: Two vulnerabilities were reported in Apple Safari. REFERENCE LINKS: Apple security update, Article: HT1222 SecurityTracker Alert ID: 1028292 CVE-2013-0960 CVE-2013-0961 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. IMPACT: A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

138

T-563: Red Hat Directory Server Bugs Let Local Users Gain Elevated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Red Hat Directory Server Bugs Let Local Users Gain Elevated 3: Red Hat Directory Server Bugs Let Local Users Gain Elevated Privileges and Remote and Local Users Deny Service T-563: Red Hat Directory Server Bugs Let Local Users Gain Elevated Privileges and Remote and Local Users Deny Service February 23, 2011 - 7:00am Addthis PROBLEM: Red Hat Directory Server Bugs Let Local Users Gain Elevated Privileges and Remote and Local Users Deny Service. PLATFORM: Red Hat Directory Server v8 EL4, Red Hat Directory Server v8 EL5 ABSTRACT: Several vulnerabilities were reported in Red Hat Directory Server. A local user can obtain elevated privileges on the target system. A remote user can cause denial of service conditions. A local user can cause denial of service conditions. A remote user can send multiple simple paged search requests to cause the

139

U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, 2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information July 27, 2012 - 7:00am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information PLATFORM: Version(s):Apple Safari prior to 6.0 ABSTRACT: Multiple vulnerabilities were reported in Apple Safari. reference LINKS: The Vendor's Advisory Bugtraq ID: 54683 SecurityTracker Alert ID: 1027307 IMPACT ASSESSMENT:

140

U-053: Linux kexec Bugs Let Local and Remote Users Obtain Potentially  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

53: Linux kexec Bugs Let Local and Remote Users Obtain 53: Linux kexec Bugs Let Local and Remote Users Obtain Potentially Sensitive Information U-053: Linux kexec Bugs Let Local and Remote Users Obtain Potentially Sensitive Information December 7, 2011 - 7:30am Addthis PROBLEM: Linux kexec Bugs Let Local and Remote Users Obtain Potentially Sensitive Information . PLATFORM: Red Hat Enterprise Linux Desktop (v. 6) Red Hat Enterprise Linux HPC Node (v. 6) Red Hat Enterprise Linux Server (v. 6) Red Hat Enterprise Linux Workstation (v. 6) ABSTRACT: Several vulnerabilities were reported in Linux kexec. A remote or local user can obtain potentially sensitive information. reference LINKS: Red Hat Security Advisory: RHSA-2011:1532-3 SecurityTracker Alert ID: 1026375 IMPACT ASSESSMENT: Medium Discussion: Kdump uses the SSH "StrictHostKeyChecking=no" option when dumping to SSH

Note: This page contains sample records for the topic "rsa envision bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

U-208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary 208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code U-208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code July 10, 2012 - 7:00am Addthis PROBLEM: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code PLATFORM: HP Operations Agent for AIX, HP-UX, Linux, Solaris, and Windows prior to v11.03.12. ABSTRACT: Two vulnerabilities were reported in HP Operations Agent. A remote user can execute arbitrary code on the target system reference LINKS: The Vendor's Advisory SecurityTracker Alert ID: 1027225 CVE-2012-2019 CVE-2012-2020 IMPACT ASSESSMENT: High Discussion: Potential security vulnerabilities have been identified with HP Operations Agent for AIX, HP-UX, Linux, Solaris, and Windows. The vulnerabilities could be remotely exploited resulting in the execution of arbitrary code.

142

U-072:Apache Tomcat Hash Table Collision Bug Lets Remote Users Deny Service  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

72:Apache Tomcat Hash Table Collision Bug Lets Remote Users Deny 72:Apache Tomcat Hash Table Collision Bug Lets Remote Users Deny Service U-072:Apache Tomcat Hash Table Collision Bug Lets Remote Users Deny Service December 30, 2011 - 9:15am Addthis PROBLEM: Apache Tomcat Hash Table Collision Bug Lets Remote Users Deny Service PLATFORM: apache Tomcat 5.5.34, 6.0.34, 7.0.22; and prior versions aBSTRACT: A remote user can cause performance to degrade on the target server. reference LINKS: Apache Tomcat Security Alert SecurityTracker Alert ID: 1026477 nruns Advisory SA-2011.004 Secunia Advisory SA47411 CVE-2011-4084 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Apache Tomcat. A remote user can cause denial of service conditions. A remote user can send specially crafted POST request values to trigger hash collisions and cause significant performance

143

T-538: HP OpenView Storage Data Protector Bug Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

T-538: HP OpenView Storage Data Protector Bug Lets Remote Users T-538: HP OpenView Storage Data Protector Bug Lets Remote Users Execute Arbitrary Code T-538: HP OpenView Storage Data Protector Bug Lets Remote Users Execute Arbitrary Code January 20, 2011 - 6:39am Addthis PROBLEM: HP OpenView Storage Data Protector Bug Lets Remote Users Execute Arbitrary Code. PLATFORM: HP OpenView Storage Data Protector v6.11 ABSTRACT: A vulnerability was reported in HP OpenView Storage Data Protector. A remote user can execute arbitrary code on the target system. reference LINKS: HP Security Bulletin SecurityTracker Alert ID: 1024983 CVE-2011-0273 IMPACT ASSESSMENT: High Discussion: A potential security vulnerability has been identified with HP OpenView Storage Data Protector. The vulnerability could be remotely exploited to execute arbitrary code.

144

U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Cisco Firewall Services Module Bugs Let Remote Users Execute 9: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service October 11, 2012 - 6:00am Addthis PROBLEM: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service PLATFORM: Version(s): prior to 4.1(9) ABSTRACT: Several vulnerabilities were reported in Cisco Firewall Services Module. reference LINKS: Cisco Advisory ID: cisco-sa-20121010-fwsm SecurityTracker Alert ID: 1027640 CVE-2012-4661 CVE-2012-4662 CVE-2012-4663 IMPACT ASSESSMENT: High Discussion: A remote user can send specially crafted DCERPC data through the target device to trigger a stack overflow in the DCERPC inspection engine and execute arbitrary code on the target device or cause the target device to

145

U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

42: HP Onboard Administrator Bugs Let Remote Users Gain Access, 42: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks April 6, 2012 - 7:00am Addthis PROBLEM: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks PLATFORM: HP Onboard Administrator (OA) up to and including v3.32 ABSTRACT: A remote user can obtain potentially sensitive information. reference LINKS: HP Support Document ID: c03263573 SecurityTracker Alert ID: 1026889 CVE-2012-0128, CVE-2012-0129, CVE-2012-0130 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in HP Onboard Administrator. A remote

146

V-189: Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users Deny  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users 9: Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users Deny Service on the Target Host V-189: Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users Deny Service on the Target Host July 1, 2013 - 12:48am Addthis PROBLEM: Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users Deny Service on the Target Host PLATFORM: VirtualBox 4.2.12 ABSTRACT: A vulnerability was reported in Oracle VirtualBox. REFERENCE LINKS: VirtualBox ticket: 11863 SecurityTracker Alert ID: 1028712 IMPACT ASSESSMENT: Medium DISCUSSION: A local user on the guest operating system can issue a 'tracepath' command to cause the network on the target host system to become unavailable. IMPACT: A local user on a guest operating system can cause denial of service conditions on the target host system.

147

U-137: HP Performance Manager Unspecified Bug Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: HP Performance Manager Unspecified Bug Lets Remote Users 7: HP Performance Manager Unspecified Bug Lets Remote Users Execute Arbitrary Codes U-137: HP Performance Manager Unspecified Bug Lets Remote Users Execute Arbitrary Codes March 30, 2012 - 9:15am Addthis PROBLEM: HP Performance Manager Unspecified Bug Lets Remote Users Execute Arbitrary Codes PLATFORM: HP-UX B.11.31 HP-UX B.11.23 ABSTRACT: A remote user can execute arbitrary code on the target system. REFERENCE LINKS: HP Support Document ID: c03255321 SecurityTracker Alert ID: 1026869 CVE-2012-0127 IMPACT ASSESSMENT: High Discussion: A potential security vulnerability has been identified with HP Performance Manager running on HP-UX, Linux, Solaris, and Windows. The vulnerability could be exploited remotely to execute arbitrary code and to create a Denial of Service (DoS).

148

V-063: Adobe ColdFusion Bugs Let Remote Users Gain Access and Obtain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Adobe ColdFusion Bugs Let Remote Users Gain Access and 3: Adobe ColdFusion Bugs Let Remote Users Gain Access and Obtain Information V-063: Adobe ColdFusion Bugs Let Remote Users Gain Access and Obtain Information January 7, 2013 - 1:00am Addthis PROBLEM: Adobe ColdFusion Bugs Let Remote Users Gain Access and Obtain Information PLATFORM: ColdFusion 10, 9.0.2, 9.0.1 and 9.0 for Windows, Macintosh and UNIX ABSTRACT: Adobe has identified three vulnerabilities affecting ColdFusion for Windows, Macintosh and UNIX REFERENCE LINKS: Adobe Security Bulletin APSA13-01 SecurityTracker Alert ID: 1027938 CVE-2013-0625 CVE-2013-0629 CVE-2013-0631 IMPACT ASSESSMENT: High DISCUSSION: A remote user can bypass authentication and take control of the target system [CVE-2013-0625]. Systems with password protection disabled or with no password set are affected.

149

U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: HP Onboard Administrator Bugs Let Remote Users Gain Access, 2: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks April 6, 2012 - 7:00am Addthis PROBLEM: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks PLATFORM: HP Onboard Administrator (OA) up to and including v3.32 ABSTRACT: A remote user can obtain potentially sensitive information. reference LINKS: HP Support Document ID: c03263573 SecurityTracker Alert ID: 1026889 CVE-2012-0128, CVE-2012-0129, CVE-2012-0130 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in HP Onboard Administrator. A remote

150

U-052: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: HP Protect Tools Device Access Manager Unspecified Bug Lets 2: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code U-052: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code December 6, 2011 - 7:00am Addthis PROBLEM: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code. PLATFORM: HP Protect Tools Device Access Manager for Windows earlier than v.6.1.0.1 running on the following HP PCs: HP EliteBook 2560p Notebook PC HP EliteBook 2760p Notebook PC HP EliteBook 8460p Notebook PC HP EliteBook 8460w Mobile Workstation HP EliteBook 8560p Notebook PC HP EliteBook 8560w Mobile Workstation HP EliteBook 8760w Mobile Workstation HP ProBook 4230s Notebook PC

151

U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Cisco IOS Intrusion Prevention System DNS Processing Bug 9: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service September 27, 2012 - 4:07am Addthis PROBLEM: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service PLATFORM: Devices configured with Cisco IOS IPS are affected ABSTRACT: A vulnerability was reported in Cisco IOS. reference LINKS: SecurityTracker Alert ID: 1027580 Cisco Security Advisory CVE-2012-3950 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Cisco IOS. A remote user can cause denial of service conditions. A remote user can send specially crafted (but legitimate) DNS packets through the target device to cause the device to

152

U-203: HP Photosmart Bug Lets Remote Users Deny Service | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

03: HP Photosmart Bug Lets Remote Users Deny Service 03: HP Photosmart Bug Lets Remote Users Deny Service U-203: HP Photosmart Bug Lets Remote Users Deny Service July 2, 2012 - 8:00am Addthis PROBLEM: HP Photosmart Bug Lets Remote Users Deny Service PLATFORM: HP Photosmart Wireless e-All-in-One Printer series - B110 HP Photosmart e-All-in-One Printer series - D110 HP Photosmart Plus e-All-in-One Printer series - B210 HP Photosmart eStation All-in-One Printer series - C510 HP Photosmart Ink Advantage e-All-in-One Printer series - K510 HP Photosmart Premium Fax e-All-in-One Printer series - C410 ABSTRACT: A vulnerability was reported in HP Photosmart. A remote user can cause denial of service conditions. Reference LINKS: The Vendor's Advisory SecurityTracker Alert ID: 1027213 CVE-2012-2017 IMPACT ASSESSMENT: High Discussion:

153

U-231: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

31: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service 31: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service U-231: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service August 9, 2012 - 7:00am Addthis PROBLEM: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service PLATFORM: Version(s): ASA 5500 Series; 8.2 - 8.4 ABSTRACT: Two vulnerabilities were reported in Cisco ASA. A remote or remote authenticated user can cause denial of service conditions. reference LINKS: Release Notes for the Cisco ASA 5500 Series, 8.4(x) SecurityTracker Alert ID: 1027355 CVE-2012-2472 CVE-2012-2474 IMPACT ASSESSMENT: Medium Discussion: Two vulnerabilities were reported in Cisco ASA. 1. On systems with SIP inspection enabled, a remote user can send specially crafted SIP traffic to cause the target device to create many identical

154

U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, 2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information July 27, 2012 - 7:00am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information PLATFORM: Version(s):Apple Safari prior to 6.0 ABSTRACT: Multiple vulnerabilities were reported in Apple Safari. reference LINKS: The Vendor's Advisory Bugtraq ID: 54683 SecurityTracker Alert ID: 1027307 IMPACT ASSESSMENT:

155

V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site 0: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information April 23, 2013 - 12:26am Addthis PROBLEM: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information PLATFORM: Apache ActiveMQ versions prior to 5.8.0 ABSTRACT: Several vulnerabilities were reported in Apache ActiveMQ. REFERENCE LINKS: Apache ActiveMQ SecurityTracker Alert ID: 1028457 CVE-2012-6092 CVE-2012-6551 CVE-2013-3060 IMPACT ASSESSMENT: High DISCUSSION: Several web demos do not properly filter HTML code from user-supplied input

156

U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

41: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 41: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information August 22, 2012 - 7:00am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information PLATFORM: Adobe Flash Player 11.3.300.271 and earlier versions for Windows, Macintosh and Linux operating systems Adobe Flash Player 11.1.115.11 and earlier versions for Android 4.x Adobe Flash Player 11.1.111.10 and earlier versions for Android 3.x and 2.x Adobe AIR 3.3.0.3670 and earlier versions for Windows and Macintosh Adobe AIR 3.3.0.3690 SDK (includes AIR for iOS) and earlier versions Adobe AIR 3.3.0.3650 and earlier versions for Android ABSTRACT:

157

T-712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement  

NLE Websites -- All DOE Office Websites (Extended Search)

712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and 712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update T-712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update September 8, 2011 - 10:30am Addthis PROBLEM: A flaw was discovered in Cumin where it would log broker authentication credentials to the Cumin log file. A vulnerability was reported in Red Hat Enterprise MRG Grid. A local user can access the broker password. PLATFORM: Red Hat Enterprise MRG v2 for Red Hat Enterprise Linux (version 5) ABSTRACT: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update. reference LINKS: RHSA-2011:1249-1 SecurityTracker Alert ID: 1026021 CVE-2011-2925 IMPACT ASSESSMENT: Medium Discussion: A local user exploiting this flaw could connect to the broker outside of Cumin's control and perform certain operations such as scheduling jobs,

158

T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users 7: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass Authentication or Obtain Information T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass Authentication or Obtain Information August 31, 2011 - 12:00pm Addthis PROBLEM: A vulnerability was reported in Apache Tomcat. A remote user can bypass authentication or obtain potentially sensitive information. PLATFORM: Apache Tomcat 5.5.0 to 5.5.33, 6.0.0 to 6.0.33, 7.0.0 to 7.0.20 ABSTRACT: Apache Tomcat AJP protocol processing bug lets remote users bypass authentication or obtain information. reference LINKS: SecurityTracker Alert ID: 1025993 CVE-2011-3190 (under review) Apache Tomcat Security Updates IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Apache Tomcat. A remote user can bypass

159

T-589: Citrix XenApp and Citrix Presentation Server Bug | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

89: Citrix XenApp and Citrix Presentation Server Bug 89: Citrix XenApp and Citrix Presentation Server Bug T-589: Citrix XenApp and Citrix Presentation Server Bug March 28, 2011 - 3:05pm Addthis PROBLEM: Citrix XenApp and Citrix Presentation Server Bug in ActiveSync Lets Remote Users Execute Arbitrary Code. PLATFORM: Citrix XenApp Presentation versions 4.5, 5 ABSTRACT: A vulnerability was reported in Citrix XenApp (Presentation Server). A remote user can execute arbitrary code on the target system. -------------------------------------------------------------------------------- LINKS: DOE-CIRC BULLETIN: http://www.doecirc.energy.gov/bulletins/t-589.shtml OTHER LINKS: Citrix Document: CTX128366 SecurityTracker Alert ID: 1025254 Citrix Support Technical Support Downloads --------------------------------------------------------------------------------

160

U-055: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 5: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code U-055: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code December 8, 2011 - 8:30am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code . PLATFORM: Adobe Flash Player 11.1.102.55 on Windows and Mac OS X and prior versions ABSTRACT: Two vulnerabilities exploited by the Intevydis vd_adobe_fp module in VulnDisco Step Ahead were reported in Adobe Flash Player. reference LINKS: Secunia Advisory: SA47161 SecurityTracker Alert ID: 1026392 CVE-2011-4693 CVE-2011-4694 IMPACT ASSESSMENT: High Discussion: A remote or local user can obtain potentially sensitive information. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a specially crafted SWF file that, when

Note: This page contains sample records for the topic "rsa envision bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

U-025: HP OpenView Network Node Manager Bugs Let Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-025: HP OpenView Network Node Manager Bugs Let Remote Users U-025: HP OpenView Network Node Manager Bugs Let Remote Users Execute Arbitrary Code U-025: HP OpenView Network Node Manager Bugs Let Remote Users Execute Arbitrary Code November 2, 2011 - 8:00am Addthis PROBLEM: HP OpenView Network Node Manager Bugs Let Remote Users Execute Arbitrary Code. PLATFORM: HP OpenView Network Node Manager (OV NNM) v7.51, v7.53 running on HP-UX, Linux, Solaris, and Windows ABSTRACT: A remote user can execute arbitrary code on the target system. reference LINKS: HP Support Center Document ID: c03054052 SecurityTracker Alert ID: 1026260 CVE-2011-1365 CVE-2011-1366 CVE-2011-1367 IMPACT ASSESSMENT: Medium Discussion: Several vulnerabilities were reported in HP OpenView Network Node Manager. A remote user can execute arbitrary code on the target system.

162

U-052: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: HP Protect Tools Device Access Manager Unspecified Bug Lets 2: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code U-052: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code December 6, 2011 - 7:00am Addthis PROBLEM: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code. PLATFORM: HP Protect Tools Device Access Manager for Windows earlier than v.6.1.0.1 running on the following HP PCs: HP EliteBook 2560p Notebook PC HP EliteBook 2760p Notebook PC HP EliteBook 8460p Notebook PC HP EliteBook 8460w Mobile Workstation HP EliteBook 8560p Notebook PC HP EliteBook 8560w Mobile Workstation HP EliteBook 8760w Mobile Workstation HP ProBook 4230s Notebook PC

163

U-071:HP Database Archiving Software Bugs Let Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1:HP Database Archiving Software Bugs Let Remote Users Execute 1:HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code U-071:HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code December 29, 2011 - 8:15am Addthis PROBLEM: HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code PLATFORM: HP Database Archiving Software v6.31 ABSTRACT: A remote user can execute arbitrary code on the target system. reference LINKS: HP Database Document ID: c03128302 SecurityTracker Alert ID: 1026467 CVE-2011-4163 CVE-2011-4164 CVE-2011-4165 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in HP Database Archiving Software. A remote user can execute arbitrary code on the target system. Impact: A remote user can execute arbitrary code on the target system. Solution:

164

V-015: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, 5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information V-015: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information November 2, 2012 - 6:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information PLATFORM: Apple iOS prior to 6.0.1 ABSTRACT: Three vulnerabilities were reported in Apple iOS. REFERENCE LINKS: Apple Article: HT5567 SecurityTracker Alert ID: 1027716 Bugtraq ID: 56363 CVE-2012-3748 CVE-2012-3749 CVE-2012-3750 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the

165

U-118: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

18: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 18: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information U-118: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information March 6, 2012 - 7:00am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information PLATFORM: Adobe Flash Player 10.x, Adobe Flash Player 11.x ABSTRACT: Two vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can obtain potentially information. reference LINKS: Secunia Advisory SA48281 CVE-2012-0769 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will trigger a memory corruption error in Matrix3D and execute

166

V-078: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: WordPress Bugs Permit Cross-Site Scripting and Port Scanning 8: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks V-078: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks January 28, 2013 - 12:32am Addthis PROBLEM: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks PLATFORM: WordPress all versions are affected prior to 3.5.1 ABSTRACT: WordPress 3.5.1 Maintenance and Security Release REFERENCE LINKS: WordPress News SecurityTracker Alert ID: 1028045 Secunia Advisory SA51967 IMPACT ASSESSMENT: Medium DISCUSSION: Several scripts do not properly filter HTML code from user-supplied input before displaying the input. A remote user can cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the site running the WordPress software and will run in the security

167

T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Let Remote Users Conduct Cross-Site Request Forgery Attacks and Execute Arbitrary Code T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request Forgery Attacks...

168

U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Users Deny Service and Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users...

169

U-265: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

information. Solution: The vendor has issued a fix. Addthis Related Articles U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting...

170

V-146: HP Service Manager Bugs Permit Cross-Site Scripting and...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

the update from The HP Software Support Online (SSO). Addthis Related Articles V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting...

171

V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-255: Apache Wicket Input Validation Flaw Permits Cross-Site Scripting Attacks U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting...

172

V-149: Microsoft Internet Explorer Object Access Bug Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Microsoft Internet Explorer Object Access Bug Lets Remote 9: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code V-149: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code May 6, 2013 - 12:07am Addthis PROBLEM: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code PLATFORM: Internet Explorer 8 ABSTRACT: A vulnerability was reported in Microsoft Internet Explorer. REFERENCE LINKS: SecurityTracker Alert ID: 1028514 Microsoft Security Advisory (2847140) CVE-2013-1347 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will access and object that has been deleted or not properly allocated and execute arbitrary code on the target system. The code will run with the privileges of the target user.

