Powered by Deep Web Technologies
Note: This page contains sample records for the topic "users execute arbitrary" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary...  

Broader source: Energy.gov (indexed) [DOE]

Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct...

2

U-004:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov [DOE]

A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

3

V-015: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users  

Broader source: Energy.gov (indexed) [DOE]

5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, 5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information V-015: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information November 2, 2012 - 6:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information PLATFORM: Apple iOS prior to 6.0.1 ABSTRACT: Three vulnerabilities were reported in Apple iOS. REFERENCE LINKS: Apple Article: HT5567 SecurityTracker Alert ID: 1027716 Bugtraq ID: 56363 CVE-2012-3748 CVE-2012-3749 CVE-2012-3750 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the

4

V-104: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code...  

Broader source: Energy.gov (indexed) [DOE]

Code V-104: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code March 5, 2013 - 12:53am Addthis PROBLEM: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code...

5

V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code |  

Broader source: Energy.gov (indexed) [DOE]

3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code 3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code March 18, 2013 - 1:53am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 6.0.3 ABSTRACT: Two vulnerabilities were reported in Apple Safari. REFERENCE LINKS: Apple security update, Article: HT1222 SecurityTracker Alert ID: 1028292 CVE-2013-0960 CVE-2013-0961 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. IMPACT: A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

6

U-258: Adobe Flash Player Flaw Lets Remote Users Execute Arbitrary Code |  

Broader source: Energy.gov (indexed) [DOE]

8: Adobe Flash Player Flaw Lets Remote Users Execute Arbitrary 8: Adobe Flash Player Flaw Lets Remote Users Execute Arbitrary Code U-258: Adobe Flash Player Flaw Lets Remote Users Execute Arbitrary Code September 12, 2012 - 1:07pm Addthis PROBLEM: Adobe Flash Player Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: 11.3.300.270 and prior (Windows, OS X); 11.2.202.236 and prior (Linux); 11.3.300.270 and prior (Chrome) ABSTRACT: A remote user can cause arbitrary code to be executed on the target user's system. Reference LINKS: CVE-2012-1535 AdobeSecurity/bulletins SecurityTracker IMPACT ASSESSMENT: High Discussion: Vulnerability was reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a specially crafted file that, when loaded by the target user,

7

V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code |  

Broader source: Energy.gov (indexed) [DOE]

3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code 3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code March 18, 2013 - 1:53am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 6.0.3 ABSTRACT: Two vulnerabilities were reported in Apple Safari. REFERENCE LINKS: Apple security update, Article: HT1222 SecurityTracker Alert ID: 1028292 CVE-2013-0960 CVE-2013-0961 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. IMPACT: A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

8

U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users  

Broader source: Energy.gov (indexed) [DOE]

4: Apple OS X Lets Remote Users Execute Arbitrary Code and 4: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges September 20, 2012 - 6:00am Addthis U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges September 20, 2012 - 6:00am PROBLEM: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges PLATFORM: Apple OS X ABSTRACT: Several vulnerabilities were reported in Apple OS X. reference LINKS: Apple Security Article: HT5501 SecurityTracker Alert ID: 1027551 CVE-2012-0650 CVE-2012-3716 CVE-2012-3718 CVE-2012-3719 CVE-2012-3720 CVE-2012-3721 CVE-2012-3722 CVE-2012-3723 IMPACT ASSESSMENT: Medium Discussion: If the DirectoryService Proxy is used, a remote user can trigger a buffer

9

U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users  

Broader source: Energy.gov (indexed) [DOE]

4: Apple OS X Lets Remote Users Execute Arbitrary Code and 4: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges September 20, 2012 - 6:00am Addthis U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges September 20, 2012 - 6:00am PROBLEM: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges PLATFORM: Apple OS X ABSTRACT: Several vulnerabilities were reported in Apple OS X. reference LINKS: Apple Security Article: HT5501 SecurityTracker Alert ID: 1027551 CVE-2012-0650 CVE-2012-3716 CVE-2012-3718 CVE-2012-3719 CVE-2012-3720 CVE-2012-3721 CVE-2012-3722 CVE-2012-3723 IMPACT ASSESSMENT: Medium Discussion: If the DirectoryService Proxy is used, a remote user can trigger a buffer

10

U-136: Adobe Flash Player Lets Remote Users Execute Arbitrary Code |  

Broader source: Energy.gov (indexed) [DOE]

136: Adobe Flash Player Lets Remote Users Execute Arbitrary Code 136: Adobe Flash Player Lets Remote Users Execute Arbitrary Code U-136: Adobe Flash Player Lets Remote Users Execute Arbitrary Code March 29, 2012 - 7:00am Addthis PROBLEM: Adobe Flash Player Lets Remote Users Execute Arbitrary Code PLATFORM: 11.1.102.63 and prior versions ABSTRACT: Two vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system. rEFERENCE LINKS: SecurityTracker Alert ID: 1026859 CVE-2012-0772 Security update available for Adobe Flash Player IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted Flash content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. A memory corruption

11

U-213: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov (indexed) [DOE]

U-213: Google Chrome Multiple Flaws Let Remote Users Execute U-213: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-213: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code July 16, 2012 - 7:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 20.0.1132.57 ABSTRACT: Several vulnerabilities were reported in Google Chrome. reference LINKS: Stable Channel Update SecurityTracker Alert ID: 1027249 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user.

12

U-133: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov (indexed) [DOE]

33: Google Chrome Multiple Flaws Let Remote Users Execute 33: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-133: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code March 26, 2012 - 3:35am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Google Chrome prior to 17.0.963.83 ABSTRACT: Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026841 CVE-2011-3049 Secunia Advisory SA48512 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. A use-after-free may occur

13

U-143: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov (indexed) [DOE]

3: Google Chrome Multiple Flaws Let Remote Users Execute 3: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-143: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code April 9, 2012 - 7:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 18.0.1025.151 ABSTRACT: Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026892 CVE-2011-3066 Secunia Advisory SA48732 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. An out-of-bounds memory

14

T-683:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov (indexed) [DOE]

83:Google Chrome Multiple Flaws Let Remote Users Execute 83:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code T-683:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code August 3, 2011 - 3:45pm Addthis PROBLEM: Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Google Chrome prior to 13.0.782.107 ABSTRACT: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code. reference LINKS: Google Chrome advisory Update Chromium Security SecurityTracker Alert ID: 1025882 CVE-2011-2819 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a specially crafted HTML that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user.

15

U-213: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov (indexed) [DOE]

3: Google Chrome Multiple Flaws Let Remote Users Execute 3: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-213: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code July 16, 2012 - 7:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 20.0.1132.57 ABSTRACT: Several vulnerabilities were reported in Google Chrome. reference LINKS: Stable Channel Update SecurityTracker Alert ID: 1027249 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user.

16

U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary  

Broader source: Energy.gov (indexed) [DOE]

70: Apple QuickTime Multiple Flaws Let Remote Users Execute 70: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code May 16, 2012 - 7:00am Addthis PROBLEM: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: prior to 7.7.2 ABSTRACT: Multiple vulnerabilities were reported in Apple QuickTime. A remote user can cause arbitrary code to be executed on the target user's system. Reference LINKS: SecurityTracker Alert ID: 1027065 CVE-2012-0265 CVE-2012-0663 CVE-2012-0664 CVE-2012-0665 CVE-2012-0666 IMPACT ASSESSMENT: High Discussion: A remote user can create a specially crafted file that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. Only Windows-based systems

17

U-118: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and  

Broader source: Energy.gov (indexed) [DOE]

18: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 18: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information U-118: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information March 6, 2012 - 7:00am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information PLATFORM: Adobe Flash Player 10.x, Adobe Flash Player 11.x ABSTRACT: Two vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can obtain potentially information. reference LINKS: Secunia Advisory SA48281 CVE-2012-0769 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will trigger a memory corruption error in Matrix3D and execute

18

V-006: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and  

Broader source: Energy.gov (indexed) [DOE]

6: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary 6: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service V-006: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service October 19, 2012 - 6:00am Addthis PROBLEM: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service PLATFORM: CA ARCserve Backup for Windows r12.5, r15, r16 ABSTRACT: Two vulnerabilities were reported in CA ARCserve Backup. A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions. REFERENCE LINKS: SecurityTracker Alert ID: 1027683 CA Technologies Support CVE-2012-2971 CVE-2012-2972 IMPACT ASSESSMENT: High DISCUSSION: A remote user can send specially crafted RPC requests to execute arbitrary code on the target system [CVE-2012-2971]. The code will run with the

19

V-006: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and  

Broader source: Energy.gov (indexed) [DOE]

6: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary 6: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service V-006: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service October 19, 2012 - 6:00am Addthis PROBLEM: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service PLATFORM: CA ARCserve Backup for Windows r12.5, r15, r16 ABSTRACT: Two vulnerabilities were reported in CA ARCserve Backup. A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions. REFERENCE LINKS: SecurityTracker Alert ID: 1027683 CA Technologies Support CVE-2012-2971 CVE-2012-2972 IMPACT ASSESSMENT: High DISCUSSION: A remote user can send specially crafted RPC requests to execute arbitrary code on the target system [CVE-2012-2971]. The code will run with the

20

U-088: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary Code |  

Broader source: Energy.gov (indexed) [DOE]

8: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary 8: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary Code U-088: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary Code January 25, 2012 - 6:00am Addthis PROBLEM: A remote user can execute arbitrary code on the target system. PLATFORM: Version(s): 12.5 SP3; pcAnywhere Solutions 7.1 GA, SP 1, and SP 2 ABSTRACT: Two vulnerabilities were reported in Symantec pcAnywhere. A remote user can execute arbitrary code on the target system. A local user can obtain elevated privileges on the target system. reference LINKS: Symantec Advisory Secunia Advisory SecurityTracker Alert ID:102576 IMPACT ASSESSMENT: Medium Discussion: A remote user can send specially crafted data to TCP port 5631 to trigger a but in the validation of authentication data and execute arbitrary code.

Note: This page contains sample records for the topic "users execute arbitrary" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

T-691: Adobe Flash Player Multiple Flaws Let Remote Users Execute Arbitrary  

Broader source: Energy.gov (indexed) [DOE]

1: Adobe Flash Player Multiple Flaws Let Remote Users Execute 1: Adobe Flash Player Multiple Flaws Let Remote Users Execute Arbitrary Code T-691: Adobe Flash Player Multiple Flaws Let Remote Users Execute Arbitrary Code August 11, 2011 - 3:00pm Addthis PROBLEM: Multiple vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Version(s): 10.3.181.36 and prior; 10.3.185.25 and prior for Android. ABSTRACT: Adobe Flash Player Multiple Flaws Let Remote Users Execute Arbitrary Code. reference LINKS: Security Bulletin: APSB11-21 SecurityTracker Alert ID: 1025907 CVE-2011-2425 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted Flash content that, when loaded by the target user, will execute arbitrary code on the target system. The

22

U-160: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov (indexed) [DOE]

60: Google Chrome Multiple Flaws Let Remote Users Execute 60: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-160: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code May 2, 2012 - 7:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Prior to 18.0.1025.168 ABSTRACT: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system reference LINKS: SecurityTracker Alert ID: 1027001 CVE-2011-3078 CVE-2011-3079 CVE-2011-3080 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will trigger a use-after-free, validation error, or race condition and execute arbitrary code on the target system. The code will

23

U-160: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov (indexed) [DOE]