173

U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Cisco IOS Intrusion Prevention System DNS Processing Bug 9: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service September 27, 2012 - 4:07am Addthis PROBLEM: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service PLATFORM: Devices configured with Cisco IOS IPS are affected ABSTRACT: A vulnerability was reported in Cisco IOS. reference LINKS: SecurityTracker Alert ID: 1027580 Cisco Security Advisory CVE-2012-3950 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Cisco IOS. A remote user can cause denial of service conditions. A remote user can send specially crafted (but legitimate) DNS packets through the target device to cause the device to

174

V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code 3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code March 18, 2013 - 1:53am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 6.0.3 ABSTRACT: Two vulnerabilities were reported in Apple Safari. REFERENCE LINKS: Apple security update, Article: HT1222 SecurityTracker Alert ID: 1028292 CVE-2013-0960 CVE-2013-0961 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. IMPACT: A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

175

V-160: Wireshark Multiple Bugs Let Remote Users Deny Service | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

60: Wireshark Multiple Bugs Let Remote Users Deny Service 60: Wireshark Multiple Bugs Let Remote Users Deny Service V-160: Wireshark Multiple Bugs Let Remote Users Deny Service May 21, 2013 - 12:09am Addthis PROBLEM: Wireshark Multiple Bugs Let Remote Users Deny Service PLATFORM: Versions 1.8.0 to 1.8.6 ABSTRACT: Multiple vulnerabilities have been reported in Wireshark REFERENCE LINKS: Wireshark Docid: wnpa-sec-2013-23 Secunia Advisory SA53425 SecurityTracker Alert ID: 1028582 CVE-2013-2486 CVE-2013-2487 IMPACT ASSESSMENT: Medium DISCUSSION: Multiple vulnerabilities have been reported in Wireshark, which can be exploited by malicious people to cause a DoS (Denial of Service). 1) An error in the RELOAD dissector (dissectors/packet-reload.c) can be exploited to trigger infinite loops and consume CPU resources via specially

176

U-005: Apache mod_proxy Pattern Matching Bug Lets Remote Users Access  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apache mod_proxy Pattern Matching Bug Lets Remote Users 5: Apache mod_proxy Pattern Matching Bug Lets Remote Users Access Internal Servers U-005: Apache mod_proxy Pattern Matching Bug Lets Remote Users Access Internal Servers October 6, 2011 - 9:30am Addthis PROBLEM: Apache mod_proxy Pattern Matching Bug Lets Remote Users Access Internal Servers. PLATFORM: Apache HTTP Server 1.3.x, 2.2.21 and prior versions ABSTRACT: A remote user can access internal servers. reference LINKS: The Apache HTTP Server Project SecurityTracker Alert ID: 1026144 CVE-2011-3368 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Apache mod_proxy. A remote user can access internal servers. When this system is configured in reverse proxy mode and uses the RewriteRule or ProxyPassMatch directives with a pattern match, a remote user can send a specially crafted request to access internal

177

V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Mozilla Firefox 'window.location' Bugs Permit Cross-Site 2: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code October 29, 2012 - 6:00am Addthis PROBLEM: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code PLATFORM: Firefox, Thunderbird, SeaMonkey ABSTRACT: Three vulnerabilities were reported in Mozilla Firefox. REFERENCE LINKS: Mozilla Foundation Security Advisory 2012-90 SecurityTracker Alert ID: 1027701 SecurityTracker Alert ID: 1027702 Advisory: RHSA-2012:1407-1 CVE-2012-4194 CVE-2012-4195 CVE-2012-4196 IMPACT ASSESSMENT: High DISCUSSION: A remote user can exploit the valueOf() method of window.location to, in

178

V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 0: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code March 13, 2013 - 12:04am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): 1.6.602.171 and prior for Windows/Mac; other versions on other platforms ABSTRACT: Several vulnerabilities were reported in Adobe Flash Player. REFERENCE LINKS: Adobe Vulnerability identifier: APSB13-09 SecurityTracker Alert ID: 1028277 CVE-2013-0646 CVE-2013-0650 CVE-2013-1371 CVE-2013-1375 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user.

179

U-012: BlackBerry Enterprise Server Collaboration Service Bug Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

12: BlackBerry Enterprise Server Collaboration Service Bug Lets 12: BlackBerry Enterprise Server Collaboration Service Bug Lets Remote Users Impersonate Intra-organization Messages U-012: BlackBerry Enterprise Server Collaboration Service Bug Lets Remote Users Impersonate Intra-organization Messages October 17, 2011 - 9:45am Addthis PROBLEM: BlackBerry Enterprise Server Collaboration Service Bug Lets Remote Users Impersonate Intra-organization Messages. PLATFORM: Exchange and Domino 5.0.3 through 5.0.3 MR4 BlackBerry Client for use with Microsoft Office Communications Server 2007 R2 BlackBerry Client for use with Microsoft Lync Server 2010 ABSTRACT: A vulnerability was reported in BlackBerry Enterprise Server. A remote user can impersonate another messaging user within the same organization. reference LINKS: BlackBerry Security Advisory ID: KB28524

180

U-071:HP Database Archiving Software Bugs Let Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1:HP Database Archiving Software Bugs Let Remote Users Execute 1:HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code U-071:HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code December 29, 2011 - 8:15am Addthis PROBLEM: HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code PLATFORM: HP Database Archiving Software v6.31 ABSTRACT: A remote user can execute arbitrary code on the target system. reference LINKS: HP Database Document ID: c03128302 SecurityTracker Alert ID: 1026467 CVE-2011-4163 CVE-2011-4164 CVE-2011-4165 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in HP Database Archiving Software. A remote user can execute arbitrary code on the target system. Impact: A remote user can execute arbitrary code on the target system. Solution:

Note: This page contains sample records for the topic "rsa envision bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Species composition and seasonal abundance of stink bugs in cotton in the Lower Texas Gulf Coast and the virulence of Euschistus species to cotton  

E-Print Network (OSTI)

with the drop cloth. ........................................................................................................... 26 2.2. Distribution of most common pest stink bugs by county, 2004. ........................ 31 2.3. Distribution... Page 2.1. Mean number of stink bug species collected per six row-feet, by date. Lower Texas Gulf Coast region, 2004.............................................................. 30 2.2. Mean number of stink bug species...

Hopkins, Bradley Wayne

2006-04-12T23:59:59.000Z

182

Backup Generators (BUGS): The Next Smart Grid Peak Resource? | Open Energy  

Open Energy Info (EERE)

Backup Generators (BUGS): The Next Smart Grid Peak Resource? Backup Generators (BUGS): The Next Smart Grid Peak Resource? Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Backup Generators (BUGS): The Next Smart Grid Peak Resource? Focus Area: Crosscutting Topics: Potentials & Scenarios Website: www.netl.doe.gov/smartgrid/referenceshelf/articles/10-18-2010_BUGS%20a Equivalent URI: cleanenergysolutions.org/content/backup-generators-bugs-next-smart-gri Language: English Policies: "Deployment Programs,Financial Incentives,Regulations" is not in the list of possible values (Deployment Programs, Financial Incentives, Regulations) for this property. DeploymentPrograms: Demonstration & Implementation Regulations: "Resource Integration Planning,Energy Standards" is not in the list of possible values (Agriculture Efficiency Requirements, Appliance & Equipment Standards and Required Labeling, Audit Requirements, Building Certification, Building Codes, Cost Recovery/Allocation, Emissions Mitigation Scheme, Emissions Standards, Enabling Legislation, Energy Standards, Feebates, Feed-in Tariffs, Fuel Efficiency Standards, Incandescent Phase-Out, Mandates/Targets, Net Metering & Interconnection, Resource Integration Planning, Safety Standards, Upgrade Requirements, Utility/Electricity Service Costs) for this property.

183

The Insect's Christmas Podcast Welcome to Bug Bytes, a bimonthly podcast from Texas A&M University's  

E-Print Network (OSTI)

Bug Bytes The Insect's Christmas Podcast **Music Up Welcome to Bug Bytes, a bimonthly podcast from didn't cooperate under the bright film lights. So when they died, Starevitch decided to make them. Starevitch has inspired contemporary greats like Tim Burton and Henry Selick of Nightmare before Christmas

Behmer, Spencer T.

184

Queen of the Sun Transcript Welcome to Bug Bytes, a bimonthly podcast from Texas A&M University's  

E-Print Network (OSTI)

Bug Bytes Queen of the Sun Transcript **Music Up Welcome to Bug Bytes, a bimonthly podcast from beekeepers of the world. Why? We recently screened a documentary called Queen of the Sun. The film explores in the face of almost certain impending disaster. We were prepared for this, as we thought Queen of the Sun

Behmer, Spencer T.

185

Envisioning a Marine Biodiversity Observation Network Author(s): J. Emmett Duffy, Linda A. Amaral-Zettler, Daphne G. Fautin, Gustav Paulay,  

E-Print Network (OSTI)

Envisioning a Marine Biodiversity Observation Network Author(s): J. Emmett Duffy, Linda A. Amaral suggest that managing systems to maintain marine biodiversity may provide a way to resolve otherwise, and poorly coordinated. Why a marine biodiversity observation network, and why now? Developing a marine

Fautin, Daphne

186

U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated 2: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated Privileges, Inject SQL Commands, and Spoof Certificates U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated Privileges, Inject SQL Commands, and Spoof Certificates February 28, 2012 - 8:45am Addthis PROBLEM: A vulnerability was reported in PostgreSQL. PLATFORM: Version(s): prior to 8.3.18, 8.4.11, 9.0.7, 9.1.3 ABSTRACT: A remote authenticated user can gain elevated privileges. A remote authenticated user can inject SQL commands. A remote user can spoof connections in certain cases. reference LINKS: Vendor Advisory Security Tracker ID 1026744 CVE-2012-0866 IMPACT ASSESSMENT: Medium Discussion: For trigger functions marked SECURITY DEFINER, a remote authenticated user can execute a trigger function and gain elevated privileges CVE-2012-0866.

187

V-203: HP LoadRunner Multiple Bugs Let Remote Users Deny Service and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: HP LoadRunner Multiple Bugs Let Remote Users Deny Service 3: HP LoadRunner Multiple Bugs Let Remote Users Deny Service and Execute Arbitrary Code V-203: HP LoadRunner Multiple Bugs Let Remote Users Deny Service and Execute Arbitrary Code July 26, 2013 - 3:31am Addthis PROBLEM: A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions. PLATFORM: HP LoadRunner prior to 11.52 ABSTRACT: Multiple vulnerabilities were reported in HP LoadRunner. REFERENCE LINKS: Security Tracker Alert ID: 1028833 CVE-2013-2368 CVE-2013-2369 CVE-2013-2370 CVE-2013-4797 CVE-2013-4798 CVE-2013-4799 CVE-2013-4800 CVE-2013-4801 IMPACT ASSESSMENT: Medium DISCUSSION: Potential security vulnerabilities have been identified with HP LoadRunner. The vulnerabilities could be remotely exploited to allow execution of code

188

U-092: Sudo Format String Bug Lets Local Users Gain Elevated Privileges |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Sudo Format String Bug Lets Local Users Gain Elevated 2: Sudo Format String Bug Lets Local Users Gain Elevated Privileges U-092: Sudo Format String Bug Lets Local Users Gain Elevated Privileges January 31, 2012 - 5:45am Addthis PROBLEM: A vulnerability was reported in Sudo. A local user can obtain elevated privileges on the target system. PLATFORM: Linux (Any) Version(s): 1.8.0 - 1.8.3p1 ABSTRACT: A local user can supply a specially crafted command line argument to trigger a format string flaw and execute arbitrary commands on the target system with root privileges. reference LINKS: CVE-2012-0809 SecurityTracker Alert ID: 1026600 Vendor Site IMPACT ASSESSMENT: Medium Discussion: The vulnerability resides in the sudo_debug() function in 'src/sudo.c'. This can be exploited by local users, regardless of whether they are listed

189

V-128: Xen Event Channel Tracking Pointer Bug Local Privilege Escalation |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Xen Event Channel Tracking Pointer Bug Local Privilege 8: Xen Event Channel Tracking Pointer Bug Local Privilege Escalation V-128: Xen Event Channel Tracking Pointer Bug Local Privilege Escalation April 8, 2013 - 12:28am Addthis PLATFORM: Version(s): 3.2 and later ABSTRACT: A vulnerability was reported in Xen. REFERENCE LINKS: SecurityTracker Alert ID: 1028388 CVE-2013-1920 IMPACT ASSESSMENT: Medium DISCUSSION: A local user with kernel level privileges on the guest operating system can exploit a memory pointer error when the hypervisor is under memory pressure and Xen Security Module (XSM) is enabled to execute arbitrary code on the target host system IMPACT: A local user on the guest operating system can obtain elevated privileges on the target host system. SOLUTION: The vendor has issued a fix (xsa47-4.1.patch, xsa47-4.2-unstable.patch).

190

U-110: Samba Bug Lets Remote Users Execute Arbitrary Code | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Samba Bug Lets Remote Users Execute Arbitrary Code 0: Samba Bug Lets Remote Users Execute Arbitrary Code U-110: Samba Bug Lets Remote Users Execute Arbitrary Code February 24, 2012 - 7:30am Addthis PROBLEM: A vulnerability was reported in Samba. PLATFORM: Version(s): prior to 3.4.0 ABSTRACT: A remote user can send specially crafted data to the smbd service to trigger a flaw in chain_reply() and construct_reply() and execute arbitrary code on the target system. reference LINKS: Vendor Advisory Security Tracker ID 1026739 CVE-2012-0870 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Samba. A remote user can execute arbitrary code on the target system. A remote user can send specially crafted data to the smbd service to trigger a flaw in chain_reply() and construct_reply() and execute arbitrary code on the target system. The code will run with the

191

U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code June 6, 2012 - 7:00am Addthis PROBLEM: Multiple vulnerabilities were reported in Mozilla Firefox. PLATFORM: Version(s): prior to 13.0 ABSTRACT: A remote user can cause arbitrary code to be executed on the target user's system. A remote user can conduct cross-site scripting attacks. A remote user can obtain potentially sensitive information. Reference Links: Security Tracker ID 1027120 CVE-2012-0441,CVE-2012-1937 Vendor URL IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system [CVE-2012-1937 , CVE-2012-1938, CVE-2012-1939 ].

192

V-127: Samba Bug Lets Remote Authenticated Users Modify Files | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Samba Bug Lets Remote Authenticated Users Modify Files 7: Samba Bug Lets Remote Authenticated Users Modify Files V-127: Samba Bug Lets Remote Authenticated Users Modify Files April 5, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Samba. PLATFORM: The vulnerabilities are reported in version(s): 3.6.0 - 3.6.5 ABSTRACT: A remote authenticated user can modify files on the target share REFERENCE LINKS: SecurityTracker Alert ID: 1028389 Samba Security Announcement CVE-2013-0454 IMPACT ASSESSMENT: Medium DISCUSSION: A remote authenticated user can perform operations on the target CIFS export that are not permitted by the CIFS share access control settings. This may include writing to read-only shares. IMPACT: Modification of user information SOLUTION: Update to 3.6.6 and higher or apply the following patch Addthis

193

U-192 VMware Workstation/Player VM Remote Device Bug Lets Local or Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

VMware Workstation/Player VM Remote Device Bug Lets Local or VMware Workstation/Player VM Remote Device Bug Lets Local or Remote Users Deny Service U-192 VMware Workstation/Player VM Remote Device Bug Lets Local or Remote Users Deny Service June 15, 2012 - 7:00am Addthis PROBLEM: A vulnerability was reported in VMware Workstation/Player. PLATFORM: Version(s): Workstation 8.x, Player 4.x ABSTRACT: A local or remote user can cause denial of service conditions on the target virtual system. reference LINKS: Vendor Advisory Security Tracker ID 1027173 CVE-2012-3289 IMPACT ASSESSMENT: High Discussion: A user with the ability to modify communications data between a remote virtual device (e.g., CD-ROM, keyboard) located on a physically separate system and the target virtual machine can cause the target virtual machine to crash. Impact:

194

V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Cisco Wireless LAN Controller Bugs Let Remote Users Deny 6: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code January 24, 2013 - 6:00am Addthis PROBLEM: Several vulnerabilities were reported in Cisco Wireless LAN Controller. PLATFORM: The vulnerabilities are reported in: Cisco 2000 Series WLC Cisco 2100 Series WLC Cisco 2500 Series WLC Cisco 4100 Series WLC Cisco 4400 Series WLC Cisco 5500 Series WLC Cisco 7500 Series WLC Cisco 8500 Series WLC Cisco 500 Series Wireless Express Mobility Controllers Cisco Wireless Services Module (Cisco WiSM) Cisco Wireless Services Module version 2 (Cisco WiSM version 2)

195

U-096: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny 6: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny Service U-096: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny Service February 6, 2012 - 7:00am Addthis PROBLEM: Vulnerability in AIX TCP stack PLATFORM: Version(s): 5.3, 6.1, 7.1 ABSTRACT: A remote user can send a series of specially crafted TCP packets to trigger a kernel panic on the target system. reference LINKS: SecurityTracker Alert ID: 1026640 IBM Security Advisory CVE-2012-0194 IMPACT ASSESSMENT: Medium Discussion: AIX could allow a remote attacker to cause a denial of service, caused by an error when the TCP large send offload option is enabled on a network interface. By sending a specially-crafted sequence of packets, an attacker could exploit this vulnerability to cause a kernel panic.

196

V-077: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Barracuda SSL VPN Bug Lets Remote Users Bypass 7: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication V-077: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication January 25, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Barracuda SSL VPN. PLATFORM: The vulnerability has been verified to exist in Barracuda SSL VPN version 2.2.2.203 ABSTRACT: A remote user can gain administrative access to the target system. REFERENCE LINKS: SecurityTracker Alert ID: 1028039 Barracuda Networks Advisory IMPACT ASSESSMENT: High DISCUSSION: A remote user can set a specially crafted Java system property (via 'setSysProp.jsp') to bypass access restrictions and gain access to the API functionality. This can be exploited to download configuration files, download database dumps, shutdown the system, and set new administrative

197

T-654: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Apple QuickTime Multiple Bugs Let Remote Users Execute 4: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary T-654: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary June 24, 2011 - 4:39am Addthis PROBLEM: A vulnerability was reported in QuickTime. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Version(s): prior to QuickTime 7.6.8 ABSTRACT: A remote user can create a specially crafted file that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. reference LINKS: SecurityTracker Alert ID: 1025705 Apple Security Article: HT4339 Apple Security Article: HT4723 Apple Security Article: HT1222 CVE-2011-0213 Secunia Advisory: SA45054 IMPACT ASSESSMENT High Discussion:

198

V-202: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Cisco Video Surveillance Manager Bugs Let Remote Users 2: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain Potentially Sensitive Information V-202: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain Potentially Sensitive Information July 25, 2013 - 2:52am Addthis PROBLEM: A remote user can obtain potentially sensitive information and modify some configuration settings. A remote user can exploit this to create, modify, and remove camera feeds, archives, logs, and users. PLATFORM: Cisco Video Surveillance Manager 7.1, 7.5 ABSTRACT: Two vulnerabilities were reported in Cisco Video Surveillance Manager REFERENCE LINKS: Security Tracker Alert ID: 1028827 CVE-2013-3429 CVE-2013-3430 CVE-2013-3431 IMPACT ASSESSMENT: Medium DISCUSSION: The vulnerability is due to an access control error that occurred. The

199

T-647: PHP File Upload Bug May Let Remote Users Overwrite Files on the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: PHP File Upload Bug May Let Remote Users Overwrite Files on 7: PHP File Upload Bug May Let Remote Users Overwrite Files on the Target System T-647: PHP File Upload Bug May Let Remote Users Overwrite Files on the Target System June 15, 2011 - 3:45pm Addthis PROBLEM: A vulnerability was reported in PHP. A remote user may be able to overwrite files on the target system. PLATFORM: PHP prior to 5.3.7 ABSTRACT: PHP is prone to a security-bypass vulnerability.Successful exploits will allow an attacker to delete files from the root directory, which may aid in further attacks. PHP 5.3.6 is vulnerable; other versions may also be affected. reference LINKS: PHP Security Notice PHP CVE-2011-2202 SecurityTracker Alert ID: 1025659 Secunia Advisory: SA44874 CVE-2011-2202 IMPACT ASSESSMENT: High Discussion: The vulnerability lies in the 'SAPI_POST_HANDLER_FUNC()' function in

200

U-192: VMware Workstation/Player VM Remote Device Bug Lets Local or Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

92: VMware Workstation/Player VM Remote Device Bug Lets Local or 92: VMware Workstation/Player VM Remote Device Bug Lets Local or Remote Users Deny Service U-192: VMware Workstation/Player VM Remote Device Bug Lets Local or Remote Users Deny Service June 15, 2012 - 7:00am Addthis PROBLEM: A vulnerability was reported in VMware Workstation/Player. PLATFORM: Version(s): Workstation 8.x, Player 4.x aBSTRACT: A local or remote user can cause denial of service conditions on the target virtual system. reference LINKS: Vendor Advisory Security Tracker ID 1027173 CVE-2012-3289 IMPACT ASSESSMENT: High Discussion: A user with the ability to modify communications data between a remote virtual device (e.g., CD-ROM, keyboard) located on a physically separate system and the target virtual machine can cause the target virtual machine to crash.

Note: This page contains sample records for the topic "rsa envision bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

T-652: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and 2: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and Execute Arbitrary Code T-652: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and Execute Arbitrary Code June 22, 2011 - 2:55pm Addthis PROBLEM: Multiple vulnerabilities were reported in Mozilla Thunderbird. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can obtain cookies from another domain in certain cases. A remote user can create specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system [CVE-2011-2364, CVE-2011-2374, CVE-2011-2375, CVE-2011-2376]. The code will run with the privileges of the target user. PLATFORM: Mozilla Thunderbird prior to 3.1.11

202

V-183: Cisco TelePresence TC and TE Bugs Let Remote Users Deny Service and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Cisco TelePresence TC and TE Bugs Let Remote Users Deny 3: Cisco TelePresence TC and TE Bugs Let Remote Users Deny Service and Remote Adjacent Authenticated Users Gain Root Shell Access V-183: Cisco TelePresence TC and TE Bugs Let Remote Users Deny Service and Remote Adjacent Authenticated Users Gain Root Shell Access June 21, 2013 - 6:00am Addthis PROBLEM: Three vulnerabilities were reported in Cisco TelePresence TC and TE PLATFORM: The following product models are affected by the vulnerabilities: Cisco TelePresence MX Series Cisco TelePresence System EX Series Cisco TelePresence Integrator C Series Cisco TelePresence Profiles Series running Cisco TelePresence Quick Set Series Cisco IP Video Phone E20 ABSTRACT: Cisco TelePresence TC and TE Software contain two vulnerabilities in the implementation of the Session Initiation Protocol (SIP) that could allow an

203

U-201: HP System Management Homepage Bugs Let Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: HP System Management Homepage Bugs Let Remote Users Deny 1: HP System Management Homepage Bugs Let Remote Users Deny Service U-201: HP System Management Homepage Bugs Let Remote Users Deny Service June 28, 2012 - 7:00am Addthis PROBLEM: A vulnerability was reported in HP System Management Homepage. PLATFORM: Version(s): prior to 7.1.1 ABSTRACT: The vulnerabilities could be exploited remotely resulting in unauthorized access, disclosure of information, data modification, Denial of Service (DoS), and execution of arbitrary code. Reference links: Original Advisory Security Tracker ID 1027209 CVE-2012-2012, CVE-2012-2013, CVE-2012-2014 CVE-2012-2015, CVE-2012-2016 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in HP System Management Homepage. A remote authenticated user can gain elevated privileges. A remote authenticated

204

U-088: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary 8: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary Code U-088: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary Code January 25, 2012 - 6:00am Addthis PROBLEM: A remote user can execute arbitrary code on the target system. PLATFORM: Version(s): 12.5 SP3; pcAnywhere Solutions 7.1 GA, SP 1, and SP 2 ABSTRACT: Two vulnerabilities were reported in Symantec pcAnywhere. A remote user can execute arbitrary code on the target system. A local user can obtain elevated privileges on the target system. reference LINKS: Symantec Advisory Secunia Advisory SecurityTracker Alert ID:102576 IMPACT ASSESSMENT: Medium Discussion: A remote user can send specially crafted data to TCP port 5631 to trigger a but in the validation of authentication data and execute arbitrary code.