0: Google Chrome Multiple Flaws Let Remote Users Execute 0: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-160: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code May 2, 2012 - 7:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Prior to 18.0.1025.168 ABSTRACT: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system reference LINKS: SecurityTracker Alert ID: 1027001 CVE-2011-3078 CVE-2011-3079 CVE-2011-3080 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will trigger a use-after-free, validation error, or race condition and execute arbitrary code on the target system. The code will

24

U-077: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov (indexed) [DOE]

7: Google Chrome Multiple Flaws Let Remote Users Execute 7: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-077: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code January 9, 2012 - 9:15am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 16.0.912.75 ABSTRACT: A remote user may be able to execute arbitrary code on the target system. reference LINKS: Google Chrome Releases Chromium Security SecurityTracker Alert ID:1026487 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. Specially crafted animation frames can trigger a use-after-free memory

25

U-110: Samba Bug Lets Remote Users Execute Arbitrary Code | Department of  

Broader source: Energy.gov (indexed) [DOE]

0: Samba Bug Lets Remote Users Execute Arbitrary Code 0: Samba Bug Lets Remote Users Execute Arbitrary Code U-110: Samba Bug Lets Remote Users Execute Arbitrary Code February 24, 2012 - 7:30am Addthis PROBLEM: A vulnerability was reported in Samba. PLATFORM: Version(s): prior to 3.4.0 ABSTRACT: A remote user can send specially crafted data to the smbd service to trigger a flaw in chain_reply() and construct_reply() and execute arbitrary code on the target system. reference LINKS: Vendor Advisory Security Tracker ID 1026739 CVE-2012-0870 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Samba. A remote user can execute arbitrary code on the target system. A remote user can send specially crafted data to the smbd service to trigger a flaw in chain_reply() and construct_reply() and execute arbitrary code on the target system. The code will run with the

26

U-074: Microsoft .NET Bugs Let Remote Users Execute Arbitrary...  

Broader source: Energy.gov (indexed) [DOE]

user can redirect users to arbitrary sites. Solution: The vendor has issued a fix. A patch matrix is available in the vendor's advisory. Microsoft Security Bulletin MS11-100...

27

U-208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code |  

Broader source: Energy.gov (indexed) [DOE]

208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary 208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code U-208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code July 10, 2012 - 7:00am Addthis PROBLEM: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code PLATFORM: HP Operations Agent for AIX, HP-UX, Linux, Solaris, and Windows prior to v11.03.12. ABSTRACT: Two vulnerabilities were reported in HP Operations Agent. A remote user can execute arbitrary code on the target system reference LINKS: The Vendor's Advisory SecurityTracker Alert ID: 1027225 CVE-2012-2019 CVE-2012-2020 IMPACT ASSESSMENT: High Discussion: Potential security vulnerabilities have been identified with HP Operations Agent for AIX, HP-UX, Linux, Solaris, and Windows. The vulnerabilities could be remotely exploited resulting in the execution of arbitrary code.

28

V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |  

Broader source: Energy.gov (indexed) [DOE]

10: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 10: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code March 13, 2013 - 12:04am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): 1.6.602.171 and prior for Windows/Mac; other versions on other platforms ABSTRACT: Several vulnerabilities were reported in Adobe Flash Player. REFERENCE LINKS: Adobe Vulnerability identifier: APSB13-09 SecurityTracker Alert ID: 1028277 CVE-2013-0646 CVE-2013-0650 CVE-2013-1371 CVE-2013-1375 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user.

29

V-067: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code |  

Broader source: Energy.gov (indexed) [DOE]

7: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code 7: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code V-067: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code January 11, 2013 - 12:01am Addthis PROBLEM: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Oracle Java Runtime Environment (JRE) 1.7 in Java 7 Update 10 and earlier ABSTRACT: A vulnerability was reported in Oracle Java. REFERENCE LINKS: Seclist.org Vulnerability Note VU#625617 SecurityTracker Alert ID: 1027972 Malware.dontneedcoffee.com CVE-2013-0422 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted Java content that, when loaded by the target user, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user. This vulnerability is being actively exploited.

30

V-067: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code |  

Broader source: Energy.gov (indexed) [DOE]

7: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code 7: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code V-067: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code January 11, 2013 - 12:01am Addthis PROBLEM: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Oracle Java Runtime Environment (JRE) 1.7 in Java 7 Update 10 and earlier ABSTRACT: A vulnerability was reported in Oracle Java. REFERENCE LINKS: Seclist.org Vulnerability Note VU#625617 SecurityTracker Alert ID: 1027972 Malware.dontneedcoffee.com CVE-2013-0422 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted Java content that, when loaded by the target user, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user. This vulnerability is being actively exploited.

31

U-055: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |  

Broader source: Energy.gov (indexed) [DOE]

5: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 5: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code U-055: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code December 8, 2011 - 8:30am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code . PLATFORM: Adobe Flash Player 11.1.102.55 on Windows and Mac OS X and prior versions ABSTRACT: Two vulnerabilities exploited by the Intevydis vd_adobe_fp module in VulnDisco Step Ahead were reported in Adobe Flash Player. reference LINKS: Secunia Advisory: SA47161 SecurityTracker Alert ID: 1026392 CVE-2011-4693 CVE-2011-4694 IMPACT ASSESSMENT: High Discussion: A remote or local user can obtain potentially sensitive information. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a specially crafted SWF file that, when

32

V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |  

Broader source: Energy.gov (indexed) [DOE]

0: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 0: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code March 13, 2013 - 12:04am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): 1.6.602.171 and prior for Windows/Mac; other versions on other platforms ABSTRACT: Several vulnerabilities were reported in Adobe Flash Player. REFERENCE LINKS: Adobe Vulnerability identifier: APSB13-09 SecurityTracker Alert ID: 1028277 CVE-2013-0646 CVE-2013-0650 CVE-2013-1371 CVE-2013-1375 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user.