205

V-127: Samba Bug Lets Remote Authenticated Users Modify Files | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Samba Bug Lets Remote Authenticated Users Modify Files 7: Samba Bug Lets Remote Authenticated Users Modify Files V-127: Samba Bug Lets Remote Authenticated Users Modify Files April 5, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Samba. PLATFORM: The vulnerabilities are reported in version(s): 3.6.0 - 3.6.5 ABSTRACT: A remote authenticated user can modify files on the target share REFERENCE LINKS: SecurityTracker Alert ID: 1028389 Samba Security Announcement CVE-2013-0454 IMPACT ASSESSMENT: Medium DISCUSSION: A remote authenticated user can perform operations on the target CIFS export that are not permitted by the CIFS share access control settings. This may include writing to read-only shares. IMPACT: Modification of user information SOLUTION: Update to 3.6.6 and higher or apply the following patch Addthis

206

V-115: Apple iOS Bugs Let Local Users Gain Elevated Privileges | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apple iOS Bugs Let Local Users Gain Elevated Privileges 5: Apple iOS Bugs Let Local Users Gain Elevated Privileges V-115: Apple iOS Bugs Let Local Users Gain Elevated Privileges March 20, 2013 - 12:08am Addthis PROBLEM: Apple iOS Bugs Let Local Users Gain Elevated Privileges PLATFORM: Version(s): prior to 6.1.3 ABSTRACT: Several vulnerabilities were reported in Apple iOS REFERENCE LINKS: Apple security Article: HT1222 SecurityTracker Alert ID: 1028314 CVE-2013-0977 CVE-2013-0978 CVE-2013-0979 CVE-2013-0981 IMPACT ASSESSMENT: High DISCUSSION: A local user can exploit a flaw in the handling of Mach-O executable files with overlapping segments to execute unsigned code on the target system [CVE-2013-0977]. A local user can exploit a flaw in the ARM prefetch abort handling to determine the address of structures in the kernel [CVE-2013-0978].

207

U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Apple iOS Bugs Let Remote Users Execute Arbitrary Code 6: Apple iOS Bugs Let Remote Users Execute Arbitrary Code U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code November 15, 2011 - 8:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Obtain Information and Let Local Users Bypass Authentication. PLATFORM: iOS 3.0 through 5.0 for iPhone 3GS iPhone 4 and iPhone 4S iOS 3.1 through 5.0 for iPod touch (3rd generation) and later iOS 3.2 through 5.0 for iPad, iOS 4.3 through 5.0 for iPad 2 ABSTRACT: A remote user can create content that, when loaded by the target user, will execute arbitrary code on or obtain potentially sensitive information from the target user's system. reference LINKS: Apple Security Article: HT5052 Apple Product Security SecurityTracker Alert ID: 1026311 IMPACT ASSESSMENT:

208

U-211: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

11: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote 11: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories U-211: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories July 12, 2012 - 7:00am Addthis PROBLEM: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories PLATFORM: EMC Celerra Network Server versions 6.0.36.4 through 6.0.60.2 EMC VNX versions 7.0.12.0 through 7.0.53.1 EMC VNXe 2.0 (including SP1, SP2, and SP3) EMC VNXe MR1 (including SP1, SP2, SP3, and SP3.1) EMC VNXe MR2 (including SP0.1) ABSTRACT: A vulnerability was reported in EMC Celerra/VNX/VNXe. A remote authenticated user can access files and directories on the target file system. reference LINKS: The Vendor's Advisory

209

V-031: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote 1: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated Users Gain Elevated Privileges and Remote Users Deny Service V-031: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated Users Gain Elevated Privileges and Remote Users Deny Service November 22, 2012 - 3:00am Addthis PROBLEM: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated Users Gain Elevated Privileges and Remote Users Deny Service PLATFORM: Version(s): XC10 2.0.0.0 - 2.0.0.3, 2.1.0.0 - 2.1.0.2 ABSTRACT: Several vulnerabilities were reported in IBM WebSphere DataPower. REFERENCE LINKS: IBM Security Bulletin SecurityTracker Alert ID: 1027798 CVE-2012-5758 CVE-2012-5759 CVE-2012-5756 IMPACT ASSESSMENT: High DISCUSSION: Several vulnerabilities were reported in IBM WebSphere DataPower. A remote

210

V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to 1: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems April 24, 2013 - 1:06am Addthis PROBLEM: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems PLATFORM: HP ElitePad 900 with BIOS version vF.00 ABSTRACT: A vulnerability was reported in HP ElitePad 900 REFERENCE LINKS: HP Document ID: c03727435 SecurityTracker Alert ID: 1028461 CVE-2012-5218 IMPACT ASSESSMENT: Medium DISCUSSION: The BIOS secure boot feature of the BIOS may not be enabled. A local user may be able to bypass the secure boot feature and boot an alternate operating system. IMPACT: A local user can may be able to boot to an alternate operating system. SOLUTION:

211

U-119: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users 9: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute Arbitrary Code U-119: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute Arbitrary Code March 7, 2012 - 7:00am Addthis PROBLEM: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute Arbitrary Code PLATFORM: BlackBerry 6, BlackBerry 7, BlackBerry 7.1, and BlackBerry PlayBook tablet software ABSTRACT: A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026769 BlackBerry Security Notice Article ID: KB30152 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Blackberry PlayBook. A remote user can cause arbitrary code to be executed on the target user's system. A remote

212

V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to 1: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems April 24, 2013 - 1:06am Addthis PROBLEM: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems PLATFORM: HP ElitePad 900 with BIOS version vF.00 ABSTRACT: A vulnerability was reported in HP ElitePad 900 REFERENCE LINKS: HP Document ID: c03727435 SecurityTracker Alert ID: 1028461 CVE-2012-5218 IMPACT ASSESSMENT: Medium DISCUSSION: The BIOS secure boot feature of the BIOS may not be enabled. A local user may be able to bypass the secure boot feature and boot an alternate operating system. IMPACT: A local user can may be able to boot to an alternate operating system. SOLUTION:

213

U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and 5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs May 9, 2012 - 7:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs PLATFORM: prior to 5.1.1; iPhone 3GS, iPhone 4, iPhone 4S, iPod touch (3rd generation) and later, iPad, iPad 2 ABSTRACT: Two vulnerabilities were reported in Apple iOS. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can spoof the address bar URL. reference LINKS: SecurityTracker Alert ID: 1027028 CVE-2012-0672 CVE-2012-0674 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a specially crafted file that, when loaded by the

214

T-714:Wireshark OpenSafety and CSN.1 Dissector Bugs | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

714:Wireshark OpenSafety and CSN.1 Dissector Bugs 714:Wireshark OpenSafety and CSN.1 Dissector Bugs T-714:Wireshark OpenSafety and CSN.1 Dissector Bugs September 12, 2011 - 9:00am Addthis PROBLEM: Several vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions. PLATFORM: Version(s): 1.4.0 to 1.4.8, 1.6.0 to 1.6.1 ABSTRACT: Wireshark OpenSafety and CSN.1 Dissector Bugs Lets Remote Users Deny Service. reference LINKS: Wireshark 1.6.2 Release Notes Wireshark 1.4.9 Release Notes Docid: wnpa-sec-2011-12 Docid: wnpa-sec-2011-14 Docid: wnpa-sec-2011-15 Docid: wnpa-sec-2011-16 SecurityTracker Alert ID: 1026030 IMPACT ASSESSMENT: High Discussion: A remote user can cause arbitrary scripting code to be executed on the target user's system. A large loop in the OpenSafety dissector could cause a crash. A remote user

215

T-579: BlackBerry Device Software Bug in WebKit Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: BlackBerry Device Software Bug in WebKit Lets Remote Users 9: BlackBerry Device Software Bug in WebKit Lets Remote Users Execute Code T-579: BlackBerry Device Software Bug in WebKit Lets Remote Users Execute Code March 15, 2011 - 5:05pm Addthis PROBLEM: A vulnerability was reported in BlackBerry Device Software. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: BlackBerry Device Software version 6.0 and later. ABSTRACT: BlackBerry Device Software Bug in WebKit Lets Remote Users Execute Code. reference LINKS: BlackBerry Advisory: KB26132 CVE-2011-1290 BlackBerry Security Note BlackBerry Device Storage IMPACT ASSESSMENT: Moderate Discussion: A vulnerability exists in the open source WebKit browser engine provided in BlackBerry Device Software version 6.0 and later. The issue could result in

216

U-085: OpenSSL DTLS Bug Lets Remote Users Deny Service | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: OpenSSL DTLS Bug Lets Remote Users Deny Service 5: OpenSSL DTLS Bug Lets Remote Users Deny Service U-085: OpenSSL DTLS Bug Lets Remote Users Deny Service January 20, 2012 - 9:15am Addthis PROBLEM: OpenSSL DTLS Bug Lets Remote Users Deny Service PLATFORM: Only DTLS applications using OpenSSL 1.0.0f and 0.9.8s are affected. ABSTRACT: A flaw in the fix to CVE-2011-4108 can be exploited in a denial of service attack. REFERNCE LINKS: CVE-2012-0050 SecurityTracker Alert ID: 1026548 OpenSSL Security Advisory [18 Jan 2011] OpenSSL News IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in OpenSSL. The fix to correct the Datagram Transport Layer Security (DTLS) vulnerability referenced by CVE-2011-4108 introduced a flaw. A remote user can send specially crafted data to cause denial of service conditions on the target system.

217

V-029: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

29: Mozilla Firefox Multiple Bugs Let Remote Users Execute 29: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks V-029: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks November 21, 2012 - 2:00am Addthis PROBLEM: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks PLATFORM: Version(s): prior to 17.0 ABSTRACT: Multiple vulnerabilities were reported in Mozilla Firefox REFERENCE LINKS: Mozilla Foundation Security Advisories Bugtraq ID: 55260 SecurityTracker Alert ID: 1027791 CVE-2012-4201, CVE-2012-4202, CVE-2012-4203, CVE-2012-4204, CVE-2012-4205, CVE-2012-4206, CVE-2012-4207,CVE-2012-4208, CVE-2012-4209, CVE-2012-4210, CVE-2012-4212, CVE-2012-4213, CVE-2012-4214, CVE-2012-4215, CVE-2012-4216,

218

U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and 5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs May 9, 2012 - 7:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs PLATFORM: prior to 5.1.1; iPhone 3GS, iPhone 4, iPhone 4S, iPod touch (3rd generation) and later, iPad, iPad 2 ABSTRACT: Two vulnerabilities were reported in Apple iOS. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can spoof the address bar URL. reference LINKS: SecurityTracker Alert ID: 1027028 CVE-2012-0672 CVE-2012-0674 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a specially crafted file that, when loaded by the

219

Control of the chinch bug, Blissus leucopterous (say) on corn and grain sorghum  

E-Print Network (OSTI)

) ~ Painter et ~a. (19$$) azui SnellinS, azzi ~ (ling'p), ore mn~ ztuymoekeC bg other meieOLes an@ strains oF oem. 'tests moro ccn8uctcS Surinam lg6$-3. 966 to evaluate the toxicity cf s~2. imscotici@cs to thc chinch bug. both in the laboratory exxon...

Todd, Larry Leland

2012-06-07T23:59:59.000Z

220

Static Detection of API Error-Handling Bugs via Mining Source Code  

E-Print Network (OSTI)

Static Detection of API Error-Handling Bugs via Mining Source Code Mithun Acharya and Tao Xie}@csc.ncsu.edu Abstract Incorrect handling of errors incurred after API invoca- tions (in short, API errors) can lead to security and robust- ness problems, two primary threats to software reliability. Correct handling of API

Young, R. Michael

Note: This page contains sample records for the topic "rsa envision bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

T-718:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute 8:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code T-718:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code September 15, 2011 - 8:45am Addthis PROBLEM: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code. PLATFORM: Adobe Reader X (10.1) and earlier 10.x versions for Windows and Macintosh Adobe Reader 9.4.5 and earlier 9.x versions for Windows, Macintosh and UNIX Adobe Reader 8.3 and earlier 8.x versions for Windows and Macintosh Adobe Acrobat X (10.1) and earlier 10.x versions for Windows and Macintosh Adobe Acrobat 9.4.5 and earlier 9.x versions for Windows and Macintosh Adobe Acrobat 8.3 and earlier 8.x versions for Windows and Macintosh ABSTRACT: A remote user can create a file that, when loaded by the target user, will

222

U-176: Wireshark Multiple Bugs Let Remote Users Deny Service | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-176: Wireshark Multiple Bugs Let Remote Users Deny Service U-176: Wireshark Multiple Bugs Let Remote Users Deny Service U-176: Wireshark Multiple Bugs Let Remote Users Deny Service May 24, 2012 - 7:00am Addthis PROBLEM: Wireshark Multiple Bugs Let Remote Users Deny Service PLATFORM: 1.4.0 to 1.4.12, 1.6.0 to 1.6.7 ABSTRACT: Several vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions. Reference Links: SecurityTracker Alert ID: 1027094 CVE-2012-2392 CVE-2012-2393 CVE-2012-2394 IMPACT ASSESSMENT: Medium Discussion: A remote user can send specially crafted ANSI MAP, ASF, BACapp, Bluetooth HCI, IEEE 802.11, IEEE 802.3, LTP, and R3 data to cause Wireshark to hang or enter an infinite loop. A remote user can cause the DIAMETER dissector to crash. A remote user can trigger a memory error on SPARC or Itanium processors and

223

Microsoft Word - BUGS_The Next Smart Grid Peak Resource Final 4_19.docx  

NLE Websites -- All DOE Office Websites (Extended Search)

April 15, 2010 April 15, 2010 DOE/NETL-2010/1406 Backup Generators (BUGS): The Next Smart Grid Peak Resource Backup Generators (BUGS): The Next Smart Grid Peak Resource v1.0 ii DISCLAIMER This report was prepared as an account of work sponsored by an agency of the United States Government. Neither the United States Government nor any agency thereof, nor any of their employees, makes any warranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would not infringe privately owned rights. Reference therein to any specific commercial product, process, or service by trade name, trademark, manufacturer, or

224

T-633: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets 3: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets Remote Users Deny Service T-633: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets Remote Users Deny Service May 31, 2011 - 3:35pm Addthis PROBLEM: A vulnerability was reported in BIND. A remote user can cause denial of service conditions. PLATFORM: BIND Version(s): 9.4-ESV-R3 and later, 9.6-ESV-R2 and later, 9.6.3, 9.7.1 and later, 9.8.0 and later; prior to 9.4-ESV-R4-P1, 9.6-ESV-R4-P1, 9.7.3-P1, 9.8.0-P2 ABSTRACT: A remote DNS server can supply very large RRSIG RRsets in a negative response to trigger an off-by-one error in a buffer size check and cause the target requesting named process to crash. A remote user can cause named to crash. reference LINKS: SecurityTracker Alert ID: 1025575 SecurityTracker Alert ID: 1025572

225

V-210: HP LaserJet Pro Printer Bug Lets Remote Users Access Data |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

V-210: HP LaserJet Pro Printer Bug Lets Remote Users Access Data V-210: HP LaserJet Pro Printer Bug Lets Remote Users Access Data V-210: HP LaserJet Pro Printer Bug Lets Remote Users Access Data August 3, 2013 - 2:37am Addthis PROBLEM: A vulnerability was reported in HP Printers. A remote user can obtain potentially sensitive information. PLATFORM: HP LaserJet Pro products ABSTRACT: A potential security vulnerability has been identified with certain HP LaserJet Pro printers. The vulnerability could be exploited remotely to gain unauthorized access to data. REFERENCE LINKS: SecurityTracker Alert ID 1028869 CVE-2013-4807 Vendor URL IMPACT ASSESSMENT: Medium DISCUSSION: The following models are affected: HP LaserJet Pro P1102w CE657A/CE658A HP LaserJet Pro P1606dn CE749A HP LaserJet Pro M1212nf MFP CE841A HP LaserJet Pro M1213nf MFP CE845A

226

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

January 31, 2012 January 31, 2012 U-092: Sudo Format String Bug Lets Local Users Gain Elevated Privileges A local user can supply a specially crafted command line argument to trigger a format string flaw and execute arbitrary commands on the target system with root privileges. January 30, 2012 U-091: cURL Lets Remote Users Decrypt SSL/TLS Traffic A remote user can decrypt SSL/TLS sessions in certain cases January 27, 2012 U-090: RSA enVision Discloses Environment Variable Information to Remote Users A remote user can view potentially sensitive data on the target system. January 25, 2012 U-088: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary Code Two vulnerabilities were reported in Symantec pcAnywhere. A remote user can execute arbitrary code on the target system. A local user can obtain

227

U-265: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users 5: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain Information and Execute Arbitrary Code U-265: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain Information and Execute Arbitrary Code September 21, 2012 - 6:00am Addthis PROBLEM: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain Information and Execute Arbitrary Code PLATFORM: HP SiteScope v11.10, v11.11, v11.12 for Windows, Linux and Solaris ABSTRACT: A vulnerability was reported in HP SiteScope. reference LINKS: HP Security Bulletin Document ID: c03489683 SecurityTracker Alert ID: 1027547 CVE-2012-3259 CVE-2012-3260 CVE-2012-3261 CVE-2012-3262 CVE-2012-3263 CVE-2012-3264 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in HP SiteScope. A remote user can execute

228

U-232: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

32: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny 32: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the Host OS U-232: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the Host OS August 10, 2012 - 7:00am Addthis PROBLEM: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the Host OS PLATFORM: This vulnerability effects only Xen 4.0 and 4.1. Xen 3.4 and earlier and xen-unstable are not vulnerable. ABSTRACT: A vulnerability was reported in Xen. A local user on a guest operating system can cause denial of service conditions on the host. reference LINKS: Xen Security Announcements SecurityTracker Alert ID: 1027365 seclists.org CVE-2012-3433 IMPACT ASSESSMENT: Medium Discussion: An HVM guest is able to manipulate its physical address space such that tearing down the guest takes an extended period amount of time searching

229

U-029: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

29: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets Remote 29: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets Remote Users Gain Unauthorized Access U-029: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets Remote Users Gain Unauthorized Access November 8, 2011 - 8:00am Addthis PROBLEM: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets Remote Users Gain Unauthorized Access. PLATFORM: HP TCP/IP Services for OpenVMS v5.6 and v5.7 on iTanium and ALPHA Servers. ABSTRACT: A remote user can gain unauthorized access reference LINKS: HP Support document ID: c01908983 SecurityTracker Alert ID: 1026279 CVE-2011-3168 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in TCP/IP Services for OpenVMS. A remote user can gain unauthorized access. On systems running POP or IMAP servers, a remote user can gain unauthorized access.

230

U-232: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

32: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny 32: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the Host OS U-232: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the Host OS August 10, 2012 - 7:00am Addthis PROBLEM: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the Host OS PLATFORM: This vulnerability effects only Xen 4.0 and 4.1. Xen 3.4 and earlier and xen-unstable are not vulnerable. ABSTRACT: A vulnerability was reported in Xen. A local user on a guest operating system can cause denial of service conditions on the host. reference LINKS: Xen Security Announcements SecurityTracker Alert ID: 1027365 seclists.org CVE-2012-3433 IMPACT ASSESSMENT: Medium Discussion: An HVM guest is able to manipulate its physical address space such that tearing down the guest takes an extended period amount of time searching

231

U-265: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users 5: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain Information and Execute Arbitrary Code U-265: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain Information and Execute Arbitrary Code September 21, 2012 - 6:00am Addthis PROBLEM: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain Information and Execute Arbitrary Code PLATFORM: HP SiteScope v11.10, v11.11, v11.12 for Windows, Linux and Solaris ABSTRACT: A vulnerability was reported in HP SiteScope. reference LINKS: HP Security Bulletin Document ID: c03489683 SecurityTracker Alert ID: 1027547 CVE-2012-3259 CVE-2012-3260 CVE-2012-3261 CVE-2012-3262 CVE-2012-3263 CVE-2012-3264 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in HP SiteScope. A remote user can execute

232

Year of Biodiversity Podcast Welcome to Bug Bytes, a bimonthly podcast from Texas A&M University's  

E-Print Network (OSTI)

are affected. Biodiversity encompasses humans, plants, animals, fungi, bacteria, food, and water at the scale that we don't! Join us on this excursion as we learn from the bugs that share in every aspect of our lives the human element, the diversity of cultures and how we impact the world around us. How, in turn we

Behmer, Spencer T.

233

Acknowledgments: NASA Glenn Research Center (Grant #NNC04GB44G) College of Engineering Prof. Martin Abraham NASA envisions employing fuel cells running on jet fuel reformate for its uninhabited aerial vehicles (UAVs), low emission alternative power (LE  

E-Print Network (OSTI)

1 a Acknowledgments: · NASA Glenn Research Center (Grant #NNC04GB44G) · College of Engineering · Prof. Martin Abraham NASA envisions employing fuel cells running on jet fuel reformate for its is a critical path in the designing of jet fuel processors and their eventual utilization in powering NASA

Azad, Abdul-Majeed

234

Envision Solar | Open Energy Information  

Open Energy Info (EERE)

Solar Solar Address 4225 Executive Square Place San Diego, California Zip 92037 Sector Solar Product Developing designs for converting parking lots into PV systems Website http://www.envisionsolar.com/ Coordinates 32.8740074°, -117.2155849° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":32.8740074,"lon":-117.2155849,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

235

Bugs boost Cold War clean-up: Bacteria could scrub uranium from sites contaminated decades ago. updated at midnight GMTtoday is friday, november 14  

E-Print Network (OSTI)

in the study was contaminated by low levels of uranium from mining residue. The team hopes that the techniqueBugs boost Cold War clean-up: Bacteria could scrub uranium from sites contaminated decades ago boost Cold War clean-up Bacteria could scrub uranium from sites contaminated decades ago. 13 October

Lovley, Derek

236

Got the "Buy Local" bug? Here are some resources for you! From farmers markets to grocery stores to university cafeterias, more retailers are showcasing food  

E-Print Network (OSTI)

the feasibility of new marketing opportunities; expand capacity for locally and regionallygrown productsGot the "Buy Local" bug? Here are some resources for you! From farmers markets to grocery stores for local fresh markets. Interested producers should contact their local FSA office at www

Debinski, Diane M.

237

Solution Structure of Ptu1, a Toxin from the Assassin Bug Peirates turpis That Blocks the Voltage-Sensitive Calcium Channel N-Type  

Science Journals Connector (OSTI)

Ptu1 is a toxin from the assassin bug Peirates turpis which has been demonstrated to bind reversibly the N-type calcium channels and to have lower affinity than the ?-conotoxin MVIIA. We have determined the solution structure of Ptu1 by use of ...

Cdric Bernard; Gerardo Corzo; Amor Mosbah; Terumi Nakajima; Herv Darbon

2001-10-02T23:59:59.000Z

238

Does fundamental host range match ecological host range? A retrospective case study of a Lygus plant bug parasitoid  

Science Journals Connector (OSTI)

Using the retrospective case study of Peristenus digoneutis (Hymenoptera: Braconidae) introduced in the United States for biological control of native Lygus plant bugs (Hemiptera: Miridae), laboratory and field studies were conducted in the area of origin to evaluate whether the fundamental host range of P. digoneutis matches its ecological host range. Furthermore, it was determined whether these approaches would have been indicative of the post-introduction host range of P. digoneutis in North America [Day, W.H., 1999. Host preference of introduced and native parasites (Hymenoptera: Braconidae) of phytophagous plant bugs (Hemiptera: Miridae) in alfalfa-grass fields in the north-eastern USA, BioControl 44, 249261.]. Seven non-target mirid species were selected to define the fundamental host range of P. digoneutis in the area of origin in Europe. Laboratory choice and no-choice tests demonstrated that all selected non-target species were attacked by P. digoneutis and were largely suitable for parasitoid development. To confirm the validity of the fundamental host range, the ecological host range of P. digoneutis in the area of origin was investigated. Peristenus digoneutis was reared from 10 hosts, including three Lygus species and seven non-target hosts from the subfamily Mirinae. Despite the fact that laboratory tests demonstrated a high parasitism level in non-targets, ecological assessments in both North America (Day, 1999) and Europe suggest a much lower impact of P. digoneutis on non-target mirids, with low levels of parasitism (below 1% in Europe). Therefore, ecological host range studies in the area of origin provide useful supplementary data for interpreting pre-release laboratory host range testing.