33

U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary  

Broader source: Energy.gov (indexed) [DOE]

U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code June 6, 2012 - 7:00am Addthis PROBLEM: Multiple vulnerabilities were reported in Mozilla Firefox. PLATFORM: Version(s): prior to 13.0 ABSTRACT: A remote user can cause arbitrary code to be executed on the target user's system. A remote user can conduct cross-site scripting attacks. A remote user can obtain potentially sensitive information. Reference Links: Security Tracker ID 1027120 CVE-2012-0441,CVE-2012-1937 Vendor URL IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system [CVE-2012-1937 , CVE-2012-1938, CVE-2012-1939 ].

34

T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code,  

Broader source: Energy.gov (indexed) [DOE]

3: Apple Safari Multiple Flaws Let Remote Users Execute 3: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks July 21, 2011 - 1:27am Addthis PROBLEM: Multiple vulnerabilities were reported in Apple Safari. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can conduct cross-site scripting attacks. A remote user can obtain potentially sensitive information. A remote user can bypass a certificate validation control. PLATFORM: Safari 5.1 and Safari 5.0.6 Products Affected: Safari 5 (Mac OS X 10.6), Safari 5 (Mac OS X 10.5), Product Security, Safari 5.1 (OS X Lion) ABSTRACT: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code,

35

U-074: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands,  

Broader source: Energy.gov (indexed) [DOE]

4: Microsoft .NET Bugs Let Remote Users Execute Arbitrary 4: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users U-074: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users January 4, 2012 - 8:00am Addthis PROBLEM: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users . PLATFORM: Windows XP Service Pack 3 Windows XP Professional x64 Edition Service Pack 2 Windows Server 2003 Service Pack 2 Windows Server 2003 x64 Edition Service Pack 2 Windows Server 2003 with SP2 for Itanium-based Systems Windows Vista Service Pack 2 Windows Vista x64 Edition Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 Windows Server 2008 for x64-based Systems Service Pack 2

36

T-654: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary |  

Broader source: Energy.gov (indexed) [DOE]

4: Apple QuickTime Multiple Bugs Let Remote Users Execute 4: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary T-654: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary June 24, 2011 - 4:39am Addthis PROBLEM: A vulnerability was reported in QuickTime. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Version(s): prior to QuickTime 7.6.8 ABSTRACT: A remote user can create a specially crafted file that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. reference LINKS: SecurityTracker Alert ID: 1025705 Apple Security Article: HT4339 Apple Security Article: HT4723 Apple Security Article: HT1222 CVE-2011-0213 Secunia Advisory: SA45054 IMPACT ASSESSMENT High Discussion:

37

V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and  

Broader source: Energy.gov (indexed) [DOE]

1: Apple Safari Bugs Let Remote Users Execute Arbitrary Code 1: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks June 5, 2013 - 1:05am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks PLATFORM: Apple Safari prior to 6.0.5 ABSTRACT: Several vulnerabilities were reported in Apple Safari. REFERENCE LINKS: Apple Article: HT5785 SecurityTracker Alert ID: 1028627 CVE-2013-0926 CVE-2013-1009 CVE-2013-1012 CVE-2013-1013 CVE-2013-1023 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary

38

V-095: Oracle Java Flaws Let Remote Users Execute Arbitrary Code |  

Broader source: Energy.gov (indexed) [DOE]

5: Oracle Java Flaws Let Remote Users Execute Arbitrary Code 5: Oracle Java Flaws Let Remote Users Execute Arbitrary Code V-095: Oracle Java Flaws Let Remote Users Execute Arbitrary Code February 20, 2013 - 12:38am Addthis PROBLEM: Oracle Java Flaws Let Remote Users Execute Arbitrary Code PLATFORM: JDK and JRE 7 Update 13 and earlier JDK and JRE 6 Update 39 and earlier JDK and JRE 5.0 Update 39 and earlier SDK and JRE 1.4.2_41 and earlier ABSTRACT: Several vulnerabilities were reported in Oracle Java. REFERENCE LINKS: Updated Release of the February 2013 Oracle Java SE Critical Patch Update SecurityTracker Alert ID: 1028155 CVE-2013-1484 CVE-2013-1485 CVE-2013-1486 CVE-2013-1487 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create a specially crafted Java Web Start application or Java applet that, when loaded by the target user, will execute arbitrary

39

T-650: Microsoft Word Unspecified Flaw Lets Remote Users Execute Arbitrary  

Broader source: Energy.gov (indexed) [DOE]

650: Microsoft Word Unspecified Flaw Lets Remote Users Execute 650: Microsoft Word Unspecified Flaw Lets Remote Users Execute Arbitrary Code T-650: Microsoft Word Unspecified Flaw Lets Remote Users Execute Arbitrary Code June 20, 2011 - 3:35pm Addthis PROBLEM: A vulnerability was reported in Microsoft Word. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Office XP; possibly other versions ABSTRACT: Microsoft Word Unspecified Flaw Lets Remote Users Execute Arbitrary Code. reference LINKS: Secunia Advisory: SA44923 SecurityTracker Alert ID: 1025675 Bugtraq ID: 48261 TSL ID: TSL20110614-02 PRL: 2011-07 IMPACT ASSESSMENT: High Discussion: A code execution vulnerability has been reported in Microsoft Office Word. The vulnerability is due to memory corruption when parsing a specially crafted Word file.