T. Haye; H. Goulet; P.G. Mason; U. Kuhlmann

2005-01-01T23:59:59.000Z

239

Complete genome sequence of Coriobacterium glomerans type strain (PW2T) from the midgut of Pyrrhocoris apterus L. (red soldier bug)  

SciTech Connect

Coriobacterium glomerans Haas and Ko nig 1988, is the only species of the genus Coriobacterium, family Coriobacteriaceae, order Coriobacteriales, phylum Actinobacteria. The bacterium thrives as an endosymbiont of pyrrhocorid bugs, i.e. the red fire bug Pyrrhocoris apterus L. The rationale for sequencing the genome of strain PW2T is its endosymbiotic life style which is rare among members of Actinobacteria. Here we describe the features of this symbiont, together with the complete genome sequence and its annotation. This is the first complete genome sequence of a member of the genus Coriobacterium and the sixth member of the order Coriobacteriales for which complete genome sequences are now available. The 2,115,681 bp long single replicon genome with its 1,804 protein-coding and 54 RNA genes is part of the Genomic Encyclopedia of Bacteria and Archaea project.

Stackebrandt, Erko [DSMZ - German Collection of Microorganisms and Cell Cultures GmbH, Braunschweig, Germany; Zeytun, Ahmet [Los Alamos National Laboratory (LANL); Lapidus, Alla L. [U.S. Department of Energy, Joint Genome Institute; Nolan, Matt [U.S. Department of Energy, Joint Genome Institute; Lucas, Susan [U.S. Department of Energy, Joint Genome Institute; Hammon, Nancy [U.S. Department of Energy, Joint Genome Institute; Deshpande, Shweta [U.S. Department of Energy, Joint Genome Institute; Cheng, Jan-Fang [U.S. Department of Energy, Joint Genome Institute; Tapia, Roxanne [Los Alamos National Laboratory (LANL); Goodwin, Lynne A. [Los Alamos National Laboratory (LANL); Pitluck, Sam [U.S. Department of Energy, Joint Genome Institute; Liolios, Konstantinos [U.S. Department of Energy, Joint Genome Institute; Pagani, Ioanna [U.S. Department of Energy, Joint Genome Institute; Ivanova, N [U.S. Department of Energy, Joint Genome Institute; Mavromatis, K [U.S. Department of Energy, Joint Genome Institute; Mikhailova, Natalia [U.S. Department of Energy, Joint Genome Institute; Huntemann, Marcel [U.S. Department of Energy, Joint Genome Institute; Pati, Amrita [U.S. Department of Energy, Joint Genome Institute; Chen, Amy [U.S. Department of Energy, Joint Genome Institute; Palaniappan, Krishna [U.S. Department of Energy, Joint Genome Institute; Chang, Yun-Juan [ORNL; Land, Miriam L [ORNL; Hauser, Loren John [ORNL; Rohde, Manfred [HZI - Helmholtz Centre for Infection Research, Braunschweig, Germany; Pukall, Rudiger [DSMZ - German Collection of Microorganisms and Cell Cultures GmbH, Braunschweig, Germany; Goker, Markus [DSMZ - German Collection of Microorganisms and Cell Cultures GmbH, Braunschweig, Germany; Detter, J. Chris [U.S. Department of Energy, Joint Genome Institute; Woyke, Tanja [U.S. Department of Energy, Joint Genome Institute; Bristow, James [U.S. Department of Energy, Joint Genome Institute; Eisen, Jonathan [U.S. Department of Energy, Joint Genome Institute; Markowitz, Victor [U.S. Department of Energy, Joint Genome Institute; Hugenholtz, Philip [U.S. Department of Energy, Joint Genome Institute; Kyrpides, Nikos C [U.S. Department of Energy, Joint Genome Institute; Klenk, Hans-Peter [DSMZ - German Collection of Microorganisms and Cell Cultures GmbH, Braunschweig, Germany

2013-01-01T23:59:59.000Z

240

What Did They Do in IEA 34/43? Or How to Diagnose and Repair Bugs in 500,000 Lines of Code: Preprint  

NLE Websites -- All DOE Office Websites (Extended Search)

4978 4978 June 2009 What Did They Do in IEA 34/43? Or How to Diagnose and Repair Bugs in 500,000 Lines of Code Preprint R. Judkoff National Renewable Energy Laboratory J. Neymark J. Neymark & Associates To be presented at the Building Simulation 2009 Conference Glasgow, Scotland 27-30 July 2009 NOTICE The submitted manuscript has been offered by an employee of the Alliance for Sustainable Energy, LLC (ASE), a contractor of the US Government under Contract No. DE-AC36-08-GO28308. Accordingly, the US Government and ASE retain a nonexclusive royalty-free license to publish or reproduce the published form of this contribution, or allow others to do so, for US Government purposes. This report was prepared as an account of work sponsored by an agency of the United States government.

Note: This page contains sample records for the topic "rsa envision bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Bugs, Drugs & Smoke  

E-Print Network (OSTI)

Panic in Surat Then came Ebola Change in awareness Ready tonew diseases (e.g. Ebola and Marburg) have appeared. Thissomething far more serious. Ebola first appeared in 1976 in

WHO

2012-01-01T23:59:59.000Z

242

Bugs, Drugs & Smoke  

E-Print Network (OSTI)

in saving lives, poor sanitation, unclean water (Photo2.9)and food due to poor hygiene and sanitation. administered by

WHO

2012-01-01T23:59:59.000Z

243

Timing Attacks on software implementation of RSA  

E-Print Network (OSTI)

the amount of time required to perform private key operations (Decryptions etc.). Timing attacks are related to a class of attacks called side-channel attacks. Others include power analysis and attacks based decryption times are masked by many concurrent processes running on the system. It is also believed

244

Envisioning Parking Strategies for the Post-Automobile City  

E-Print Network (OSTI)

and Cities: Overcoming Automobile Dependence. Washington,Strategies for the Post-Automobile City Urban Land Use anddirected toward the use of automobiles (Chapman, 2007), with

Circella, Giovanni

2010-01-01T23:59:59.000Z

245

From marginalized to optimized : re-envisioning urban highway corridors  

E-Print Network (OSTI)

The past century of highway construction has assumed relentless growth of vehicular traffic capacity. Yet today is an era of highway rationalization, aging facilities, strained finances, peak oil concerns, climate change, ...

Spicer, Sarah J

2011-01-01T23:59:59.000Z

246

Envision UCSC Vision Conference 1 UC Santa Cruz Vision Conference  

E-Print Network (OSTI)

: Research Operations (mode of water use) An integral metric for all decisions A model for green development ­ academic, social o Teaching that is as cutting edge as research o Communication Internal ­ "Let sustainability efforts 3) Communication is not an issue Presence

California at Santa Cruz, University of

247

Made in Hong Kong : re-envisioning the pedestrian interface  

E-Print Network (OSTI)

The thesis begins with an interest in the diversity and ambiguity of open spaces in a consumption oriented society: Hong Kong. The hustle and bustle of informal markets, together with the traditional pedestrian streets ...

Huang, Peng, S.M. Massachusetts Institute of Technology

2013-01-01T23:59:59.000Z

248

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

91 - 18700 of 28,560 results. 91 - 18700 of 28,560 results. Article Energy Efficiency Hits from the Doors (and Windows) Our 1970's-vintage house always seemed a bit too welcoming when howling winter winds swept up Colorado's foothills. http://energy.gov/energysaver/articles/energy-efficiency-hits-doors-and-windows Article U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System A vulnerability was reported in RSA Access Manager. A remote user can gain access to the target system. http://energy.gov/cio/articles/u-205-rsa-access-manager-session-replay-flaw-lets-remote-users-access-system Article U-125: Cisco ASA Multiple Bugs Let Remote Users Deny Service Several vulnerabilities were reported in Cisco ASA. http://energy.gov/cio/articles/u-125-cisco-asa-multiple-bugs-let-remote-users-deny-service

249

Symplectic Integrator Mercury: Bug Report  

E-Print Network (OSTI)

We report on a problem found in MERCURY, a hybrid symplectic integrator used for dynamical problems in Astronomy. The variable that keeps track of bodies' statuses is uninitialised, which can result in bodies disappearing from simulations in a non-physical manner. Some FORTRAN compilers implicitly initialise variables, preventing simulations from having this problem. With other compilers, simulations with a suitably large maximum number of bodies parameter value are also unaffected. Otherwise, the problem manifests at the first event after the integrator is started, whether from scratch or continuing a previously stopped simulation. Although the problem does not manifest in some conditions, explicitly initialising the variable solves the problem in a permanent and unconditional manner.

K. de Souza Torres; D. R. Anderson

2008-08-04T23:59:59.000Z

250

The Harlequin Cabbage-bug.  

E-Print Network (OSTI)

SUBSTATIONS P. L. DOWNS, President, Temple .................................................................................. Term expires 1919 CHARLES ROGAN, Vzce Preszdent, Austin ...................................................................... Term.... V. M., .Veterinarian SUBSTATION NO. 1: Beeville, Bee Connty DIVISION OF CHEMISTRY E. E. BINFORD, B. S., Superintendent G. S. FRAPS,.~~. D., Chemist in Charge; SUBSTATION NO. 2: Troup, Smith State Chemlst R H RIDGELL B. S Assistant Chemist W. S...

Paddock, F.B. (Floyd B.)

1915-01-01T23:59:59.000Z

251

OpenEI Community - bug  

Open Energy Info (EERE)

Ghost" entries http:en.openei.orgcommunitydiscussionghost-entries

There is an issue that Illinois State University has come across. From Nick B:

252

Deniable Authentication with RSA and Multicasting Daniel R. L. Brown  

E-Print Network (OSTI)

of surreptitious forwarding. The IETF S/MIME protocol, which can be used to secure email, includes an Authenticated

253

Deniable Authentication with RSA and Multicasting Daniel R. L. Brown  

E-Print Network (OSTI)

. Related concepts to deniable authentication are plausible deniability and prevention of surreptitious

254

Comparing Elliptic Curve Cryptography and RSA on 8-Bit CPUs  

E-Print Network (OSTI)

.Patel,Arvinderpal.Wander,Hans.Eberle, Sheueling.Chang}@sun.com http://www.research.sun.com/projects/crypto Abstract. Strong public

Han, Richard Y.

255

T-659: Update support for RSA Authentication Manager | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Manager July 1, 2011 - 7:15am Addthis PROBLEM: Authentication Manager SP4 Patch 4 Windows Server 2008 PLATFORM: Windows Server 2008 SP4 Patch 4 32bit & 64bit...

256

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

August 29, 2011 August 29, 2011 T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password RSA enVision lets remote users view files and remote authenticated users obtain password. August 25, 2011 T-701: Citrix Access Gateway Enterprise Edition Input Validation Flaw in Logon Portal Permits Cross-Site Scripting Attacks Citrix Access Gateway Enterprise Edition Input Validation Flaw in Logon Portal Permits Cross-Site Scripting Attacks. August 22, 2011 T-698: Adobe ColdFusion Input Validation Flaw in 'probe.cfm' Permits Cross-Site Scripting Attacks Adobe ColdFusion Input Validation Flaw in 'probe.cfm' Permits Cross-Site Scripting Attacks. August 17, 2011 T-695: Avaya Aura Application Server Buffer Overflow in 'cstore.exe' Lets Remote Users Execute Arbitrary Code

257

Bed Bugs: Clinical Relevance and Control Options  

Science Journals Connector (OSTI)

...in the accommodation sector, the key to reducing...consisted of a hemispherical construction that insects could climb...233, 234). The heating of whole rooms comes...insecticides to open spaces via aerosols), space sprays, and incendiary...

Stephen L. Doggett; Dominic E. Dwyer; Pablo F. Peas; Richard C. Russell

2012-01-01T23:59:59.000Z

258

Bed Bugs: Clinical Relevance and Control Options  

Science Journals Connector (OSTI)

...the treatment of field infestations...95) and cedar oil. The modes of...Best Yet cedar oil can kill all bed...the control of field infestations...complexes, as the gas cannot be tightly...Insecticides The cost to develop and...insects during spray operations. In laboratory...

Stephen L. Doggett; Dominic E. Dwyer; Pablo F. Peas; Richard C. Russell

2012-01-01T23:59:59.000Z

259

DOODLE-BUGS AND LAW-MAKERS  

Science Journals Connector (OSTI)

...through adolescence. A research group has been assembled. The fund...This committee is conducting a group of studies, of bio-logical...turned south and east via the Klamath lakes to north-western Nevada...some day a wandering ant will fall into the pit and thus keep alive...

J. F. McClendon

1932-07-22T23:59:59.000Z

260

'Bugs' used to treat FGD wastewater  

SciTech Connect

Tough regulation of heavy metals may justify a bioreactor approach in addition to chemical treatment of FGD wastewater. Two of Duke Energy' coal-fired plants, Belews Creek and Allen (in North Carolina) have installed new biological reactor systems to increase selenium removal to levels not achievable by existing scrubber waste water systems. The ABMet system removes nitrate and selenium in a single step. Progress Energy has installed the system at Roxboro and Mayo Stations, also in North Carolina. 1 fig., 2 photos.

Blankinship, S.

2009-09-15T23:59:59.000Z

Note: This page contains sample records for the topic "rsa envision bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

noBugs - project tracking system.  

E-Print Network (OSTI)

??Testing has become a major part of any project in IT industry. Testing is done at every phase of SDLC because the cost and risk (more)

Kankanawadi, Jyoti Manjunath

2011-01-01T23:59:59.000Z

262

Bed Bugs: Clinical Relevance and Control Options  

Science Journals Connector (OSTI)

...of Prurigo of Hebra in Egypt. J. Egypt. Soc. Parasitol. 15...saw a bedbug. New York Daily News. http://articles...Bedbugs not back by popular demand. Dimens. Crit. Care...at Seaport. New York Daily News. http://articles...

Stephen L. Doggett; Dominic E. Dwyer; Pablo F. Peas; Richard C. Russell

2012-01-01T23:59:59.000Z

263

Fuel cycles and envisioned roles of fast neutron reactors and hybrids  

SciTech Connect

Future innovative nuclear fuel cycles will require insuring sustainability in terms of safe operation, optimal use of resources, radioactive waste minimization and reduced risk of proliferation. The present paper introduces some basic notions and fundamental fuel cycle strategies. The simulation approach needed to evaluate the impact of the different fuel cycle alternatives will also be shortly discussed.

Salvatores, Massimo [CEA-Cadarache, DEN-Dir, Bat. 101, St-Paul-Lez-Durance 13108 (France)

2012-06-19T23:59:59.000Z

264

Envisioning Radical Futures -- On the Water: The New York - New Jersey Upper Bay  

E-Print Network (OSTI)

et al. , Impacts of Sea Level Rise, p. 66. 5. Malcolm J.Verrazano, 1524 Sea level rise will affect infrastructures,by three feet by 2080. 1 Sea level rise is merely the static

2008-01-01T23:59:59.000Z

265

Envisioning transboundary cooperation zones : en la Frontera de Cd. Juarez-EI Paso/  

E-Print Network (OSTI)

The largest binational urban area in the world with a combined population of 2.1 million1 is formed by the pair cities of El Paso, TX and Cd. Jurez. This borderland lays on the 2,000 mile long international boundary that ...

Guerra, Yesica (Yesica A.)

2010-01-01T23:59:59.000Z

266

C3Bio.org - Resources: Envisioning the transition to a next-generation...  

NLE Websites -- All DOE Office Websites (Extended Search)

Mickey Mouse is a... - Select an answer - Mouse Penguin Chicken Suitcase Teapot Please leave this field blank. required Problem: required Attach a screenshot: optional (.jpg,...

267

Re-Envisioning the Delta: Alternative Futures for the Heart of California  

E-Print Network (OSTI)

Landscape Architecture and Environmental Planning InstituteLandscape Architecture and Environmental Planning Universityof Landscape Architecture and Environmental Planning of the

William Eisenstein

2007-01-01T23:59:59.000Z

268

Frontiers in Microbiology: Envisioning a Curriculum Unit for High School Biology  

SciTech Connect

Microbiology is undergoing a quiet revolution. Techniques such as polymerase chain reaction, high throughput DNA sequencing, whole genome shotgun sequencing, DNA microarrays, and bioinformatics analyses are greatly aiding our understanding of the estimated one billion species of microbes that inhabit the Earth. Unfortunately, the rapid pace of research in microbiology stands in contrast to the much slower pace of change in educational reform. Biological Sciences Curriculum Study (BSCS) hosted a two-day planning meeting to discuss whether or not a new curriculum unit on microbiology is desirable for the high school audience. Attending the meeting were microbiologists, high school biology teachers, and science educators. The consensus of the participants was that an inquiry-based unit dealing with advances in microbiology should be developed for a high school biology audience. Participants established content priorities for the unit, discussed the unit's conceptual flow, brainstormed potential student activities, and discussed the role of educational technology for the unit. As a result of the planning meeting discussions, BSCS staff sought additional funding to develop, disseminate, and evaluate the Frontiers in Microbiology curriculum unit. This unit was intended to be developed as a replacement unit suitable for an introductory biology course. The unit would feature inquiry-based student activities and provide approximately four weeks of instruction. As appropriate, activities would make use of multimedia. The development and production processes would require about two years for completion. Unfortunately, BSCS staff was not able to attract sufficient funding to develop the proposed curriculum unit. Since there were some unexpended funds left over from the planning meeting, BSCS requested and received permission from DOE to use the balance of the funds to prepare background materials about advances in microbiology that would be useful to teachers. These materials were developed and placed on the BSCS Web site (http://www.bscs.org).

Mark Bloom

2004-06-18T23:59:59.000Z

269

Bug Bytes,Summer 2008 1 W elcome to Bug Bytes, our newly  

E-Print Network (OSTI)

was named the best in the country by the Chronicle of Higher Education, considered the top news and job for that perfect entomological t-shirts, books, insect art prints, insect candy, and posters of California drag- insect. You can see what's available at www. bohartmuseum.com. Purchases at the Education Programs

Ishida, Yuko

270

What is a bed bug? Bed bugs are small, oval, reddish brown, non-  

E-Print Network (OSTI)

zippers. Thus, experts recommend using hard luggage that closes tight. ·Protectyourclothes. Seal your clothes inside air-tight bags. ·Protectyourluggage. Never set your luggage on the bed or on a couch. Put. ·Treatyourluggagebeforeyoustoreit. After you have unpacked, vacuum your luggage thoroughly. Also, if it is hot outside, you can seal

Almor, Amit

271

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

19, 2012 19, 2012 V-027: Adobe InDesign Server SOAP Interface Lets Remote Users Execute Arbitrary Commands Adobe InDesign Server "RunScript" SOAP Message Command Execution Vulnerability November 16, 2012 V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions Two vulnerabilities were reported in RSA Data Protection Manager. November 15, 2012 V-025: Bugzilla Multiple Cross Site Scripting and Information Disclosure Vulnerabilities Bugzilla Multiple Vulnerabilities November 14, 2012 V-024: Ubuntu update for libav Ubuntu Security Notice November 13, 2012 V-023: Microsoft Security Bulletin Advance Notification for November 2012 Microsoft Security Bulletin Advance Notification for November 2012. Microsoft has posted 4 Critical Bulletins and 1 Important Bulletins.

272

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

June 12, 2013 June 12, 2013 V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code A vulnerability was reported in Adobe Flash Player. June 10, 2013 V-174: RSA Authentication Manager Writes Operating System, SNMP, and HTTP Plug-in Proxy Passwords in Clear Text to Log Files A vulnerability was reported in RSA Authentication Manager. June 5, 2013 V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks Several vulnerabilities were reported in Apple Safari. June 4, 2013 V-170: Apache Subversion Hook Scripts Arbitrary Command Injection Vulnerability A vulnerability has been reported in Apache Subversion. June 3, 2013 V-169: Linux Kernel "iscsi_add_notunderstood_response()" Buffer Overflow

273

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

July 5, 2012 July 5, 2012 U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System A vulnerability was reported in RSA Access Manager. A remote user can gain access to the target system. July 3, 2012 U-204: HP Network Node Manager i Input Validation Hole Permits Cross-Site Scripting Attacks Potential security vulnerabilities have been identified with HP Network Node Manager I (NNMi) for HP-UX, Linux, Solaris, and Windows. The vulnerabilities could be remotely exploited resulting in cross site scripting (XSS). June 29, 2012 U-202: Apple QuickTime Multiple Stack Overflow Vulnerabilities Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. June 28, 2012 U-201: HP System Management Homepage Bugs Let Remote Users Deny Service

274

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Medium Impact Medium Impact Assessment Bulletins JC3 Medium Impact Assessment Bulletins RSS December 4, 2012 V-039: Samsung and Dell printers Firmware Backdoor Unauthorized Access Vulnerability Samsung has issued a security advisory and an optional firmware update for all current Samsung networked laser printers and multifunction devices to enhance Simple Network Management Protocol (SNMP) security. November 30, 2012 V-037: Wireshark Multiple Bugs Let Remote Users Deny Service Several vulnerabilities were reported in Wireshark. November 29, 2012 V-036: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability Two vulnerabilities were reported in EMC Smarts Network Configuration Manager. November 27, 2012 V-034: RSA Adaptive Authentication (On-Premise) Input Validation Flaws

275

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

September 28, 2012 September 28, 2012 U-270:Trend Micro Control Manager Input Validation Flaw in Ad Hoc Query Module Lets Remote Users Inject SQL Commands Trend Micro has been notified of a potential product vulnerability in Control Manager. September 27, 2012 U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service A vulnerability was reported in Cisco IOS. September 26, 2012 U-268: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users A vulnerability was reported in Oracle Database. September 25, 2012 U-267: RSA® Authentication Agent 7.1 for Microsoft Windows® and RSA® Authentication Client 3.5 Access Control Vulnerability Multiple RSA Products Authentication Bypass Vulnerability September 21, 2012 U-265: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain

276

V-084: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain...  

Energy Savers (EERE)

An insecure permission on Silverlight allows a remote user to bypass domain origin policy CVE-2012-2292. A remote user can conduct clickjacking attacks...

277

On the Security of 1024-bit RSA and 160-bit Elliptic Curve Cryptography  

E-Print Network (OSTI)

initiatives affect all three pillars of modern cryptography: block ciphers, cryptographic hash functions, a In February of 2005, the United States' National Security Agency (NSA), arguing that "The sustained and rapid

278

U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic...  

Energy Savers (EERE)

hijack a user's session, and potentially compromise an application using the library. A remote user with the ability to conduct a man-in-the-middle attack can decrypt...

279

U-120: RSA SecurID Software Token Converter Unspecified Buffer...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code V-066: Adobe Acrobat...

280

Fault-Based Attack of RSA Authentication Andrea Pellegrini, Valeria Bertacco and Todd Austin  

E-Print Network (OSTI)

a straightforward design architecture that en- tails a small silicon footprint and low-power profile. Our research enviromental manipulations. Our fault-based attack can be succ

Austin, Todd M.