40

V-035: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov (indexed) [DOE]

5: Google Chrome Multiple Flaws Let Remote Users Execute 5: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code V-035: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code November 28, 2012 - 1:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 23.0.1271.91 ABSTRACT: Several vulnerabilities were reported in Google Chrome. REFERENCE LINKS: Release updates from the Chrome team SecurityTracker Alert ID: 1027815 Secunia Advisory SA51437 CVE-2012-5130 CVE-2012-5131 CVE-2012-5132 CVE-2012-5133 CVE-2012-5134 CVE-2012-5135 CVE-2012-5136 IMPACT ASSESSMENT: High DISCUSSION: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create specially crafted content that, when loaded by the

Note: This page contains sample records for the topic "users execute arbitrary" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

V-035: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov (indexed) [DOE]

5: Google Chrome Multiple Flaws Let Remote Users Execute 5: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code V-035: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code November 28, 2012 - 1:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 23.0.1271.91 ABSTRACT: Several vulnerabilities were reported in Google Chrome. REFERENCE LINKS: Release updates from the Chrome team SecurityTracker Alert ID: 1027815 Secunia Advisory SA51437 CVE-2012-5130 CVE-2012-5131 CVE-2012-5132 CVE-2012-5133 CVE-2012-5134 CVE-2012-5135 CVE-2012-5136 IMPACT ASSESSMENT: High DISCUSSION: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create specially crafted content that, when loaded by the

42

U-277: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov (indexed) [DOE]

7: Google Chrome Multiple Flaws Let Remote Users Execute 7: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-277: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code October 9, 2012 - 6:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 22.0.1229.92 ABSTRACT: Several vulnerabilities were reported in Google Chrome. reference LINKS: SecurityTracker Alert ID: 1027617 Stable Channel Update CVE-2012-2900 CVE-2012-5108 CVE-2012-5109 CVE-2012-5110 CVE-2012-5111 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. A crash may occur in Skia text rendering [CVE-2012-2900].

43

V-046: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |  

Broader source: Energy.gov (indexed) [DOE]

46: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 46: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code V-046: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code December 13, 2012 - 3:30am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): 11.5.502.110 and prior for Windows/Mac; 11.2.202.251 and prior for Linux ABSTRACT: Several vulnerabilities were reported in Adobe Flash Player. REFERENCE LINKS: Adobe Vulnerability identifier: APSB12-27 SecurityTracker Alert ID: 1027854 Secunia Advisory SA51560 RHSA-2012:1569-1 CVE-2012-5676 CVE-2012-5677 CVE-2012-5678 IMPACT ASSESSMENT: High DISCUSSION: A buffer overflow can trigger code execution [CVE-2012-5676]. An integer overflow can trigger code execution [CVE-2012-5677]. A memory corruption flaw can trigger code execution [CVE-2012-5678].

44

V-015: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...  

Broader source: Energy.gov (indexed) [DOE]

5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information V-015: Apple iOS Bugs Let Remote...

45

T-684: Apple QuickTime Buffer Overflows Let Remote Users Execute Arbitrary  

Broader source: Energy.gov (indexed) [DOE]

4: Apple QuickTime Buffer Overflows Let Remote Users Execute 4: Apple QuickTime Buffer Overflows Let Remote Users Execute Arbitrary Code T-684: Apple QuickTime Buffer Overflows Let Remote Users Execute Arbitrary Code August 4, 2011 - 3:33pm Addthis PROBLEM: Multiple vulnerabilities were reported in QuickTime. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Apple Quick Time prior to 7.7 ABSTRACT: Apple QuickTime Buffer Overflows Let Remote Users Execute Arbitrary Code. reference LINKS: Apple security updates SecurityTracker Alert ID: 1025884 Mac OS X: Updating your software Support Downloads QuickTime 7.7 IMPACT ASSESSMENT: High Discussion: A specially crafted PICT file can trigger a buffer overflow [CVE-2011-0245]. Mac OS X version 10.7 is not affected. A specially crafted GIF image can trigger a heap overflow [CVE-2011-0246].

46

U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary  

Broader source: Energy.gov (indexed) [DOE]

2: Microsoft Internet Explorer Flaw Lets Remote Users Execute 2: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code September 18, 2012 - 6:00am Addthis PROBLEM: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Internet Explorer 6, 7, 8, 9 ABSTRACT: A vulnerability was reported in Microsoft Internet Explorer. reference LINKS: Bugtraq ID: 55562 Security Database KB2757760 Microsoft Security Advisory (2757760) SecurityTracker Alert ID: 1027538 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system. The code will run with the privileges of the

47

U-140: HP-UX Unspecified Flaw in DCE Lets Remote Users Execute Arbitrary  

Broader source: Energy.gov (indexed) [DOE]

U-140: HP-UX Unspecified Flaw in DCE Lets Remote Users Execute U-140: HP-UX Unspecified Flaw in DCE Lets Remote Users Execute Arbitrary Code U-140: HP-UX Unspecified Flaw in DCE Lets Remote Users Execute Arbitrary Code April 4, 2012 - 7:15am Addthis PROBLEM: A vulnerability was reported in HP-UX PLATFORM: Version(s): 11.11, 11.23; running DCE ABSTRACT: A remote user can execute arbitrary code on the target system. A remote user can send specially crafted data to execute arbitrary code on the target system. The code will run with the privileges of the target service. Reference LINKS: Vendor Advisory Security Tracker ID 1026885 CVE-2012-0131 IMPACT ASSESSMENT: High Discussion: A potential security vulnerability has been identified in HP-UX running DCE. The vulnerability could be exploited remotely to create a Denial of Service (DoS).

48

V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary  

Broader source: Energy.gov (indexed) [DOE]

2: Oracle Java Reflection API Flaw Lets Remote Users Execute 2: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code April 25, 2013 - 12:14am Addthis PROBLEM: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Version(s): 7 Update 21; possibly other versions (1.7.0_21-b11) Java Server JRE is also affected. ABSTRACT: A vulnerability was reported in Oracle Java. REFERENCE LINKS: SecurityTracker Alert ID: 1028466 Oracle IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create a specially crafted Java application that, when loaded and approved by the target user, will trigger a flaw in the Reflection API to bypass the security sandbox. IMPACT: A remote user can create a Java file that, when loaded by the target user,

49

U-254: Webmin Flaws Let Remote Authenticated Users Execute Arbitrary Code  

Broader source: Energy.gov (indexed) [DOE]

54: Webmin Flaws Let Remote Authenticated Users Execute 54: Webmin Flaws Let Remote Authenticated Users Execute Arbitrary Code and View Arbitrary Files U-254: Webmin Flaws Let Remote Authenticated Users Execute Arbitrary Code and View Arbitrary Files September 10, 2012 - 6:00am Addthis PROBLEM: Webmin Multiple Input Validation Vulnerabilities PLATFORM: The vulnerabilities are reported in version 1.580. Other versions may also be affected. ABSTRACT: An authenticated attacker may be able to execute arbitrary commands. reference LINKS: Webmin Security Alerts Bugtraq ID: 55446 Secunia Advisory SA50512 SecurityTracker Alert ID: 1027507 US CERT Vulnerability Note VU#788478 CVE-2012-2981 CVE-2012-2982 CVE-2012-2983 IMPACT ASSESSMENT: Medium Discussion: Multiple vulnerabilities have been reported in Webmin, which can be exploited by malicious users to compromise a vulnerable system and by

50

T-574: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov (indexed) [DOE]

74: Google Chrome Multiple Flaws Let Remote Users Execute 74: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code T-574: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code March 10, 2011 - 3:05pm Addthis PROBLEM: Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can bypass the pop-up blocker. PLATFORM: Google Chrome prior to 10.0.648.127 ABSTRACT: Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact while others can be exploited by malicious people bypass certain security restrictions, disclose system information, and compromise a user's system. reference LINKS: Secunia Advisory: SA43683 Google Chrome Support Chrome Stable Release SecurityTracker Alert ID:1025181

51

U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct  

Broader source: Energy.gov (indexed) [DOE]

21: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, 21: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information March 9, 2012 - 7:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information PLATFORM: Apple iOS Version(s): prior to 5.1 ABSTRACT: Multiple vulnerabilities were reported in Apple iOS. reference LINKS: SecurityTracker Alert ID: 1026774 Apple Security Updates About the security content of iOS 5.1 Software Update CVE-2012-0641, CVE-2012-0642, CVE-2012-0643, CVE-2011-3453, CVE-2012-0644,

52

V-091: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary Code |  

Broader source: Energy.gov (indexed) [DOE]

1: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary 1: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary Code V-091: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary Code February 14, 2013 - 12:22am Addthis PROBLEM: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary Code PLATFORM: Adobe Reader XI (11.0.01 and earlier) for Windows and Macintosh Adobe Reader X (10.1.5 and earlier) for Windows and Macintosh Adobe Reader 9.5.3 and earlier 9.x versions for Windows and Macintosh Adobe Acrobat XI (11.0.01 and earlier) for Windows and Macintosh Adobe Acrobat X (10.1.5 and earlier) for Windows and Macintosh Adobe Acrobat 9.5.3 and earlier 9.x versions for Windows and Macintosh ABSTRACT: Adobe has identified critical vulnerabilities in Adobe Reader and Acrobat REFERENCE LINKS: Adobe Reader and Acrobat Vulnerability Report

53

U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the  

Broader source: Energy.gov (indexed) [DOE]

2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, 2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information July 27, 2012 - 7:00am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information PLATFORM: Version(s):Apple Safari prior to 6.0 ABSTRACT: Multiple vulnerabilities were reported in Apple Safari. reference LINKS: The Vendor's Advisory Bugtraq ID: 54683 SecurityTracker Alert ID: 1027307 IMPACT ASSESSMENT:

54

U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the  

Broader source: Energy.gov (indexed) [DOE]

2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, 2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information July 27, 2012 - 7:00am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information PLATFORM: Version(s):Apple Safari prior to 6.0 ABSTRACT: Multiple vulnerabilities were reported in Apple Safari. reference LINKS: The Vendor's Advisory Bugtraq ID: 54683 SecurityTracker Alert ID: 1027307 IMPACT ASSESSMENT:

55

U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and  

Broader source: Energy.gov (indexed) [DOE]

41: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 41: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information August 22, 2012 - 7:00am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information PLATFORM: Adobe Flash Player 11.3.300.271 and earlier versions for Windows, Macintosh and Linux operating systems Adobe Flash Player 11.1.115.11 and earlier versions for Android 4.x Adobe Flash Player 11.1.111.10 and earlier versions for Android 3.x and 2.x Adobe AIR 3.3.0.3670 and earlier versions for Windows and Macintosh Adobe AIR 3.3.0.3690 SDK (includes AIR for iOS) and earlier versions Adobe AIR 3.3.0.3650 and earlier versions for Android ABSTRACT:

56

U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...  

Broader source: Energy.gov (indexed) [DOE]

21: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-121: Apple iOS Bugs Let Remote...

57

V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code...  

Broader source: Energy.gov (indexed) [DOE]

can create specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system CVE-2013-1009,...

58

U-177: Lotus Quickr for Domino ActiveX Control Buffer Overflow Lets Remote Users Execute Arbitrary Code  

Broader source: Energy.gov [DOE]

A vulnerability was reported in Lotus Quickr for Domino. A remote user can cause arbitrary code to be executed on the target user's system.