Note: This page contains sample records for the topic "rsa envision bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Power Attack on Small RSA Public Exponent Pierre-alain Fouque1  

E-Print Network (OSTI)

Paris 07 SP, France {Gwenaelle.Martinet;Sebastien.Kunz-Jacques}@sgdn.pm.gouv.fr 3 HSBC, France, Frederic

Fouque, Pierre-Alain

282

Transportation Sector Market Transition: Using History and Geography to Envision Possible Hydrogen Infrastructure Development and Inform Public Policy  

SciTech Connect

This report covers the challenges to building an infrastructure for hydrogen, for use as transportation fuel. Deployment technologies and policies that could quicken deployment are addressed.

Brown, E.

2008-08-01T23:59:59.000Z

283

Envisioning carbon capture and storage: expanded possibilities due to air capture, leakage insurance, and C-14 monitoring  

Science Journals Connector (OSTI)

In order to meet the challenge of climate change while allowing for continued economic development, the world will have to adopt a net zero carbon energy infrastructure. Due to the worlds ... is strong motivatio...

Klaus S. Lackner; Sarah Brennan

2009-10-01T23:59:59.000Z

284

VOLUME LXXVI, NUMBER 4, WINTER 2013 When asked to envision a typical workspace, most of us imagine neutral  

E-Print Network (OSTI)

--literally. BY JESSICA STOLLER-CONRAD 20 ENGI NEER I NG & SCIENCE WINTER 2013 #12;The cleanroom at the Kavli Nanoscience, uses a tool in the cleanroom to produce plasmonic chips--devices that increase the intensity of light

Jackson, Jennifer M.

285

Re-envisioning instructional technology research in higher education environments: a content analysis of a grant program  

Science Journals Connector (OSTI)

Within the field of instructional technology, scholars have long worked to define the scope and purpose of research and its role in informing practice. Increasingly, researchers outside of the instructional te...

Trena M. Paulus; Gina Phipps; John Harrison

2012-12-01T23:59:59.000Z

286

PRODUCTION ANALYSIS: CHEROKEE AND BUG FIELDS, SAN JUAN COUNTY, UTAH  

SciTech Connect

Over 400 million barrels (64 million m{sup 3}) of oil have been produced from the shallow-shelf carbonate reservoirs in the Pennsylvanian (Desmoinesian) Paradox Formation in the Paradox Basin, Utah and Colorado. With the exception of the giant Greater Aneth field, the other 100 plus oil fields in the basin typically contain 2 to 10 million barrels (0.3-1.6 million m{sup 3}) of original oil in place. Most of these fields are characterized by high initial production rates followed by a very short productive life (primary), and hence premature abandonment. Only 15 to 25 percent of the original oil in place is recoverable during primary production from conventional vertical wells. An extensive and successful horizontal drilling program has been conducted in the giant Greater Aneth field. However, to date, only two horizontal wells have been drilled in small Ismay and Desert Creek fields. The results from these wells were disappointing due to poor understanding of the carbonate facies and diagenetic fabrics that create reservoir heterogeneity. These small fields, and similar fields in the basin, are at high risk of premature abandonment. At least 200 million barrels (31.8 million m{sup 3}) of oil will be left behind in these small fields because current development practices leave compartments of the heterogeneous reservoirs undrained. Through proper geological evaluation of the reservoirs, production may be increased by 20 to 50 percent through the drilling of low-cost single or multilateral horizontal legs from existing vertical development wells. In addition, horizontal drilling from existing wells minimizes surface disturbances and costs for field development, particularly in the environmentally sensitive areas of southeastern Utah and southwestern Colorado.

Thomas C. Chidsey Jr.

2003-12-01T23:59:59.000Z

287

The baron of bugs: Researcher keeps waterborne pathogens at bay  

E-Print Network (OSTI)

of organisms in the environment, except instead of working with soil now I was working with water,? he said. ?Since it was a drinking water company, the focus was detecting pathogens in source water used for drinking water production, as well as finished... drinking water itself.? Though he believed great advancements in basic and applied waterborne pathogen research were being made, he foresaw limited research opportunities at the water company. At this time, Di Giovanni said, the water indus- try...

Swyden, Courtney

2010-01-01T23:59:59.000Z

288

Phoenix: Detecting and Recovering from Permanent Processor Design Bugs  

E-Print Network (OSTI)

approaches are ineffective Micro-code patching Compiler workarounds OS hacks Firmware #12;http Condition L1, ALU, Memory, etc. Hang, data corruption IO failure, wrong data A (BCD) Signal Snoop L1 hit IO

Torrellas, Josep

289

UMass builds bugs to eat MTBE ByAuriaCimino  

E-Print Network (OSTI)

a toxic gasoline component might be just what the doctor ordered for Maine's con- taminated groundwater with methyl tertiary butyl ether (MTBE), which is found in gasoline. Once the first field trial is complete out of the reformulated gasoline pro- gram (RFG) .The gasoline, which con- tains 11 percent MTBE

Lovley, Derek

290

U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

target system. A remote user can obtain potentially sensitive information. Solution: A patch matrix is available in the vendor's advisory. Addthis Related Articles V-076: Cisco...

291

U-074: Microsoft .NET Bugs Let Remote Users Execute Arbitrary...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

user can redirect users to arbitrary sites. Solution: The vendor has issued a fix. A patch matrix is available in the vendor's advisory. Microsoft Security Bulletin MS11-100...

292

V-029: Mozilla Firefox Multiple Bugs Let Remote Users Execute...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

that, when loaded by the target user, will trigger a buffer overflow, use-after-free memory error, or memory corruption error and execute arbitrary code on the target system. The...

293

Assassin bug uses aggressive mimicry to lure spider prey  

Science Journals Connector (OSTI)

...vibrometer (Polytec PDV100, Germany). The AES (Audio Engineering Society) output of the laser vibrometer was converted to EBU (CO3, Midiman, M-Audio, USA) and synchronized to the audio track of the video recording. Vibrations...

2011-01-01T23:59:59.000Z

294

A new approach to ensure successful implementation and sustainable DSM in RSA mines / Danil Francois le Roux.  

E-Print Network (OSTI)

??In this study a new tool was developed that made new approaches possible for the successful implementation of Demand Side Management (DSM) projects. The new (more)

Le Roux, Danil Francois

2005-01-01T23:59:59.000Z

295

When asked to envision a typical workspace, most of us imagine neutral colors, generic cubicles, and fluorescent lights. The work done in  

E-Print Network (OSTI)

I NG & SCIENCE WINTER 2013 #12;The cleanroom at the Kavli Nanoscience Institute in the cleanroom to produce plasmonic chips--devices that increase the intensity of light--for use in the precise

296

U-250: Wireshark DRDA Dissector Flaw Lets Remote Users Deny Service...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Wireshark Bug Database - Bug 7666 SecurityTracker Alert ID: 1027464 Bugtraq ID: 55284 Red Hat Bugzilla - Bug 849926 CVE-2012-3548 IMPACT ASSESSMENT: Medium Discussion: An...

297

X-ray science taps bug biology to design better materials and reduce  

NLE Websites -- All DOE Office Websites (Extended Search)

News News Press Releases Feature Stories In the News Experts Guide Media Contacts Social Media Photos Videos Fact Sheets, Brochures and Reports Summer Science Writing Internship Caddiesflies spin an adhesive silk underwater to build nets to capture food and build protective shelter. Pictured is that silk magnified. Courtesy: Bennett Addison. Click to enlarge. Caddiesflies spin an adhesive silk underwater to build nets to capture food and build protective shelter. Pictured is that silk magnified. Courtesy: Bennett Addison. Click to enlarge. "(Caddisfly silk) is really not much stronger than super glue, but try to put super glue in your bathtub without it ever getting a chance to dry," says Jeff Yarger, professor of chemistry, biochemistry and physics at Arizona State University. Courtesy: Bennett Addison. Click to enlarge.

298

T-712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

A local user exploiting this flaw could connect to the broker outside of Cumin's control and perform certain operations such as scheduling jobs, setting attributes on...

299

Feature Story --The Right Bugs | Miller-McCune Magazine Feature Story  

E-Print Network (OSTI)

reactors begin to punctuate the landscape. The once prolific nuclear production site has the aura of an Old it is pumped and to produce the next generation of green fuels. He catches alligators sometimes, too. By Bijal sprawl of sagebrush and brown cheatgrass, until the harsh geometric silhouettes of entombed nuclear

Hazen, Terry

300

U-153: EMC Data Protection Advisor Server and Collector Bugs Let Remote Users Deny Service  

Energy.gov (U.S. Department of Energy (DOE))

Two vulnerabilities were reported in EMC Data Protection Advisor. A remote user can cause denial of service conditions.

Note: This page contains sample records for the topic "rsa envision bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Gold bugs and beyond: a review of iridescence and structural colour mechanisms in beetles (Coleoptera)  

Science Journals Connector (OSTI)

...reflectors in beetles. The body plan of beetles is probably a key...non-homologous structures. In this review, we have aimed to provide accurate...The order Coleoptera is by any standard a prodigious showcase for the...of optical terms used in this review and/or commonly encountered...

2009-01-01T23:59:59.000Z

302

CARBON AND OXYGEN ISOTOPIC ANALYSIS: BUG, CHEROKEE, AND PATTERSON CANYON FIELDS, SAN JUAN COUNTY, UTAH  

SciTech Connect

Over 400 million barrels (64 million m{sup 3}) of oil have been produced from the shallow-shelf carbonate reservoirs in the Pennsylvanian (Desmoinesian) Paradox Formation in the Paradox Basin, Utah and Colorado. With the exception of the giant Greater Aneth field, the other 100 plus oil fields in the basin typically contain 2 to 10 million barrels (0.3-1.6 million m{sup 3}) of original oil in place. Most of these fields are characterized by high initial production rates followed by a very short productive life (primary), and hence premature abandonment. Only 15 to 25 percent of the original oil in place is recoverable during primary production from conventional vertical wells. An extensive and successful horizontal drilling program has been conducted in the giant Greater Aneth field. However, to date, only two horizontal wells have been drilled in small Ismay and Desert Creek fields. The results from these wells were disappointing due to poor understanding of the carbonate facies and diagenetic fabrics that create reservoir heterogeneity. These small fields, and similar fields in the basin, are at high risk of premature abandonment. At least 200 million barrels (31.8 million m{sup 3}) of oil will be left behind in these small fields because current development practices leave compartments of the heterogeneous reservoirs undrained. Through proper geological evaluation of the reservoirs, production may be increased by 20 to 50 percent through the drilling of low-cost single or multilateral horizontal legs from existing vertical development wells. In addition, horizontal drilling from existing wells minimizes surface disturbances and costs for field development, particularly in the environmentally sensitive areas of southeastern Utah and southwestern Colorado.

David E. Eby; Thomas C. Chidsey Jr; Kevin McClure; Craig D. Morgan; Stephen T. Nelson

2003-12-01T23:59:59.000Z

303

CAPILLARY PRESSURE/MERCURY INJECTION ANALYSIS: CHEROKEE AND BUG FIELDS, SAN JUAN COUNTY, UTAH  

SciTech Connect

Over 400 million barrels (64 million m{sup 3}) of oil have been produced from the shallow-shelf carbonate reservoirs in the Pennsylvanian (Desmoinesian) Paradox Formation in the Paradox Basin, Utah and Colorado. With the exception of the giant Greater Aneth field, the other 100 plus oil fields in the basin typically contain 2 to 10 million barrels (0.3-1.6 million m{sup 3}) of original oil in place. Most of these fields are characterized by high initial production rates followed by a very short productive life (primary), and hence premature abandonment. Only 15 to 25 percent of the original oil in place is recoverable during primary production from conventional vertical wells. An extensive and successful horizontal drilling program has been conducted in the giant Greater Aneth field. However, to date, only two horizontal wells have been drilled in small Ismay and Desert Creek fields. The results from these wells were disappointing due to poor understanding of the carbonate facies and diagenetic fabrics that create reservoir heterogeneity. These small fields, and similar fields in the basin, are at high risk of premature abandonment. At least 200 million barrels (31.8 million m{sup 3}) of oil will be left behind in these small fields because current development practices leave compartments of the heterogeneous reservoirs undrained. Through proper geological evaluation of the reservoirs, production may be increased by 20 to 50 percent through the drilling of low-cost single or multilateral horizontal legs from existing vertical development wells. In addition, horizontal drilling from existing wells minimizes surface disturbances and costs for field development, particularly in the environmentally sensitive areas of southeastern Utah and southwestern Colorado.

Thomas C. Chidsey Jr; David E. Eby

2003-12-01T23:59:59.000Z

304

THIN SECTION DESCRIPTIONS: CHEROKEE AND BUG FIELDS, SAN JUAN COUNTY, UTAH  

SciTech Connect

Over 400 million barrels (64 million m{sup 3}) of oil have been produced from the shallow-shelf carbonate reservoirs in the Pennsylvanian (Desmoinesian) Paradox Formation in the Paradox Basin, Utah and Colorado. With the exception of the giant Greater Aneth field, the other 100 plus oil fields in the basin typically contain 2 to 10 million barrels (0.3-1.6 million m{sup 3}) of original oil in place. Most of these fields are characterized by high initial production rates followed by a very short productive life (primary), and hence premature abandonment. Only 15 to 25 percent of the original oil in place is recoverable during primary production from conventional vertical wells. An extensive and successful horizontal drilling program has been conducted in the giant Greater Aneth field. However, to date, only two horizontal wells have been drilled in small Ismay and Desert Creek fields. The results from these wells were disappointing due to poor understanding of the carbonate facies and diagenetic fabrics that create reservoir heterogeneity. These small fields, and similar fields in the basin, are at high risk of premature abandonment. At least 200 million barrels (31.8 million m{sup 3}) of oil will be left behind in these small fields because current development practices leave compartments of the heterogeneous reservoirs undrained. Through proper geological evaluation of the reservoirs, production may be increased by 20 to 50 percent through the drilling of low-cost single or multilateral horizontal legs from existing vertical development wells. In addition, horizontal drilling from existing wells minimizes surface disturbances and costs for field development, particularly in the environmentally sensitive areas of southeastern Utah and southwestern Colorado.

Thomas C. Chidsey Jr; David E. Eby

2003-12-01T23:59:59.000Z

305

SCANNING ELECTRON MICROSCOPY AND PORE CASTING: CHEROKEE AND BUG FIELDS, SAN JUAN COUNTY, UTAH  

SciTech Connect

Over 400 million barrels (64 million m{sup 3}) of oil have been produced from the shallow-shelf carbonate reservoirs in the Pennsylvanian (Desmoinesian) Paradox Formation in the Paradox Basin, Utah and Colorado. With the exception of the giant Greater Aneth field, the other 100 plus oil fields in the basin typically contain 2 to 10 million barrels (0.3-1.6 million m{sup 3}) of original oil in place. Most of these fields are characterized by high initial production rates followed by a very short productive life (primary), and hence premature abandonment. Only 15 to 25 percent of the original oil in place is recoverable during primary production from conventional vertical wells. An extensive and successful horizontal drilling program has been conducted in the giant Greater Aneth field. However, to date, only two horizontal wells have been drilled in small Ismay and Desert Creek fields. The results from these wells were disappointing due to poor understanding of the carbonate facies and diagenetic fabrics that create reservoir heterogeneity. These small fields, and similar fields in the basin, are at high risk of premature abandonment. At least 200 million barrels (31.8 million m{sup 3}) of oil will be left behind in these small fields because current development practices leave compartments of the heterogeneous reservoirs undrained. Through proper geological evaluation of the reservoirs, production may be increased by 20 to 50 percent through the drilling of low-cost single or multilateral horizontal legs from existing vertical development wells. In addition, horizontal drilling from existing wells minimizes surface disturbances and costs for field development, particularly in the environmentally sensitive areas of southeastern Utah and southwestern Colorado.

Thomas C. Chidsey Jr; David E. Eby; Louis H. Taylor

2003-12-01T23:59:59.000Z

306

Bugs on a budget: Distributed sensing with cost for reporting and nonreporting  

Science Journals Connector (OSTI)

We consider a simple model of sequential decisions made by a fusion agent that receives binary-passive reports from distributed sensors. The main result is an explicit formula for the probability of making a decision before a fixed budget is exhausted. ...

Vladimir Pozdnyakov; J. michael Steele

2010-10-01T23:59:59.000Z

307

V-183: Cisco TelePresence TC and TE Bugs Let Remote Users Deny...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Cisco TelePresence Profiles Series running Cisco TelePresence Quick Set Series Cisco IP Video Phone E20 ABSTRACT: Cisco TelePresence TC and TE Software contain two vulnerabilities...

308

U-155: WebCalendar Access Control and File Inclusion Bugs Let...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

were reported in WebCalendar. A remote user may be able to execute arbitrary PHP code on the target system. reference links: SecurityTracker Alert ID: 1026966...

309

Automated classification of local earthquake data in the BUG small array  

Science Journals Connector (OSTI)

......situation, a viable alternative to local networks...weaker signal energy in the actual...with frequent car and bustraffic...our tests of alternative approaches to...reflects the energy increase of noise...masks the signal energy in upper frequencies...suggesting alternative identifications......

Manfred Joswig

1995-02-01T23:59:59.000Z

310

U-075: Apache Struts Bug Lets Remote Users Overwrite Files and...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Flaw Lets Remote Users Execute Arbitrary Commands V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code U-058: Apache Struts Conversion Error...

311

V-077: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

property (via 'setSysProp.jsp') to bypass access restrictions and gain access to the API functionality. This can be exploited to download configuration files, download database...

312

Uncovering Causal Relationships between Software Metrics and Bugs Cesar Couto, Christofer Silva  

E-Print Network (OSTI)

data (e.g. to show whether changes in oil prices cause recession) [12], [13]. Although more used of almost four years. Particularly, we have been able to discover in the history of metrics the causes

Paris-Sud XI, Université de

313

U-233: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote...  

Energy Savers (EERE)

11.2.0.2 and 11.2.0.3 are not affected on systems that have the July 2012 Critical Patch Update. Impact: A remote authenticated user with 'Create Table' privileges can gain...

314

U-005: Apache mod_proxy Pattern Matching Bug Lets Remote Users...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Impact: A remote user can access internal servers. Solution: The vendor has issued a patch for version 2.2.21 Apache 2.2.21 (released 2011-09-13) Addthis Related Articles U-046:...

315

T-538: HP OpenView Storage Data Protector Bug Lets Remote Users...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

HP-UX Software Assistant is an enhanced application that replaces HP-UX Security Patch Check. It analyzes all Security Bulletins issued by HP and lists recommended actions...

316

U-092: Sudo Format String Bug Lets Local Users Gain Elevated...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Sudo version 1.8.3p1 may be updated to version 1.8.3p2 via the file sudo-1.8.3p2.patch.gz. For sudo versions 1.8.0-1.8.3, the patch to sudo.c in sudo-1.8.3p2.patch.gz will...

317

V-199: Solaris Bugs Let Local Users Gain Root Privileges, Remote...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

reported in Solaris REFERENCE LINKS: SecurityTracker Alert ID: 1028802 Oracle Critical Patch Update Advisory - July 2013 CVE-2013-3745 CVE-2013-3746 CVE-2013-3748 CVE-2013-3750...

318

T-647: PHP File Upload Bug May Let Remote Users Overwrite Files...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

affects PHP 5.3.6 and earlier versions. No new package has been released yet, but a patch can be grabbed from the repository and applied manually. The vulnerability does not...

319

U-096: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Impact: A remote user can cause the target system to crash. Solution: IBM has issued a patch available via ftp at "aix.software.ibm.comaixefixessecuritylargesendfix.tar" The...

320

U-029: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

access. Impact: A remote user can gain unauthorized access. Solution: HP has made patch kits available to resolve the vulnerability. The patch kits and installation...

Note: This page contains sample records for the topic "rsa envision bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Phoenix: Detecting and Recovering from Permanent Processor Design Bugs with Programmable Hardware  

E-Print Network (OSTI)

, Phoenix flushes the pipeline and either retries or invokes a customized recovery han- dler. Phoenix is about to be exercised, and either avert it or repair its effect on the fly. S

Torrellas, Josep

322

U-192: VMware Workstation/Player VM Remote Device Bug Lets Local...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

with the ability to modify communications data between a remote virtual device (e.g., CD-ROM, keyboard) located on a physically separate system and the target virtual machine can...

323

U-192 VMware Workstation/Player VM Remote Device Bug Lets Local...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

with the ability to modify communications data between a remote virtual device (e.g., CD-ROM, keyboard) located on a physically separate system and the target virtual machine can...

324

U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

create specially crafted content that, when loaded by the target user, will trigger a memory corruption error CVE-2012-4163, CVE-2012-4164, CVE-2012-4165, CVE-2012-4166 or...

325

V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

can create specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system CVE-2013-1009,...

326

U-232: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

unavailable and may cause the domain 0 kernel to panic. There is no requirement for memory sharing to be in use. Impact: A guest kernel can cause the host to become unresponsive...

327

T-708:Pidgin Bugs Let Remote Users Deny Service and Potentially...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

A remote user can send specially crafted HTTP 100 responses to trigger a memory access error in the MSN protocol plugin and cause the target user's client to crash....

328

U-201: HP System Management Homepage Bugs Let Remote Users Deny Service  

Energy.gov (U.S. Department of Energy (DOE))

The vulnerabilities could be exploited remotely resulting in unauthorized access, disclosure of information, data modification, Denial of Service (DoS), and execution of arbitrary code.

329

Home News Products Blogs Buyers Guide Whitepapers Jobs Events Subscribe Issue Archive Topic Center: Email Security Compliance Patch Management Financial Services Health care RSA 2008 RSS | Login | Register  

E-Print Network (OSTI)

SEARCH Home News Products Blogs Buyers Guide Whitepapers Jobs Events Subscribe Issue Archive Topic located the malicious files, mostly MP3 or AVI in format, on popular peer-to- peer (P2P) websites appear when users employ certain terms when searching for music and video, he said. Once the files

Gupta, Minaxi

330

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

71 - 22680 of 26,764 results. 71 - 22680 of 26,764 results. Article Small Wind Electric Systems Small wind electric systems are one of the most cost-effective home-based renewable energy systems -- with zero emissions and pollution. http://energy.gov/energysaver/articles/small-wind-electric-systems Article T-642: RSA SecurID update to Customers RSA investigation has revealed that the attack resulted in certain information being extracted from RSA's systems. Some of that information is related to RSA's SecurID two-factor authentication products http://energy.gov/cio/articles/t-642-rsa-securid-update-customers Article T-582: RSA systems has resulted in certain information being extracted from RSA systems that relates to RSA SecurID RSA investigation has revealed that the attack resulted in certain

331

Taxonomy, Phylogenetics, Comparative Morphology and Evolution of Assassin Bugs (Hemiptera: Reduviidae) With Emphasis on Harpactorinae and Peiratinae  

E-Print Network (OSTI)

4.9, 4.19. H OLOTYPE : SURINAME: Commewijne: Leliendaal, 17new designation): SURINAME: Commewijne: Rust en Werk,UCR_ENT 00009270) (USNM). SURINAME: Unknown: unknown, 12 Dec

Zhang, Guanyang

2012-01-01T23:59:59.000Z

332

The water system of traditional rice paddies as an important habitatof the giant water bug, Lethocerus deyrollei (Heteroptera: Belostomatidae)  

Science Journals Connector (OSTI)

The population dynamics of Lethocerus deyrollei, including the seasonal change in the habitat utilization, were studied in five types of waters, permanent and temporary pools, ditch, rice paddy and marsh in a Sat...

Yasuo Mukai; Naoto Baba; Minoru Ishii

2005-06-01T23:59:59.000Z

333

V-163: Red Hat Network Satellite Server Inter-Satellite Sync...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Apache modproxymodrewrite Bug Lets Remote Users Access Internal Servers U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code...