59

U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code | Department  

Broader source: Energy.gov (indexed) [DOE]

6: Apple iOS Bugs Let Remote Users Execute Arbitrary Code 6: Apple iOS Bugs Let Remote Users Execute Arbitrary Code U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code November 15, 2011 - 8:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Obtain Information and Let Local Users Bypass Authentication. PLATFORM: iOS 3.0 through 5.0 for iPhone 3GS iPhone 4 and iPhone 4S iOS 3.1 through 5.0 for iPod touch (3rd generation) and later iOS 3.2 through 5.0 for iPad, iOS 4.3 through 5.0 for iPad 2 ABSTRACT: A remote user can create content that, when loaded by the target user, will execute arbitrary code on or obtain potentially sensitive information from the target user's system. reference LINKS: Apple Security Article: HT5052 Apple Product Security SecurityTracker Alert ID: 1026311 IMPACT ASSESSMENT:

60

U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof  

Broader source: Energy.gov (indexed) [DOE]

5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and 5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs May 9, 2012 - 7:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs PLATFORM: prior to 5.1.1; iPhone 3GS, iPhone 4, iPhone 4S, iPod touch (3rd generation) and later, iPad, iPad 2 ABSTRACT: Two vulnerabilities were reported in Apple iOS. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can spoof the address bar URL. reference LINKS: SecurityTracker Alert ID: 1027028 CVE-2012-0672 CVE-2012-0674 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a specially crafted file that, when loaded by the

Note: This page contains sample records for the topic "users execute arbitrary" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof  

Broader source: Energy.gov (indexed) [DOE]

5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and 5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs May 9, 2012 - 7:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs PLATFORM: prior to 5.1.1; iPhone 3GS, iPhone 4, iPhone 4S, iPod touch (3rd generation) and later, iPad, iPad 2 ABSTRACT: Two vulnerabilities were reported in Apple iOS. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can spoof the address bar URL. reference LINKS: SecurityTracker Alert ID: 1027028 CVE-2012-0672 CVE-2012-0674 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a specially crafted file that, when loaded by the

62

V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary  

Broader source: Energy.gov (indexed) [DOE]

20: Apple QuickTime Multiple Flaws Let Remote Users Execute 20: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code November 9, 2012 - 6:00am Addthis PROBLEM: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Versions prior to QuickTime 7.7.3 are vulnerable on Windows 7, Vista and XP. ABSTRACT: Multiple vulnerabilities were reported in Apple QuickTime. REFERENCE LINKS: Apple Security Article: HT5581 SecurityTracker Alert ID: 1027737 Bugtraq ID: 56438 Secunia Advisory SA51226 CVE-2011-1374 CVE-2012-3751 CVE-2012-3752 CVE-2012-3753 CVE-2012-3754 CVE-2012-3755 CVE-2012-3756 CVE-2012-3757 CVE-2012-3758 IMPACT ASSESSMENT: High DISCUSSION: Multiple vulnerabilities have been reported in Apple QuickTime, which can

63

T-718:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary  

Broader source: Energy.gov (indexed) [DOE]

8:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute 8:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code T-718:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code September 15, 2011 - 8:45am Addthis PROBLEM: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code. PLATFORM: Adobe Reader X (10.1) and earlier 10.x versions for Windows and Macintosh Adobe Reader 9.4.5 and earlier 9.x versions for Windows, Macintosh and UNIX Adobe Reader 8.3 and earlier 8.x versions for Windows and Macintosh Adobe Acrobat X (10.1) and earlier 10.x versions for Windows and Macintosh Adobe Acrobat 9.4.5 and earlier 9.x versions for Windows and Macintosh Adobe Acrobat 8.3 and earlier 8.x versions for Windows and Macintosh ABSTRACT: A remote user can create a file that, when loaded by the target user, will

64

V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary  

Broader source: Energy.gov (indexed) [DOE]

4: Apple QuickTime Multiple Flaws Let Remote Users Execute 4: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code May 27, 2013 - 12:23am Addthis PROBLEM: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Apple QuickTime prior to 7.7.4. ABSTRACT: Apple QuickTime Multiple Vulnerabilities REFERENCE LINKS: Apple Article: HT5770 SecurityTracker Alert ID: 1028589 Secunia Advisory SA53520 CVE-2013-0986, CVE-2013-0987, CVE-2013-0988 CVE-2013-0989, CVE-2013-1015, CVE-2013-1016 CVE-2013-1017, CVE-2013-1018, CVE-2013-1019 CVE-2013-1020, CVE-2013-1021, CVE-2013-1022 IMPACT ASSESSMENT: High DISCUSSION: Multiple vulnerabilities have been reported in Apple QuickTime, which can be exploited by malicious people to compromise a user's system.

65

V-029: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary  

Broader source: Energy.gov (indexed) [DOE]

29: Mozilla Firefox Multiple Bugs Let Remote Users Execute 29: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks V-029: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks November 21, 2012 - 2:00am Addthis PROBLEM: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks PLATFORM: Version(s): prior to 17.0 ABSTRACT: Multiple vulnerabilities were reported in Mozilla Firefox REFERENCE LINKS: Mozilla Foundation Security Advisories Bugtraq ID: 55260 SecurityTracker Alert ID: 1027791 CVE-2012-4201, CVE-2012-4202, CVE-2012-4203, CVE-2012-4204, CVE-2012-4205, CVE-2012-4206, CVE-2012-4207,CVE-2012-4208, CVE-2012-4209, CVE-2012-4210, CVE-2012-4212, CVE-2012-4213, CVE-2012-4214, CVE-2012-4215, CVE-2012-4216,

66

U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary...  

Broader source: Energy.gov (indexed) [DOE]

create specially crafted content that, when loaded by the target user, will trigger a memory corruption error CVE-2012-4163, CVE-2012-4164, CVE-2012-4165, CVE-2012-4166 or...

67

V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute...  

Broader source: Energy.gov (indexed) [DOE]

2: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code April 25, 2013 - 12:14am...

68

T-684: Apple QuickTime Buffer Overflows Let Remote Users Execute...  

Broader source: Energy.gov (indexed) [DOE]

84: Apple QuickTime Buffer Overflows Let Remote Users Execute Arbitrary Code T-684: Apple QuickTime Buffer Overflows Let Remote Users Execute Arbitrary Code August 4, 2011 - 3:33pm...