334

Rapid Distribution of Tasks on a Commodity Grid  

E-Print Network (OSTI)

applications. Exam- ples are SETI@Home [16], Folding@Home [13], the cryptographic challenges sponsored by RSA

Turgut, Damla

335

2005 IEEE International Symposium on Cluster Computing and the Grid n-Cycle: a set of algorithms for task distribution on  

E-Print Network (OSTI)

. Examples are SETI@Home [19], Folding@Home the cryptographic challenges sponsored by RSA laboratories [18

Turgut, Damla

336

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

March 21, 2011 March 21, 2011 T-584: Microsoft March 2011 Security Bulletin Release Microsoft released 3 bulletins to address vulnerabilities involving Microsoft Office Suites and Software in Windows OS. This Microsoft Bulletin contains 1 Critical vulnerabilities which require a restart after the applied patch. The Exploitability Index, displays both CVE and Microsoft bulletin ID associated to vulnerability. March 17, 2011 T-582: RSA systems has resulted in certain information being extracted from RSA systems that relates to RSA SecurID RSA investigation has revealed that the attack resulted in certain information being extracted from RSA's systems. Some of that information is related to RSA's SecurID two-factor authentication products. March 14, 2011 T-577: Security Advisory for Adobe Flash Player, Adobe Reader and Acrobat

337

Title: The Ariane 5 bug and a few lessons Author: Les Hatton, Oakwood Computing, U.K. and the Computing Laboratory,  

E-Print Network (OSTI)

, its use ceasing at the point of lift-off. However, it continued to run. Approximately 37 seconds such that a 64 bit floating point number was shoe-horned into a 16-bit integer. This is not easy in Ada. There were seven such occasions but only four of them protected against the possibility of overflow

Hatton, Les

338

GEOPHYSICAL WELL LOG/CORE DESCRIPTIONS, CHEROKEE AND BUG FIELDS, SAN JUAN COUNTY, UTAH, AND LITTLE UTE AND SLEEPING UTE FIELDS, MONTEZUMA COUNTY, COLORADO  

SciTech Connect

Over 400 million barrels (64 million m{sup 3}) of oil have been produced from the shallow-shelf carbonate reservoirs in the Pennsylvanian (Desmoinesian) Paradox Formation in the Paradox Basin, Utah and Colorado. With the exception of the giant Greater Aneth field, the other 100 plus oil fields in the basin typically contain 2 to 10 million barrels (0.3-1.6 million m{sup 3}) of original oil in place. Most of these fields are characterized by high initial production rates followed by a very short productive life (primary), and hence premature abandonment. Only 15 to 25 percent of the original oil in place is recoverable during primary production from conventional vertical wells. An extensive and successful horizontal drilling program has been conducted in the giant Greater Aneth field. However, to date, only two horizontal wells have been drilled in small Ismay and Desert Creek fields. The results from these wells were disappointing due to poor understanding of the carbonate facies and diagenetic fabrics that create reservoir heterogeneity. These small fields, and similar fields in the basin, are at high risk of premature abandonment. At least 200 million barrels (31.8 million m{sup 3}) of oil will be left behind in these small fields because current development practices leave compartments of the heterogeneous reservoirs undrained. Through proper geological evaluation of the reservoirs, production may be increased by 20 to 50 percent through the drilling of low-cost single or multilateral horizontal legs from existing vertical development wells. In addition, horizontal drilling from existing wells minimizes surface disturbances and costs for field development, particularly in the environmentally sensitive areas of southeastern Utah and southwestern Colorado.

Thomas C. Chidsey Jr; David E. Eby; Laura L. Wray

2003-12-01T23:59:59.000Z

339

CROSS SECTIONS AND FIELD MAPS: CHEROKEE AND BUG FIELDS, SAN JUAN COUNTY, UTAH, AND LITTLE UTE AND SLEEPING UTE FIELDS, MONTEZUMA COUNTY, COLORADO  

SciTech Connect

Over 400 million barrels (64 million m{sup 3}) of oil have been produced from the shallow-shelf carbonate reservoirs in the Pennsylvanian (Desmoinesian) Paradox Formation in the Paradox Basin, Utah and Colorado. With the exception of the giant Greater Aneth field, the other 100 plus oil fields in the basin typically contain 2 to 10 million barrels (0.3-1.6 million m{sup 3}) of original oil in place. Most of these fields are characterized by high initial production rates followed by a very short productive life (primary), and hence premature abandonment. Only 15 to 25 percent of the original oil in place is recoverable during primary production from conventional vertical wells. An extensive and successful horizontal drilling program has been conducted in the giant Greater Aneth field. However, to date, only two horizontal wells have been drilled in small Ismay and Desert Creek fields. The results from these wells were disappointing due to poor understanding of the carbonate facies and diagenetic fabrics that create reservoir heterogeneity. These small fields, and similar fields in the basin, are at high risk of premature abandonment. At least 200 million barrels (31.8 million m{sup 3}) of oil will be left behind in these small fields because current development practices leave compartments of the heterogeneous reservoirs undrained. Through proper geological evaluation of the reservoirs, production may be increased by 20 to 50 percent through the drilling of low-cost single or multilateral horizontal legs from existing vertical development wells. In addition, horizontal drilling from existing wells minimizes surface disturbances and costs for field development, particularly in the environmentally sensitive areas of southeastern Utah and southwestern Colorado.

Thomas C. Chidsey Jr; Craig D. Morgan; Kevin McClure; David E. Eby; Laura L. Wray

2003-12-01T23:59:59.000Z

340

POROSITY/PERMEABILITY CROSS-PLOTS: CHEROKEE AND BUG FIELDS, SAN JUAN COUNTY, UTAH, AND LITTLE UTE AND SLEEPING UTE FIELDS, MONTEZUMA COUNTY, COLORADO  

SciTech Connect

Over 400 million barrels (64 million m{sup 3}) of oil have been produced from the shallow-shelf carbonate reservoirs in the Pennsylvanian (Desmoinesian) Paradox Formation in the Paradox Basin, Utah and Colorado. With the exception of the giant Greater Aneth field, the other 100 plus oil fields in the basin typically contain 2 to 10 million barrels (0.3-1.6 million m{sup 3}) of original oil in place. Most of these fields are characterized by high initial production rates followed by a very short productive life (primary), and hence premature abandonment. Only 15 to 25 percent of the original oil in place is recoverable during primary production from conventional vertical wells. An extensive and successful horizontal drilling program has been conducted in the giant Greater Aneth field. However, to date, only two horizontal wells have been drilled in small Ismay and Desert Creek fields. The results from these wells were disappointing due to poor understanding of the carbonate facies and diagenetic fabrics that create reservoir heterogeneity. These small fields, and similar fields in the basin, are at high risk of premature abandonment. At least 200 million barrels (31.8 million m{sup 3}) of oil will be left behind in these small fields because current development practices leave compartments of the heterogeneous reservoirs undrained. Through proper geological evaluation of the reservoirs, production may be increased by 20 to 50 percent through the drilling of low-cost single or multilateral horizontal legs from existing vertical development wells. In addition, horizontal drilling from existing wells minimizes surface disturbances and costs for field development, particularly in the environmentally sensitive areas of southeastern Utah and southwestern Colorado.

Thomas C. Chidsey Jr; David E. Eby; Laura L. Wray

2003-12-01T23:59:59.000Z

Note: This page contains sample records for the topic "rsa envision bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

What Did They Do in IEA 34/43? Or How to Diagnose and Repair Bugs in 500,000 Lines of Code: Preprint  

SciTech Connect

This paper presents an overview of the International Energy Agency Solar Heating and Cooling Task 34 and Energy Conservation in Buildings and Community Systems Annex 43.

Judkoff, R.; Neymark, J.

2009-06-01T23:59:59.000Z

342

The Monthly installmentOctober 2014, Volume 10(4) The common bed bug has long been a pest feeding on  

E-Print Network (OSTI)

or all of these signs and symptoms: Fever or feeling feverish/chills Cough Sore throat Runny or stuffy with the flu cough, sneeze or talk. Droplets can land in the mouths or noses of people who are nearby. Less o

Portman, Douglas

343

Damage assessment and sampling of the rice stink bug, Oebalus pugnax (Fabricius) (Hemiptera: Pentatomidae), in rice, Oryza sativa L., in Texas  

E-Print Network (OSTI)

Field and greenhouse experiments were conducted from 2003 to 2006 at the Texas A&M University Agricultural Research and Extension Center at Beaumont and commercial rice fields throughout the Texas Rice Belt with the objectives of characterizing...

Vargas, Luis Espino

2009-06-02T23:59:59.000Z

344

Icarus 184 (2006) 543555 www.elsevier.com/locate/icarus  

E-Print Network (OSTI)

sublimation and sputtering? Does it participate in radiolytic chemistry, such as envisioned by Delitsky

Johnson, Robert E.

345

High Resolution Imaging of in situ Root Hair Development to Assess Oilseed Species Responses to Water Stress  

E-Print Network (OSTI)

3: Root hair geometry for canola, camelina, flax, and lentilof four crop species, canola (Brassica napus), camelina (RSA (Pcanola and camelina had the

Hammac, Warren Ashley; Pan, William; Bolton, Ronald; Koenig, Richard

2009-01-01T23:59:59.000Z

346

E-Print Network 3.0 - aapprox190 mass region Sample Search Results  

NLE Websites -- All DOE Office Websites (Extended Search)

and Information Sciences 35 Rock mass strength by rock mass classification. Robert Hack (1997). South African Rock Engineering Congress (SARES) Johannesburg, RSA. pp. 346-356...

347

E-Print Network 3.0 - aapprox130 mass region Sample Search Results  

NLE Websites -- All DOE Office Websites (Extended Search)

and Information Sciences 35 Rock mass strength by rock mass classification. Robert Hack (1997). South African Rock Engineering Congress (SARES) Johannesburg, RSA. pp. 346-356...

348

E-Print Network 3.0 - added mass effect Sample Search Results  

NLE Websites -- All DOE Office Websites (Extended Search)

Sciences and Ecology 8 Rock mass strength by rock mass classification. Robert Hack (1997). South African Rock Engineering Congress (SARES) Johannesburg, RSA. pp. 346-356...

349

Bedbugs  

NLE Websites -- All DOE Office Websites (Extended Search)

Bedbugs Bedbugs Nature Bulletin No. 487-A March 31, 1973 Forest Preserve District of Cook County George W. Dunne, President Roland F. Eisenbeis, Supt. of Conservation BEDBUGS The name "bug" frequently and carelessly applied to insects in general, really belongs only to certain special kinds. A true bug differs from other insects in having a beak with which it pierces the skin and sucks the juices from plants or animals, a characteristic odor, and peculiar wings. Further, instead of having four stages in its life history -- egg, larva, pupa and adult -- it has only three. The tiny young, or "nymphs", resemble their parents as soon as hatched from the egg. The water bugs, stink bugs, squash bug, chinch bug, boxelder bug -- and that hated blood-sucking parasite, the Bedbug -- are true bugs.

350

Managing Insects and Mite Pests of Texas Sorghum  

E-Print Network (OSTI)

Chinch bug .....................................................................16 Corn earworm and fall armyworm (whorlworms) .......17 Banks grass mite ...........................................................18 GRAIN HEAD INSECT PESTS... .......................................................19 Sorghum midge ............................................................19 Corn earworm and fall armyworm (headworms) ........22 Sorghum webworm ........................................................24 Grain head-feeding bugs...

Cronholm, Gregory B.; Knutson, Allen E.; Parker, Roy D.; Pendleton, Bonnie

2007-06-20T23:59:59.000Z

351

V-198: Red Hat Enterprise MRG Messaging Qpid Python Certificate...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Qpid Bug Lets Certain Remote Users Bypass Authentication T-712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update T-712: Red Hat Enterprise MRG Grid 2.0...

352

CS 201 Lab: Debugging 1 The PDB debugger  

E-Print Network (OSTI)

subtle and surreptitious bugs into your code that might be hard to find. Perhaps you might make inserting

Musicant, Dave

353

HortTips NewsletterVol. 2, No. 3 Welcome to our new newsletter for current issues in the landscape and garden. This newsletter is aimed  

E-Print Network (OSTI)

out for in your landscape Wheel bug chowing down on a Japanese beetle. At least something is eating them. Wheel bug on the hunt for lunch Assassin bug nymph...good guy! Scoliid wasp, a parasite of white! Cute spider! Syrphid fly is a good fly Sand wasp digging on a ball field. It is a predator of stink

Hill, Wendell T.

354

Virtuous Cycle Cycles of activity and software projects  

E-Print Network (OSTI)

Inspection #12;Programming Cycle - single bug Selected Bug Shared Code Fix Bug Continuous Integration ~8 cycle cvscheck compilation style checking testing javadocs documentation jumble quality of unit testing #12;NetValue Development cvscheck - Source Code Control and Build Shared Centralized Automatic

Pfahringer, Bernhard

355

Codetrail: Connecting Source Code and Web Resources Max Goldman and Robert C. Miller  

E-Print Network (OSTI)

-accessible interfaces for a development team's own bug database or version control, there is no one way to characterize-ins for integrating with version control systems, bug databases, and many other tools. But integration with web for documentation, examples, bug fixes, error descriptions, code snippets, workarounds, templates, patterns

Reuter, Martin

356

Microsoft Word - SMail_Secure_Web-Based_Email_v3 _2_.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

HQ OCIO Instructions for Using Secure Email (SMail) via HQ OCIO Instructions for Using Secure Email (SMail) via Outlook Web Access with an RSA Token Instructions for Using Secure Email (SMail) via Outlook Web Access with an RSA Token Version 4 April 2010 Office of the Associate CIO for IT Support Services United States Department of Energy DOE HQ OCIO Instructions for Using Secure Email (SMail) via Outlook Web Access with an RSA Token Requirements SMail: 1. An Energy IT Services (EITS) provided Exchange email account. 1 2. An EITS provided RSA SecureID Token with an active account in the EITS-managed RSA Authentication Server. 2 3. Appropriate access granted Active Directory group membership. 3 4. DOEnet or Internet access and a supported web browser. Login Procedure for SMail:

357

Microsoft Word - Citrix_2FA_Authentication_12_3_2009.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Factor Factor RSA Tokens with Citrix Workplace Environment (CWE) Revision 1.13 December, 2009 Associate CIO for Operations (IM) United States Department of Energy DOE HQ OCIO Application Hosting Environment Instructions for Using RSA Token with Citrix Workplace Environment Using Your RSA Token with Citrix Note: If you access Citrix Workplace from within the DOE network (DOEnet or VPN) then you do not need an RSA Two-Factor token. The Citrix Workplace logon screen will prompt you only for your Windows User name and Password. Step 1 - Establish a connection to the Internet and connect to https://workplace.doe.gov. Step 2 - Click "OK" to bypass the Government warning banner. DOE HQ OCIO Application Hosting Environment Instructions for Using RSA Token with Citrix Workplace Environment

358

Characteristics of charge carriers in nanostructures  

E-Print Network (OSTI)

Nanoscience . . . . . . . . . . . . . . . . . . . . . . . . .Chapter 1 Introduction Nanoscience Toward the end of 1959,science what we now call nanoscience. Feynman envisioned

Meyertholen, Andrew

2009-01-01T23:59:59.000Z

359

Ute Tribe Energy Conference & Expo  

Office of Energy Efficiency and Renewable Energy (EERE)

An international gathering of energy producing Tribes, governments and companies envisioning a path forward towards a more sustainable future.

360

Intermodal Transportation Operation System ( ITOS ) For The State Of California  

E-Print Network (OSTI)

Operation Systems ..31transportation operation system (ITOS) of the future,Transportation Operation System. Figure 8 envisions TMCs as

Hall, Randolph; Parekh, Chethan; Thakker, Viral

1998-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "rsa envision bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Femtosecond all-optical parallel logic gates based on tunable saturable to reverse saturable absorption in graphene-oxide thin films  

SciTech Connect

A detailed theoretical analysis of ultrafast transition from saturable absorption (SA) to reverse saturable absorption (RSA) has been presented in graphene-oxide thin films with femtosecond laser pulses at 800?nm. Increase in pulse intensity leads to switching from SA to RSA with increased contrast due to two-photon absorption induced excited-state absorption. Theoretical results are in good agreement with reported experimental results. Interestingly, it is also shown that increase in concentration results in RSA to SA transition. The switching has been optimized to design parallel all-optical femtosecond NOT, AND, OR, XOR, and the universal NAND and NOR logic gates.

Roy, Sukhdev, E-mail: sukhdevroy@dei.ac.in; Yadav, Chandresh [Department of Physics and Computer Science, Dayalbagh Educational Institute, Dayalbagh, Agra 282 005 (India)] [Department of Physics and Computer Science, Dayalbagh Educational Institute, Dayalbagh, Agra 282 005 (India)

2013-12-09T23:59:59.000Z

362

A new radiation stripline ICRF antenna design for EAST Tokamak  

SciTech Connect

A new type of toroidal long Radiation Stripline Antenna (RSA) is presented, which can effectively improve antenna radiation, leading in reduction of max voltage on transmission line and decrease of the sensitivity to ELM's of the ICRF system at some frequencies. Based on the new concept, a 4-straps RSA is proposed for EAST device. Using 3-D computing simulator code (HFSS), RF current distribution, S-parameters and electromagnetic field distribution on and near the RSA ICRF antenna are analyzed and compared with present ICRF antenna on EAST.

Qin, C. M.; Zhao, Y. P.; Wan, B. N.; Li, J.; Zhang, X. J.; Yang, Q. X.; Yuan, S. [Institute of Plasma Physics, Chinese Academy of Sciences, Hefei 230031 (China); Braun, F. [Max-Planck Institute for Plasma Physics, D-85748, Garching (Germany); Notedame, J.-M. [Max-Planck Institute for Plasma Physics, D-85748, Garching, Germany and University of Gent (Belgium); Kasahara, H. [National Institute for Fusion Science, Toki (Japan); Collaboration: ICRF Team on EAST

2014-02-12T23:59:59.000Z

363

The effectiveness of sulphur when used as a diluent for certain insecticides  

E-Print Network (OSTI)

. Control of Cotton Aphids with Benzene Hexachloride- Clay and Benzene Hexachloride-Sulphur at a Medium Temperature (80-87?F.)..................... 20 IV. Control of Cotton Aphids with Benzene Hexachloride- Clay and Benzene Hexachloride-Sulphur at a Low... Milkweed Bugs with Benzene Hexa- chloride-Clay and Benzene Hexachloride-Sulphur...... J+0 XIV. Control of Large Milkweed Bugs with Chlordan-Clay and Chlordan-Sulphur................ .......... .... 4-2 XV. Control of Large Milkweed Bugs with DDT...

Hanna, Ralph Lynn

2013-10-04T23:59:59.000Z

364

G129 S129 Equipment List Windbreaker  

E-Print Network (OSTI)

(optional) Water shoes (tevas or old tennis shoes) Gaitors (optional) COURSE EQUIPMENT*: Pocket or wrist operated) Bug Spray Deck of cards, musical instrument, Frisbee, etc (optional) * Textbooks should

Polly, David

365

E-Print Network 3.0 - affetti da beta-talassemia Sample Search...  

NLE Websites -- All DOE Office Websites (Extended Search)

Mathematics 32 Modelli e Metodi per la Sicurezza delle Applicazioni Nicola Di Mauro Summary: rendono inefficaci le comuni difese I bug XSS sono facili da sfruttare...

366

California cotton growers utilize integrated pest management  

E-Print Network (OSTI)

economic thresholds in cotton. In: Frisbie RE, Adkission,the Good Bugs in Cotton: Field Guide to Predators, ParasitesInsect and Mite Pests of Cotton. Texas Agricultural

Brodt, Sonja; Goodell, Peter B.; Krebill-Prather, Rose L.; Vargas, Ron N.

2007-01-01T23:59:59.000Z

367

Lygus hesperus Knight in the Texas High Plains: Cotton compensation after fruit damage and host plant selection with implications for cotton IPM.  

E-Print Network (OSTI)

??Texas High Plains is known for its extensive cotton cultivation in the world. Considering the importance of Lygus bug as one of the insect pests (more)

Barman, Apurba K.

2006-01-01T23:59:59.000Z

368

The California Demonstration Program for Control of PM from Diesel...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Backup Generators (BUGs) CARB Verification of Catalyzed Diesel Particulate Filters for Emergency Generator Sets Measuring "Real World" Heavy-Duty Diesel Emissions with a Mobile Lab...

369

V-169: Linux Kernel "iscsi_add_notunderstood_response()" Buffer...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

has been reported in Linux Kernel. REFERENCE LINKS: Secunia Advisory SA53670 Red Hat Bugzilla - Bug 968036 CVE-2013-2850 IMPACT ASSESSMENT: Medium DISCUSSION: The...

370

The California Demonstration Program for Control of PM from Diesel...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

for Control of PM from Diesel Backup Generators (BUGs) David R. Cocker III, Kent Johnson, John Lee, Marla Mueller, Sandip Shah, Bonnie Soriano, Bill Welch Supporting...

371

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

upgrade the printer's firmware with arbitrary code November 29, 2011 U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code Several...

372

E-Print Network 3.0 - attenuata ii accumulation Sample Search...  

NLE Websites -- All DOE Office Websites (Extended Search)

the wild tobacco Nicotiana attenuata Andre Kessler and Ian T. Baldwin Department... plant, Nicotiana attenuata, against Manduca hornworms by prior attack from the mirid bug,...

373

NNSA Nuclear Security Sites Net 18 R&D 100 Awards | National...  

National Nuclear Security Administration (NNSA)

computer tools, including defect detection tools to uncover undetected bugs, code optimization tools to maximize program performance and program transformation tools that allow...

374

Microsoft Word - Accommodates All Generation Storage Options...  

NLE Websites -- All DOE Office Websites (Extended Search)

(BUGs) attractive for interconnection, including methods to significantly reduce their environmental impact. 4. DER will be aggregated. For instance, wind and solar units may be...

375

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

to Remote Users Two vulnerabilities were reported in Bugzilla. July 27, 2012 U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar,...

376

SSRL Web Requests  

NLE Websites -- All DOE Office Websites (Extended Search)

pagesite Change Fix existing form or application Develop new form or application Web-ImagesGraphics Web-Flash Webserver bug - error report Login Help Details of your...

377

blog  

NLE Websites -- All DOE Office Websites (Extended Search)

upc-bug-reports Deadlock during first touch of upcalloc'd remote memory when target is in upcbarrier http:www.nersc.govuserssoftwarecompilers...

378

Remote Access to the BNL Network, Cyber Security, Information Technology  

NLE Websites -- All DOE Office Websites (Extended Search)

Virtual Private Network (VPN) Virtual Private Network (VPN) at Brookhaven CryptoCard tokens (hard or soft) will not supported after December 31, 2010. Please switch to RSA SecurID tokens as soon as possible. Contact the ITD Helpdesk at x5522 (631-344-5522) or send an email to itdhelp@bnl.gov if you have questions or concerns. The VPN service allows remote users to securely access the Brookhaven internal network through their own personal Internet Service Provider, so that it appears as if their home computer is right on the BNL internal network. Requirements Some form of internet connectivity. Only BNL employees can access this service. You must have a RSA SecurID token. Desktop VPN Client Clientless VPN Obtain a RSA SecurID Token RSA SecurID User Guide Last Modified: September 23, 2013

379

Instructions for Using Secure Email via Outlook Web Access | Department of  

NLE Websites -- All DOE Office Websites (Extended Search)

Secure Email via Outlook Web Access Secure Email via Outlook Web Access Instructions for Using Secure Email via Outlook Web Access Outlook Web Access provides access to unencrypted email only and is suitable for use from any computer. Secure Email Requirements: An EITS provided Exchange email account An EITS provided RSA SecureID Token with an active account in the EITS-managed RSA Authentication Server Appropriate access granted Active Directory group membership DOEnet or Internet access and a supported web browser Secure Email Login Procedure: Enter https://smail.doe.gov/ in the address field of your Internet browser. The Outlook Web Access window appears. When using an RSA SecurID hardware token: Enter your user name in the User name field. Enter your password, which is your RSA token PIN plus the number

380

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

91 - 21200 of 26,764 results. 91 - 21200 of 26,764 results. Article T-672: Oracle Critical Patch Update Advisory- July 2011 Due to the threat posed by a successful attack, Oracle strongly recommends that customers apply CPU fixes as soon as possible. This Critical Patch Update contains 78 new security fixes across all product families. http://energy.gov/cio/articles/t-672-oracle-critical-patch-update-advisory-july-2011 Article T-640: RSA Access Manager Server CVE-2011-0322 Update RSA strongly recommends that all customers running RSA Access Manager Server versions 5.5.3, 6.0.4, and 6.1 apply the following updated security hot fixes, which contain the resolution to this issue, at the earliest opportunity. The hot fixes can be downloaded from SecurCare Online or by contacting RSA Security Customer Support.

Note: This page contains sample records for the topic "rsa envision bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

10, 2011 10, 2011 T-644: Prenotification Security Advisory - Adobe Acrobat & Adobe Readers Updates A prenotification Security Advisory has been posted in regards to the upcoming quarterly Adobe Reader and Acrobat updates scheduled for Tuesday, June 14, 2011. The updates will address critical security issues in the products. June 9, 2011 T-643: HP OpenView Storage Data Protector Unspecified Code Execution Vulnerability A vulnerability has been reported in HP OpenView Storage Data Protector, which can be exploited by malicious people to compromise a vulnerable system. June 9, 2011 T-642: RSA SecurID update to Customers RSA investigation has revealed that the attack resulted in certain information being extracted from RSA's systems. Some of that information is related to RSA's SecurID two-factor authentication products

382

Air Permitting for Stationary Sources (New Hampshire)  

Energy.gov (U.S. Department of Energy (DOE))

The permitting system implements the permitting requirements of RSA 125-C and 125-I to regulate the operation and modification of new and existing stationary sources, area sources, and devices to...

383

Global-local Structural Optimization Using Response Surfaces of Local Optimization Margins  

E-Print Network (OSTI)

1 Global-local Structural Optimization Using Response Surfaces of Local Optimization Margins Boyang optimization problems. First, a large number of component optimizations for maximization of margins are performed. Response surface approximations (RSA) for maximum margins of component optimization

Neumaier, Arnold

384

Coherence and causal coherence applied to HRV analysis: a novel approach showing differences between inspiration and expiration  

Science Journals Connector (OSTI)

Heart rate variability (HRV) analysis has been extensively used in the study of the autonomic control of the cardiovascular system. However, the interpretation of respiratory sinus arrhythmia (RSA) has not been u...

D. S. Fonseca; A. Beda; D. M. Simpson

2013-01-01T23:59:59.000Z

385

AllNet: Ubiquitous Interpersonal Communication  

E-Print Network (OSTI)

AllNet: Ubiquitous Interpersonal Communication Edoardo Biagioni University of Hawaii at Mãnoa esb@hawaii (RSA, + AES for long msgs) ­ Then digitally signed I only decrypt if I can verify the signature

Biagioni, Edoardo S.

386

Allnet: Ubiquitous Interpersonal Communication  

E-Print Network (OSTI)

Allnet: Ubiquitous Interpersonal Communication Edoardo Biagioni University of Hawaii at Mãnoa esb@hawaii (RSA, + AES for long msgs) ­ Then digitally signed I only decrypt if I can verify the signature

Biagioni, Edoardo S.

387

Citrix_2FA_Authentication_09.09 | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

More Documents & Publications Microsoft Word - Citrix2FAAuthentication1232009.doc Using Two-Factor RSA Token with WebVPN Microsoft Word - SMailSecureWeb-BasedEmailv3 2...

388

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

was reported in RSA Authentication Manager. July 8, 2013 V-194: Citrix XenServer Memory Management Error Lets Local Administrative Users on the Guest Gain Access on the Host...

389

www.ipm.ucdavis.edu Pistachio Year-Round IPM Program  

E-Print Network (OSTI)

on air and water quality. What should you be doing during this time? Carry out dormant season sanitation for live and parasitized soft scales, paying special attention to previously infested areas. Treat ground cover before bloom for frost protection and to reduce small plant bug and false chinch bug

Ishida, Yuko

390

Examples of spectacular software failure The last three examples from Software Engineering, by Hans Van Vliet.  

E-Print Network (OSTI)

by a software bug in an energy management system sold by General Electric, according to a story on SecurityFocus. The bug meant that a computerized alarm that should have been triggered never went o#, hindering FirstEnergy Kruskal's Algorithm must compute a (i) spanning tree of (ii) minimal cost. Clarity refers to the overall

Soltys, Michael

391

Reid Rosnick/DC/USEPA/US 10/04/2011 10:22 AM  

E-Print Network (OSTI)

(my favorite has been the MBTA), and I hate to bug you about this, but I'm looking at my current with all sorts of projects (my favorite has been the MBTA), and I hate to bug you about this, but I cannot avoid the emergency projects that keep popping up (like the MBTA issue), which unfortunately

392

CADRE: Cycle-Accurate Deterministic Replay for Hardware DebuggingReplay for Hardware Debugging  

E-Print Network (OSTI)

OverheadPerformance Overhead Smruti R. Sarangi 4 #12;Design Bugs An example of a design bug in IBM G3 Power-Determinism Handling Non-Determinism in Busesg CADRE Architecture EvaluationEvaluation Space Overhead PerformanceAND L2 is being invalidated All the L2 lines might not be invalidated Two FeaturesTwo Features

Torrellas, Josep

393

MC-Checker: Detecting Memory Consistency Errors in MPI One-Sided Applications  

E-Print Network (OSTI)

bugs in MPI one-sided applications, with low overhead, ranging from 24.6% to 71.1%, with an average Terms -- Design, Performance, Reliability Keywords -- Bug Detection, MPI, One-Sided Communication I- world application, where the one-sided MPI_Get operation (line 2) is nonblocking. As a result, the data

Balaji, Pavan

394

NEWTON, Ask a Scientist at Argonne National Labs  

NLE Websites -- All DOE Office Websites (Extended Search)

Bacteria Resistance Bacteria Resistance Name: Brittany Status: student Grade: 6-8 Location: AZ Country: USA Date: Spring 2012 Question: Why have bacteria evolved resistance so rapidly? Replies: Suppose you have a bug spray and you use it to exterminate a cloud of mosquitoes. In the cloud of mosquitoes there may be one or two that are immune to the effects of the bug spray. So what you do is kill all the mosquitoes that don't have resistance to the bug spray Leaving behind the mosquitoes that do, and then those remaining mosquitoes regenerate. That is the sad story of how bugs develop resistance to our countermeasures. So far, we have always been able to find a bug spray formula to take care of the present cloud of mosquitoes. Sincere regards, Mike Stewart Brittany, To answer your question, a couple of things need to be considered.

395

Modeling Silicon Photonics in Distributed Computing Systems: From the Device to the Rack  

Science Journals Connector (OSTI)

SiP interconnects are envisioned for large scale distributed computing platforms. In such applications, optical systems involving millions of devices have to be modeled. We review key...

Rumley, Sbastien; Nikolova, Dessislava; Hendry, Robert; Wen, Ke; Bergman, Keren

396

Solar Photovoltaics Technology: The Revolution Begins  

Science Journals Connector (OSTI)

The prospects of solar-photovoltaic (PV) technologies are envisioned, arguing this electricity source is at a tipping point in the complex, worldwide energy outlook. The emphasis of...

Kazmerski, Lawrence L

397

Simulation of an asymmetric contacted carbon nanotube for solar-energy harvesting  

Science Journals Connector (OSTI)

Nanostructured materials offer great prospects in helping solar-energy harvesting devices to achieve their envisioned performances. Carbon nanotubes (CNT)-based devices were among the...

Abdel Rahman, H; Kirah, K; Ghali, H; Anis, W

2014-01-01T23:59:59.000Z

398

Presenter Bio - Tasios Melis, Professor, UC Berkeley  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Berkeley, Tasios Melis envisioned and pioneered the concept of "Photosynthetic Biofuels", entailing the direct application of photosynthesis for the generation of bioenergy,...

399

Post-apartheid transformations and population change around Dwesa-Cwebe nature reserve, South Africa  

E-Print Network (OSTI)

joint management, with ecotourism envisioned as the anchorhopes for the WCSDI and ecotourism-led development, littlethe Nature Reserve and ecotourism proposals may have raised

Fay, Derick A

2011-01-01T23:59:59.000Z

400

Placing technology : examining the emerging use of solar water heaters in Oaxaca, Mexico: Examining the emerging use of solar water heaters in Oaxaca, Mexico.  

E-Print Network (OSTI)

??This study is an examination of the (broadly envisioned) process that has led to the emerging use of solar water heaters in Oaxaca de Jua?rez, (more)

Shannon, Steven Jacob

2011-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "rsa envision bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Understanding the product distribution from biomass fast pyrolysis.  

E-Print Network (OSTI)

??Fast pyrolysis of biomass is an attractive route to transform solid biomass into a liquid bio-oil, which has been envisioned as a renewable substitute for (more)

Patwardhan, Pushkaraj Ramchandra

2010-01-01T23:59:59.000Z

402

First Director Named for Center for Accelerator Science | Jefferson...  

NLE Websites -- All DOE Office Websites (Extended Search)

- is envisioned as a springboard for innovations. In addition to probing the nature of matter, particle accelerators are being used in diverse and rapidly growing fields....

403

Transhuman bodies in contemporary art : plastic possibilities, consumer choices .  

E-Print Network (OSTI)

??This research examines selected visual manifestations of Transhumanism. Transhumanism is an ideology that envisions humankind taking control of its evolution in an attempt to enhance (more)

Pickster, Claire

2014-01-01T23:59:59.000Z

404

The same, only different: Threat management systems as homologues in the tree of life  

E-Print Network (OSTI)

T. , & ,Quirin, M. (2014). Threat and defense: From anxietyto manage uncertainty and threat associated with politicalD.M.T. (2013). Sizing up the threat: The envisioned physical

Holbrook, Colin; Fessler, Daniel M.T.

2015-01-01T23:59:59.000Z

405

Cost Analysis: Technology, Competitiveness, Market Uncertainty...  

Office of Environmental Management (EM)

policy impacts on system financing, and to perform detailed levelized cost of energy (LCOE) analyses. This shows the path to cost-equalizing as envisioned under the...

406

Preserving Consumer Privacy on IEEE 802.11s-Based Smart Grid AMI Networks.  

E-Print Network (OSTI)

??While the newly envisioned smart grid will result in a more efficient and reliable power grid, its use of fine-grained meter data has widely raised (more)

Beussink, Andrew

2014-01-01T23:59:59.000Z

407

Estimated global ocean wind power potential from QuikSCAT observations, accounting for turbine characteristics and siting  

E-Print Network (OSTI)

envisioned floating offshore wind turbines. Finally, global35 ] For the three turbines considered, offshore wind farmsusable wind power is evaluated for modern offshore turbine

Capps, Scott B; Zender, Charles S

2010-01-01T23:59:59.000Z

408

Fermilab | Newsroom | Press Releases | May 23, 2013: Run like...  

NLE Websites -- All DOE Office Websites (Extended Search)

to envision particles zipping around underground when learning about the science at Fermilab. It's another thing entirely for them to pretend to be particles charging along an...

409

FORGE Home | Department of Energy  

Energy Savers (EERE)

FORGE Home The Energy Department envisions Frontier Observatory for Research in Geothermal Energy (FORGE) as a dedicated site where scientists and engineers will be able to...

410

E-Print Network 3.0 - anion receptor based Sample Search Results  

NLE Websites -- All DOE Office Websites (Extended Search)

that is... be envisioned: a binary mixture of cation receptor and ... Source: Smith, Bradley D. - Department of Chemistry and Biochemistry, University of Notre Dame...

411

Using Atomic Clocks to Detect Gravitational Waves  

E-Print Network (OSTI)

Atomic clocks have recently reached a fractional timing precision of $test masses separated by less than a GW wavelength, currently envisioned for the eLISA mission.

Loeb, Abraham

2015-01-01T23:59:59.000Z

412

E-Print Network 3.0 - attali thomas jensen Sample Search Results  

NLE Websites -- All DOE Office Websites (Extended Search)

in Concurrency (SecCo'05), San Francisco, USA : (2005)" 12;Attali, Caromel, Henrio, Luna Del Aguila includes... security frameworks, can be envisioned for secured 2...

413

U-267: RSA® Authentication Agent 7.1 for Microsoft Windows® and RSA®  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: RSA® Authentication Agent 7.1 for Microsoft Windows® and 7: RSA® Authentication Agent 7.1 for Microsoft Windows® and RSA® Authentication Client 3.5 Access Control Vulnerability U-267: RSA® Authentication Agent 7.1 for Microsoft Windows® and RSA® Authentication Client 3.5 Access Control Vulnerability September 25, 2012 - 6:00am Addthis PROBLEM: RSA® Authentication Agent 7.1 for Microsoft Windows® and RSA® Authentication Client 3.5 Access Control Vulnerability PLATFORM: Product: RSA Authentication Agent for Microsoft Windows version 7.1 Platforms: Windows XP and Windows 2003 Product: RSA Authentication Client 3.5 Platforms: Windows XP and Windows 2003 ABSTRACT: RSA Authentication Agent Lets Remote Authenticated Users Bypass an Authentication Step reference LINKS: SecurityTracker Alert ID: 1027559 Bugtraq ID: 55662

414

Proxy Documentation, Cyber Security, Information Technology Division, ITD  

NLE Websites -- All DOE Office Websites (Extended Search)

Proxy Configuration Proxy Configuration Here you will find instructions for using the FTP and Web proxies. Keep in mind that depending on where you access the proxies from (whether you are inside or outside of the BNL network), the process will differ slightly. For FTP, you will not be required to enter any passwords to use the proxies while on the BNL network. However, when accessing the proxies from an outside network (e.g. anything not .bnl.gov), you will be required to authenticate using a RSA SecurID Token. If you do not already have one of these, please visit the RSA SecurID User Guide for instructions on obtaining one. Users who are only interested in configuring their web browsers need NOT bother with RSA SecurID, as the web proxies will not be needed when you are outside the BNL network.

415

Safety Research and Outreach IN THIS ISSUE  

E-Print Network (OSTI)

cameras Envisioning a traffic safety culture CTS marks first decade Teens in the Driver Seat receives ITE FOR TRANSPORTATION SAFETY Envisioning a traffic safety culture Guest editorial from Dr. Bella Dinh-Zarr, SafetySafety Research and Outreach IN THIS ISSUE TTI study underscores safety benefits of red light

416

What kind of city have we shaped? How is our city shaping us?  

E-Print Network (OSTI)

What kind of city have we shaped? How is our city shaping us? How do we envision a healthy vehicle in Oklahoma is $8,776 per year. #12;How is our city shaping us? Low-density, segregated use kind of city have we shaped? How is our city shaping us? How do we envision a healthy community? #12

Oklahoma, University of

417

REMOTE ACCESS SERVICES | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

REMOTE ACCESS SERVICES REMOTE ACCESS SERVICES REMOTE ACCESS SERVICES Access the information you need... Anywhere. Anytime. Different service providers within the Department offer remote access services based on your specific work requirements. If you need assistance, please contact your individual service provider. Energy IT Services (EITS) Remote Access Services Outlook Web Access RSA Token Login RSA Token Instructions HSPD-12 Login HSPD-12 Badge Instructions Virtual Private Network Instructions Citrix Workplace Instructions Energy Information Administration (EIA) Remote Access Services Outlook Web Access EIA VPN Office of Intelligence and Counterintelligence (IN) Remote Access Services Outlook Web Access Office of Science (SC) Remote Access Services Citrix Workplace Help for EITS Customers

418

Final Progress Report  

SciTech Connect

The objective of this project was to complete the specifications and drawings for a variable speed kitchen exhaust system and the boiler heating system which when implemented will improve the heating efficiency of the building. The design work was focused in two key areas: kitchen ventilation and heating for the Ernie Turner Center building (ETC). RSA completed design work and issued a set of 100% drawings. RSA also worked with a cost estimator to put together a detailed cost estimate for the project. The design components are summarized.

Amy Fredeen

2011-03-21T23:59:59.000Z

419

Open Issues  

NLE Websites -- All DOE Office Websites (Extended Search)

FIXED] JGI data loss in /projectb/sandbox area [purge] FIXED] JGI data loss in /projectb/sandbox area [purge] August 19, 2013 by Kjiersten Fagnan | 0 Comments We have discovered a serious bug in our purge scripts on /global/projectb. The */global/projectb/sandbox* areas are supposed to be immune from the purge (like the project directories); however, there is a bug in the purge script that caused some files to be deleted if they had not been touched for 90+ days (like data in the scratch directories). *The sandbox areas are not backed up*, so if this data was not in more than one location on disk or in HPSS, it has been lost. We have found the bug and have suspended the purge script until the bug is fixed. 0 comments | Read the full post [FIXED] perl 5.16.0 File::Glob() causes crashes August 15, 2013 by Doug Jacobsen | 1 Comments

420

TAO: Contact Us  

NLE Websites -- All DOE Office Websites (Extended Search)

The TAO e-mail address tao-comments@mcs.anl.gov is provided for users to communicate with the TAO developers on topics such as reporting bugs, asking for clarification, asking for help in tracking down bugs, and requesting new features within TAO. We try to respond to this email promptly. Please do not send maintenance requests to the individual TAO authors; all e-mail to tao-comments@mcs.anl.gov is automatically distributed to all of the TAO authors, so our response time using this address will be faster. Guidelines for Bug Reports: The more information that you convey about a bug, the easier it will be for us to target the problem. We suggest providing the following information: If the problem involves installation, then send the entire log file from running make.

Note: This page contains sample records for the topic "rsa envision bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

61 - 28570 of 31,917 results. 61 - 28570 of 31,917 results. Article U-141: Sourcefire Defense Center Bugs Several vulnerabilities were reported in Sourcefire Defense Center. A remote user can conduct cross-site scripting attacks. A remote user can access the database. A remote user can view files on the target system. http://energy.gov/cio/articles/u-141-sourcefire-defense-center-bugs Article U-075: Apache Struts Bug Lets Remote Users Overwrite Files and Execute Arbitrary Code A remote user can execute arbitrary Java code on the target system. http://energy.gov/cio/articles/u-075-apache-struts-bug-lets-remote-users-overwrite-files-and-execute-arbitrary-code Article U-044: HP Operations Agent and Performance Agent Lets Local Users Access a Restricted Directory A local user can access a directory on the target system.

422

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

28, 2011 28, 2011 U-046: Apache mod_proxy/mod_rewrite Bug Lets Remote Users Access Internal Servers Apache mod_proxy/mod_rewrite Bug Lets Remote Users Access Internal Servers. November 25, 2011 U-045: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny Service Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny November 23, 2011 U-044: HP Operations Agent and Performance Agent Lets Local Users Access a Restricted Directory A local user can access a directory on the target system. November 22, 2011 U-043: Attachmate Reflection Buffer Overflow in FTP Client Lets Remote Servers Execute Arbitrary Code A remote server can execute arbitrary code on the connected target system. November 21, 2011 U-042: Mac RealPlayer Multiple Vulnerabilities Multiple vulnerabilities have been reported in Mac RealPlayer, which can be

423

Developer | OpenEI Community  

Open Energy Info (EERE)

bug bug Type Term Title Author Replies Last Post sort icon Discussion bug Image upload with broken thumbnail image Rmckeel 1 13 Aug 2012 - 08:22 Discussion bug "Ghost" entries Rmckeel 1 19 Jun 2012 - 08:05 Groups Menu You must login in order to post into this group. Recent content Thank you Jon, I know about th... Hi Yury-Thank you for your i... source code for OpenEI extensions Timo,My apologies for the ... Browse by region (RaphaelSVGMap) more Group members (19) Managers: Rmckeel Recent members: Yury Katkov Sangduen Timo.Kouwenhoven Jwkropf KingJahfy Graham7781 Ianjkalin Autumn1 Mvdv Sprzesmi Satish Cdonnelly Wzeng Twong Jayhuggins Jorn.aabakken Jweers NickL 429 Throttled (bot load) Error 429 Throttled (bot load) Throttled (bot load) Guru Meditation: XID: 2142253338

424

Clothing, Equipment, & Supplies G426 Basin Analysis in the Field 3 Credits  

E-Print Network (OSTI)

that will be needed upon arrival at the Field Station: Pocket or wrist watch Hand lens Geologic hammer and belt holder, etc.) · Alarm clock (battery operated) · Bug Spray · Deck of cards, musical instrument, Frisbee, etc

Polly, David

425

G129 S129 Clothing/Equipment List/Supply List Windbreaker  

E-Print Network (OSTI)

Pocket or wrist watch Hand lens ­ can be purchased from www.kooters.com Geologic hammer (pointed tip operated) Bug Spray Deck of cards, musical instrument, Frisbee, etc (optional) #12;

Polly, David

426

Fermilab Today  

NLE Websites -- All DOE Office Websites (Extended Search)

scary, but in reality, although this bug has been present in one version of OpenSSL software for almost two years, there is no evidence that hackers were trying to exploit it...

427

Winery pairs vines with volts, leads the way for solar on BPA...  

NLE Websites -- All DOE Office Websites (Extended Search)

vineyard. You'll find productive bugs, not poisons. And now, you'll also find 4,100 solar panels, painstakingly placed on the 1,000 acre estate to harvest the sun's rays. The...

428

Statewide IPM Program SURENDRADARA,UCCE  

E-Print Network (OSTI)

Extension office. To learn where Bagrada bug is established and how to manage it, go to the UC IPM web site with dark markings as they get older. Newly molted nymphs and adults are also red but quickly darken. #12;

Ishida, Yuko

429

IFDB: Decentralized Information Flow Control for Databases  

E-Print Network (OSTI)

Numerous sensitive databases are breached every year due to bugs in applications. These applications typically handle data for many users, and consequently, they have access to large amounts of confidential information.

Schultz, David

430

Codetrail: Connecting source code and web resources  

E-Print Network (OSTI)

When faced with the need for documentation, examples, bug fixes, error descriptions, code snippets, workarounds, templates, patterns, or advice, software developers frequently turn to their web browser. Web resources both ...

Goldman, Max

431

They are heavy and they're not even my brothers  

Science Journals Connector (OSTI)

... JohnWhitfield The golden egg bug carries a dangerously heavy load, for no apparent reason. John Whitfield wonders what's going on. It's not easy being a golden egg ...

John Whitfield

2000-04-11T23:59:59.000Z

432

Development and Applications of Catalyzed Diesel Particulate...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

of Sd-Chemie c-DPF For BUG Emission Reduction * Test Cycle: ISO 8178 D2 Five Model * Diesel Engine: Cat 3406C, 350KW, 14liter, 1800rpm * Test Fuel: CARB 2 Diesel Fuel * 0...

433

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

14, 2012 V-047: IBM Lotus Foundation Multiple Cross Site Scripting Two vulnerabilities have been reported in IBM Lotus Foundations. December 13, 2012 V-046: Adobe Flash Player Bugs...

434

E-Print Network 3.0 - aldrin Sample Search Results  

NLE Websites -- All DOE Office Websites (Extended Search)

3 July 20, 1969 The day software bugs nearly Summary: :38:32 Aldrin: 1202. 102:38:42 Armstrong (To Buzz) What is it? Let's incorporate (the landing radar data). (To... ) We're Go...

435

New Life for an Old Drug: the Anthelmintic Drug Niclosamide Inhibits Pseudomonas aeruginosa Quorum Sensing  

Science Journals Connector (OSTI)

...mellonella insect model of infection (33). Larvae of the wax moth G. mellonella are extremely sensitive to P. aeruginosa...2006. Bad bugs need drugs: an update on the development pipeline from the Antimicrobial Availability Task Force of the Infectious...

Francesco Imperi; Francesco Massai; Cejoice Ramachandran Pillai; Francesca Longo; Elisabetta Zennaro; Giordano Rampioni; Paolo Visca; Livia Leoni

2012-12-17T23:59:59.000Z

436

mem.c  

E-Print Network (OSTI)

This is useful to detect bugs in the GC and the rest of the. 36, * system. ...... 859, * Contraction of the msections structure is not performed. 860, * because there is...

437

U-156: Red Hat update for JBoss Enterprise Portal Platform |...  

Office of Environmental Management (EM)

Addthis Related Articles V-138: Red Hat update for icedtea-web V-233: Red Hat update for JBoss Fuse T-712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update...

438

U-200: Red Hat Directory Server Information Disclosure Security...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Passwords to Remote Authenticated and Local Users V-041: Red Hat CloudForms Multiple Vulnerabilities T-712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update...

439

Automatic intrusion recovery with system-wide history  

E-Print Network (OSTI)

Compromises of our computer systems are inevitable. New software vulnerabilities are discovered and exploited daily, but even if the software is bug-free, administrators may inadvertently make mistakes in configuring ...

Kim, Taesoo, Ph. D. Massachusetts Institute of Technology

2014-01-01T23:59:59.000Z

440

Lens-array PDV Probe Using a Pyramid Prism  

SciTech Connect

A bug eye probe is shown using a pyramid prism, and its advantages and disadvantages are enumerated. Also shown is abug eye imaging probe, with its advantages and disadvantages enumerated.

Malone, R. M., Kaufman, M. I., Cox, B., Romero, V., Cata B., Sorenson, D. Pazuchanics, P.

2011-11-01T23:59:59.000Z

Note: This page contains sample records for the topic "rsa envision bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Max-CSP Approach for Software Diagnosis  

Science Journals Connector (OSTI)

In software development is essential to have tools for the software diagnosis to help the programmers and development engineers to locate the bugs. In this paper, we propose a new approach that identifies the pos...

R. Ceballos; Rafael M. Gasca

2002-01-01T23:59:59.000Z

442

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

bulletins on May 8, 2012, at 11:00 AM Pacific Time (US & Canada). May 7, 2012 U-163: PHP Command Parameter Bug Lets Remote Users Obtain Potentially Sensitive Information and...

443

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

view files on target system running the IP Office Manager software. June 15, 2011 T-647: PHP File Upload Bug May Let Remote Users Overwrite Files on the Target System PHP is prone...

444

JC3 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

bugs, and others likely to follow shortly. April 25, 2013 V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code A vulnerability was reported in Oracle...

445

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

bugs, and others likely to follow shortly. April 25, 2013 V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code A vulnerability was reported in Oracle...

446

Cabala : a speculative execution framework to make Linux services fault tolerant  

E-Print Network (OSTI)

Cabala is a speculative execution framework that enables server programs in Linux to be fault tolerant. The errors it targets are run-time errors that are due to program bugs, and which cause program exit; in particular, ...

Joshi, Kavya (Kavya U.)

2013-01-01T23:59:59.000Z

447

Privacy Tradeoffs in eCommerce: Agent-based Delegation for Payoff Maximization Abdulsalam Yassine+  

E-Print Network (OSTI)

like never before, it has also made it possible for unknown characters to surreptitiously watch users such as HTTP cookies, Flash cookies, Web bugs, bots, etc. allow service providers to monitor users' behavior

Ottawa, University of

448

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

has issued an update for java-1.7.0-openjdk. January 17, 2013 V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service A vulnerability has been...

449

Brede tools and federating online neuroinformatics databases Finn Arup Nielsen  

E-Print Network (OSTI)

Information Framework (NIF) that uses the Neuro- science Information Framework standardized (NIF- STD) ontology (Bug et al, 2008). With this ontology NIF performs term expansion from a user query. The expanded

450

V-177: VMware vCenter Chargeback Manager File Upload Handling...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Vendor recommends updating to version 2.5.1 Addthis Related Articles U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code U-048:...

451

T-699: EMC AutoStart Buffer Overflows Let Remote Users Execute...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

EMC AutoStart Technical Info EMC Support Addthis Related Articles U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code T-639:...

452

U-048: HP LaserJet Printers Unspecified Flaw Lets Remote Users...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

AutoStart Buffer Overflows Let Remote Users Execute Arbitrary Code U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code U-052:...

453

Management Strategies for the Potato Psyllid in California  

E-Print Network (OSTI)

on injurious Utah insects: potato psyllid. Proc. Utah Acad.eyed bug predator of the potato psyllid. Fl. Entomol. 18:Knowlton, G. F. 1934b. Potato psyllid investigations. Proc.

Butler, Casey

2011-01-01T23:59:59.000Z

454

ExMAn: A Generic and Customizable Framework for Experimental Mutation Analysis #  

E-Print Network (OSTI)

analysis using Path Inspector and to compare concurrent testing using ConTest with model checking [BCD05 approach using code inspection, static analysis (FindBugs, Jlint), dynamic analysis and testing [LDG + 04

Graham, Nick

455

U-017: HP MFP Digital Sending Software Lets Local Users Obtain...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

vulnerability. HP MFP Digital Sending Software v4.20 can be downloaded from HP Driver, Patch, Security and Support Addthis Related Articles V-210: HP LaserJet Pro Printer Bug Lets...

456

T-575: OpenLDAP back-ndb Lets Remote Users Authenticate Without...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

LDAP Authentication Bug Lets Remote Users Bypass Authentication U-185: OpenLDAP May Ignore TLSCipherSuite Setting in Some Cases T-535: Oracle Critical Patch Update - January 2011...

457

Aggregate modeling of multi-processing workstations  

E-Print Network (OSTI)

repair errors in the design of a full system and permit the replacement of the FPGAs with ASICs once bugs) portion of the PE. The basic structure of the processor chip is shown in Figure 2, and the pipelining

Wierman, Adam

458

A Multiprocessor Viterbi Decoder Using Xilinx FPGAs David Yeh, Paul Chow, Gennady Feygin  

E-Print Network (OSTI)

repair errors in the design of a full system and permit the replacement of the FPGAs with ASICs once bugs) portion of the PE. The basic structure of the processor chip is shown in Figure 2, and the pipelining

Chow, Paul

459

V-165: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote...  

Office of Environmental Management (EM)

T-551: Cisco Security Advisory: Multiple Cisco WebEx Player Vulnerabilities U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs U-239:...

460

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

be exploited by malicious people to compromise a user's system. March 9, 2012 U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting...

Note: This page contains sample records for the topic "rsa envision bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

be exploited by malicious people to compromise a user's system March 20, 2013 V-115: Apple iOS Bugs Let Local Users Gain Elevated Privileges Several vulnerabilities were...

462

V-025: Bugzilla Multiple Cross Site Scripting and Information...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

to version 3.6.12, 4.0.9, or 4.2.4 or apply patches. Addthis Related Articles V-080: Apple iOS Multiple Vulnerabilities T-568: Mozilla Firefox Bugs Let Remote Users Conduct...

463

Annotated Production Systems: A Model for Skill Acquisition  

E-Print Network (OSTI)

Annotated Production Systems provide a procedural model for skill acquisition by augmenting a production model of the skill with formal commentary describing plans, bugs, and interraltionships between various productions. ...

Goldstein, Ira P.

1977-02-01T23:59:59.000Z

464

readme.22  

E-Print Network (OSTI)

Kenneth Gielow 1 Z80DIS 2.2 04/18/87 Version 2.2 change note: Version 2.0 added artificial intelligence to Z80DIS. Version 2.1 corrected a small bug in the...

465

July/August 2006 West Nile Spraying and Bees Lead a Bee To Water Tips from Award Winner  

E-Print Network (OSTI)

the Sac/Yolo Mosquito and Vector Control agency had to make aerial applications of an "adulticide good and bad bugs, would be killed. The Sac/Yolo Vector Control personnel have worked for years

Ferrara, Katherine W.

466

Deadlock during first touch of upc_alloc'd remote memory when...  

NLE Websites -- All DOE Office Websites (Extended Search)

Parallel C) UPC Bug Reports Deadlock during first touch of upcalloc'd remote memory when target is in upcbarrier Deadlock during first touch of upcalloc'd remote memory...

467

E-Print Network 3.0 - above-ground beetle species Sample Search...  

NLE Websites -- All DOE Office Websites (Extended Search)

A good bug with some bad habits The multi-colored Asian lady beetle (Harmonia axyridis Pallas) is a native of Asia and is relatively new Summary: species, it has readily adapted to...

468

E-Print Network 3.0 - alaskan beetle upis Sample Search Results  

NLE Websites -- All DOE Office Websites (Extended Search)

A good bug with some bad habits The multi-colored Asian lady beetle (Harmonia axyridis Pallas) is a native of Asia and is relatively new Summary: The Multi-Colored Asian Lady...

469

Cyber Security Expert Jim Mellander Retires from NERSC  

NLE Websites -- All DOE Office Websites (Extended Search)

experts, but not to a bug or a virus. Jim Mellander, senior cybersecurity engineer at NERSC, is retiring November 1. He's been with NERSC since 2009 and affiliated with...

470

Implementing the Pecos River Watershed Protection Plan through Invasive Species Control and by Providing Technical and Financial Assistance to Reduce Agricultural Nonpoint Source Pollution  

E-Print Network (OSTI)

leaf beetle Successful defoliation of saltcedar continued in 2013 as well and with the extensive distribution of beetles from their release sites, beetle collections were kept to a minimum. In some locations, beetles have been observed about 50.../salt-cedar-bugs-found-eddy- county; https://today.agrilife.org/2013/07/29/theres-a-new-bug-in-town/). [9] Figure 6: Saltcedar biological release sites and chemical control distribution south of I-10 Figure 7: Saltcedar biological release...

Gregory, L.; Porter, A.; Knutson, A.; Muegge, M.

2013-01-01T23:59:59.000Z

471

BNL/SNS TECHNICAL NOTE Dan T. Abell  

E-Print Network (OSTI)

NATIONAL LABORATORY UPTON, NEW YORK 11973 Bugs in UAL/TEAPOT Map for a Sector Bend #12;BUGS IN UAL/TEAPOT such arguments to show that the UAL/TEAPOT Taylor map for a sector bend contains terms not present in the actual by respectively UAL/TEAPOT 2] and MaryLie 1] for a pure sector bend. The maps agree to rst order, but some

472

Rice Insect Management.  

E-Print Network (OSTI)

and vegetative grov. ) , Variety selection is important, not only because of response to nitrogen in relation to larval rice water we---.) damage, but also because certain varieties show some resistan ce/tolerance to rice water weevil and rice stink bug... and vegetative grov. ) , Variety selection is important, not only because of response to nitrogen in relation to larval rice water we---.) damage, but also because certain varieties show some resistan ce/tolerance to rice water weevil and rice stink bug...

Drees, Bastiaan M.

1983-01-01T23:59:59.000Z

473

(mercury.yukawa.kyoto-u.ac.jp)ssh Permission denied (publickey).  

E-Print Network (OSTI)

SSH Q&A (mercury.yukawa.kyoto-u.ac.jp)ssh Permission denied (publickey). (1) ID ID ID (2) ssh -i () ssh -i $HOME/.ssh/id_yitp_rsa (UID)@mercury.yukawa.kyoto-u.ac.jp (3) (1)(2) Permission denied support@yukawa.kyoto-u.ac.jp (mercury

Shimizu, Akira

474

Computer Engineering Mekelweg 4,  

E-Print Network (OSTI)

. In the recent years, renewed interest has been payed to Residue Number Systems (RNS), due to their ability ENGINEERING by Nicoleta CUCU-LAURENCIU born in Brasov, Romania Computer Engineering Department of Electrical, as required by the RSA cryptosystem. In the recent years, renewed interest has been payed to Residue Number

Kuzmanov, Georgi

475

RANDALL STOUT, FAIA, RAIC, AAA, LEED AP, NCARB, CCIDC  

E-Print Network (OSTI)

RANDALL STOUT, FAIA, RAIC, AAA, LEED ® AP, NCARB, CCIDC Curriculum Vitae Randall Stout, FAIA responsibility, Stout is a LEED accredited architect whose sustainable strategies are an integral part of his level of project innovation and productivity. RSA has completed projects in the U.S., Canada and Europe

Hemmers, Oliver

476

TR-IIS-06-001 On the Satisfiability of Modular  

E-Print Network (OSTI)

TR-IIS-06-001 On the Satisfiability of Modular Arithmetic Formula Bow-Yaw Wang January 24, 2006 the Satisfiability of Modular Arithmetic Formula Bow-Yaw Wang Institute of Information Science Academia Sinica Taiwan used in the design of cryptosystems and pseudo random number generators. In the RSA public key system

Chen, Sheng-Wei

477

Z Goldschmidt Abstracts 2011  

Science Journals Connector (OSTI)

...in the wet plasma mode. Long-term...centres and a large stratovolcano...Atlantic area. This feature...historical atmospheric deposition...CO2 in the atmosphere, and thus...rates and larger amounts of...reactive surface area (RSA) specified...1-1.5 MHz) and dynamic...other hand, large shear strain...ore cluster area, has great...

478

@Yuan Xue (yuan.xue@vanderbilt.edu) Fall 2006CS 291 Network Security Email Security  

E-Print Network (OSTI)

-128/IDEA/3DES in CFB mode one-time session key ElGamal/RSA #12;@Yuan Xue (yuan in CFB mode two 64-bit ciphertext as the 128-bit session key Two 64-bit blocks from a 128-bit random

479

Mobile and Ubiquitous Compu3ng Privacy, Security and Trust  

E-Print Network (OSTI)

g.roussos@dcs.bbk.ac.uk #12;· Security of RFID · Privacy and UUIIDs in RFID issues · Major privacy concerns #12;RFID Constella3ons Juels, 2005 Tag Constellations Uniquely Identify an Individual #12;Privacy debate · RSA CEO "would be very worried

Roussos, George

480

Defining Strong Privacy for RFID and Stephen A. Weis2  

E-Print Network (OSTI)

, widespread adoption of retail RFID could raise privacy concerns for everyday consumers. Briefly, RFID systemsDefining Strong Privacy for RFID Ari Juels1 and Stephen A. Weis2 1 RSA Laboratories, Bedford, MA April 2006 Abstract. In this work, we consider privacy in Radio Frequency IDentification (RFID) systems

Note: This page contains sample records for the topic "rsa envision bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

PROTECTION AGAINST IONISING Emergency Procedures -Page 13  

E-Print Network (OSTI)

... ... ... ... ... ... ... ... ... ... 9 Storage of Radioactive Materials in Laboratories... ... ... ... ... ... 10 Radioactive Waste: Rules for Depositing Radioactive Wastes in the Central Waste Stores ... 24 Appendix H: Restriction Radioactive Waste will enable radiation workers to comply with IRR99 and RSA93. Differences at Ninewells

Davidson, Fordyce A.

482

Cornell University, Office of Sponsored Programs  

E-Print Network (OSTI)

CONSTRAINING DARK ENERGY AND MODIFIED GRAVITY WITH EUCLID: RSA #1478527 70095 $ 5,000.00 BONNEY, RICHARD E CALS Lab of O - Programs SERC BUILDING THE FIELD OF PARTICIPATION IN SCIENTIFIC RESEARCH 68149 $ 22 of O - Administration NSF BIO PRELIMINARY PROPOSAL: GENOME-WIDE DYNAMICS OF NEUTRAL AND FITNESS

483

Contract Signature Using Quantum Information  

E-Print Network (OSTI)

This paper describes how to perform contract signature in a fair way using quantum information. The protocol proposed permits two partners, users of a communication network, to perform a contract signature based on the RSA security. The authentication of the signers is based on the use of a non-local XOR function of two classical bits.

Paulo Benicio Melo de Sousa; Rubens Viana Ramos

2007-11-08T23:59:59.000Z

484

Report of the Vice-President Research University of Saskatchewan  

E-Print Network (OSTI)

Report of the Vice-President Research University of Saskatchewan Review of Activities - June 2006 and artistic (RSA) activities and enhancing the research culture at the University of Saskatchewan. This report of Saskatchewan Chairs Program Over the past six months the subcommittee of the Joint Committee of Chairs

Patterson, William P.

485

Full Local Repository 2) Create and/or Modify Code  

E-Print Network (OSTI)

, select Utilities, then select Terminal 2) In the Terminal window type "git" and press return 3) If you't enter a Passphrase! 6) Click Close when the key creation completes #12;You need to register the RSA key key 2) Copy the key to the clipboard #12;How it looks on a Mac #12;#12;#12;Rstudio allows us to create

Dahl, David B.

486

Overview of physical oceanographic measurements taken during the Mt. Mitchell Cruise to the ROPME Sea Area  

SciTech Connect

The ROPME Sea Area (RSA) is one of the most important commercial waterways in the world. However, the number of direct oceanographic observations is small. An international program to study the effect of the Iraqi oil spill on the environment was sponsored by the ROPME, the Intergovernmental Oceanographic Commission, and the National Oceanic and Atmospheric Administration (NOAA).

Reynolds, R.M.

1993-03-31T23:59:59.000Z

487

Changes in Root Surface Area, Nutrient Absorption Activity, and Root Carbohydrate Concentration during Crop Cycles of Rosa hybrida  

E-Print Network (OSTI)

Shields Ave., Davis, CA 95616, USA 2 Protected Horticulture Experiment Station National Horticulture over such crop cycles under conditions of high or low light. A sequential harvest experiment. Plant RSA did not change significantly during the high light crop cycle and averaged 14400 cm2 plant-1

Lieth, J. Heinrich

488

Identification of dominant antigens recognized by sera of sheep and mice experimentally infected with Coxiella burnetii  

E-Print Network (OSTI)

the immunodominant antigens during infection with C. burnetii, two experimental animal models were studied. Mice were infected intraperitonally with a sub-lethal challenge dose of phase I, Nine Mile strain of C. burnetii (RSA439) and antibody response was monitored...

Cron, Lorelei Elaine

2012-06-07T23:59:59.000Z

489

An Elementary Proof of a Theorem of Johnson and Lindenstrauss  

E-Print Network (OSTI)

An Elementary Proof of a Theorem of Johnson and Lindenstrauss Sanjoy Dasgupta,1 Anupam Gupta2 1 AT@research.bell-labs.com Received 16 December 2001; accepted 11 July 2002 DOI 10.1002/rsa.10073 ABSTRACT: A result of Johnson of Johnson and Lindenstrauss [13] says that any n point subset of Euclidean space can be embedded in k O

Gupta, Anupam

490

Invisibility and Anonymity of Undeniable and Con rmer Steven D. Galbraith ?1 and Wenbo Mao 2??  

E-Print Network (OSTI)

Invisibility and Anonymity of Undeniable and Con#12;rmer Signatures Steven D. Galbraith ?1, the strongest notion of security for undeniable and con#12;rmer sig- natures is invisibility under adaptive the schemes of Camenisch and Michels, but it does not have invisibility. We give an RSA-based scheme which

Galbraith, Steven

491

Nitrate-responsive miR393/AFB3 regulatory module controls root system architecture in  

E-Print Network (OSTI)

environmental conditions is the modulation of root system architecture (RSA) in response to nitrate supplyNitrate-responsive miR393/AFB3 regulatory module controls root system architecture in ArabidopsisR393/AFB3 is a unique N- responsive module that controls root system architecture in response

Green, Pamela

492

Practical Key-Recovery for All Possible Parameters of SFLASH  

E-Print Network (OSTI)

function over a finite field. However, unlike RSA this power function is an easy-to-invert bijec- tion a new practical key-recovery attack on the SFLASH signature scheme. SFLASH is a derivative of the older from the public-key. The attack uses new crypt- analytic tools, most notably pencils of matrices

Fouque, Pierre-Alain

493

TwoKind Authentication: Usable Authenticators for Untrustworthy Environments  

E-Print Network (OSTI)

damage if the session or their password is compromised. 1. INTRODUCTION In today's Internet. Current authentication mechanisms such as one-time passwords [4] (such as RSA SecurID [3]) and privileged-time passwords limit the damage caused by stolen passwords, but allow full-scale damage in a hijacked session

Smith, Sean W.

494

Cost-effectiveness of freeway median high occupancy vehicle (HOV) facility conversion to rail guideway transit  

E-Print Network (OSTI)

Many freeways in the United States contain median high occupancy vehicle (HOV) facilities. These facilities have been envisioned by some as reserved space for future rail guideway transit. This thesis examines the cost-effectiveness of converting a...

Best, Matthew Evans

2012-06-07T23:59:59.000Z

495

Dynamics of Dielectrophoretic Liquid Microactuation T. B. Jones  

E-Print Network (OSTI)

) are envisioned. The microfluid mechanics of DEP actuation are complex and not entirely well understood, due in the practical application of DEP microactuation. Keywords: dielectrophoresis, microfluidics, laboratory, we report progress made in understanding these interesting microfluid dynamics. MICROFLUIDICS

Jones, Thomas B.

496

Winners announced for Second Annual STEM Challenge  

NLE Websites -- All DOE Office Websites (Extended Search)

save the world "one pod at a time." The team envisioned futuristic bio pods that produce biodiesel with the help of algae and integrated solar panels into their design to generate...

497

Alternative Value Chains for Biomass Conversion to Chemicals  

Science Journals Connector (OSTI)

Whereas biomass conversion is widely envisioned to proceed via platform molecules that are employed as building blocks to produce chemicals, an alternative value chain is proposed that ... and cost effective rout...

Pierre Gallezot

2010-09-01T23:59:59.000Z

498

Structural materials issues for the next generation fission reactors  

Science Journals Connector (OSTI)

Generation-IV reactor design concepts envisioned thus far cater to ... longer lasting, proliferation-resistant, and economically viable nuclear power plants. The foremost consideration in the successful developme...

I. Chant; K. L. Murty

2010-09-01T23:59:59.000Z

499

A review of wireless and PLC propagation channel characteristics for smart grid environments  

Science Journals Connector (OSTI)

Wireless, power line communication (PLC), fiber optic, Ethernet, and so forth are among the communication technologies on which smart grid communication infrastructure is envisioned to be built. Among these, wireless and PLC-based solutions are attractive ...

Sabih Gzelgz; Hseyin Arslan; Arif Islam; Alexander Domijan

2011-01-01T23:59:59.000Z

500

Multimaterial fiber electronics  

E-Print Network (OSTI)

As the number of materials that are thermally-drawable into fibers is rapidly expending, numerous new multimaterial fiber architectures can be envisioned and fabricated. High-melting temperature metals, compound materials, ...

Lestoquoy, Guillaume

2014-01-01T23:59:59.000Z