69

T-539: Adobe Acrobat, Reader, and Flash Player Arbitrary Code Execution  

Broader source: Energy.gov (indexed) [DOE]

39: Adobe Acrobat, Reader, and Flash Player Arbitrary Code 39: Adobe Acrobat, Reader, and Flash Player Arbitrary Code Execution Vulnerability T-539: Adobe Acrobat, Reader, and Flash Player Arbitrary Code Execution Vulnerability January 21, 2011 - 6:24am Addthis PROBLEM: Adobe Acrobat, Reader, and Flash Player Arbitrary Code Execution Vulnerability. PLATFORM: Adobe products (Adobe Acrobat, Reader, and Flash Player) ABSTRACT: An unauthenticated, remote attacker could exploit this vulnerability to execute arbitrary code with the privileges of the user. If the user holds elevated privileges, the attacker could execute arbitrary code that results in complete system compromise. reference LINKS: Cisco Security Bulletin Adobe Bulletin CVE-2010-3654 IMPACT ASSESSMENT: High Discussion: Adobe Acrobat, Reader, and Flash Player contain a vulnerability that could

70

T-539: Adobe Acrobat, Reader, and Flash Player Arbitrary Code Execution  

Broader source: Energy.gov (indexed) [DOE]

9: Adobe Acrobat, Reader, and Flash Player Arbitrary Code 9: Adobe Acrobat, Reader, and Flash Player Arbitrary Code Execution Vulnerability T-539: Adobe Acrobat, Reader, and Flash Player Arbitrary Code Execution Vulnerability January 21, 2011 - 6:24am Addthis PROBLEM: Adobe Acrobat, Reader, and Flash Player Arbitrary Code Execution Vulnerability. PLATFORM: Adobe products (Adobe Acrobat, Reader, and Flash Player) ABSTRACT: An unauthenticated, remote attacker could exploit this vulnerability to execute arbitrary code with the privileges of the user. If the user holds elevated privileges, the attacker could execute arbitrary code that results in complete system compromise. reference LINKS: Cisco Security Bulletin Adobe Bulletin CVE-2010-3654 IMPACT ASSESSMENT: High Discussion: Adobe Acrobat, Reader, and Flash Player contain a vulnerability that could

71

U-071:HP Database Archiving Software Bugs Let Remote Users Execute  

Broader source: Energy.gov (indexed) [DOE]

1:HP Database Archiving Software Bugs Let Remote Users Execute 1:HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code U-071:HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code December 29, 2011 - 8:15am Addthis PROBLEM: HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code PLATFORM: HP Database Archiving Software v6.31 ABSTRACT: A remote user can execute arbitrary code on the target system. reference LINKS: HP Database Document ID: c03128302 SecurityTracker Alert ID: 1026467 CVE-2011-4163 CVE-2011-4164 CVE-2011-4165 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in HP Database Archiving Software. A remote user can execute arbitrary code on the target system. Impact: A remote user can execute arbitrary code on the target system. Solution:

72

U-071:HP Database Archiving Software Bugs Let Remote Users Execute  

Broader source: Energy.gov (indexed) [DOE]

1:HP Database Archiving Software Bugs Let Remote Users Execute 1:HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code U-071:HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code December 29, 2011 - 8:15am Addthis PROBLEM: HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code PLATFORM: HP Database Archiving Software v6.31 ABSTRACT: A remote user can execute arbitrary code on the target system. reference LINKS: HP Database Document ID: c03128302 SecurityTracker Alert ID: 1026467 CVE-2011-4163 CVE-2011-4164 CVE-2011-4165 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in HP Database Archiving Software. A remote user can execute arbitrary code on the target system. Impact: A remote user can execute arbitrary code on the target system. Solution:

73

Fermilab Users' Executive Committee  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

2012-2013 UEC and GSA Members at October meeting 2012-2013 UEC and GSA Members at October meeting Current Members of the Fermilab Users Executive Committee 2012-2013 Name and Organization Term Email Nikos Varelas, Chair University of Illinois at Chicago 9/11 - 8/13 varelas AT uic.edu Mary Anne Cummings Muons, Inc. 9/12 - 8/14 macc AT fnal.gov Craig Group University of Virginia 9/12 - 8/14 group AT fnal.gov Sergo Jindariani Fermilab 9/11 - 8/13 sergo AT fnal.gov Daniel Kaplan Illinois Institute of Technology 9/11 - 8/13 kaplan AT iit.edu Ryan Patterson California Institute of Technology 9/11 - 8/13 rbpatter AT caltech.edu Greg Pawloski University of Minnesota 9/11 - 8/13 pawloski AT umn.edu Breese Quinn University of Mississippi 9/12 - 8/14 quinn AT phy.olemiss.edu Lee Roberts Boston University 9/12 - 8/14 roberts AT bu.edu Mandy Rominsky

74

V-029: Mozilla Firefox Multiple Bugs Let Remote Users Execute...  

Broader source: Energy.gov (indexed) [DOE]

that, when loaded by the target user, will trigger a buffer overflow, use-after-free memory error, or memory corruption error and execute arbitrary code on the target system. The...

75

U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute...  

Broader source: Energy.gov (indexed) [DOE]

can create specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system. The code will run...

76

U-080: Linux Kernel XFS Heap Overflow May Let Remote Users Execute  

Broader source: Energy.gov (indexed) [DOE]

80: Linux Kernel XFS Heap Overflow May Let Remote Users Execute 80: Linux Kernel XFS Heap Overflow May Let Remote Users Execute Arbitrary Code U-080: Linux Kernel XFS Heap Overflow May Let Remote Users Execute Arbitrary Code January 12, 2012 - 9:00am Addthis PROBLEM: Linux Kernel XFS Heap Overflow May Let Remote Users Execute Arbitrary Code PLATFORM: Linux ABSTRACT: A vulnerability was reported in the Linux Kernel. A remote user can cause arbitrary code to be executed on the target user's system. reference LINKS: Linux Kernel Update SecurityTracker Alert ID: 1026512 CVE-2012-0038 Red Hat Bugzilla Bug 773280 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a filesystem that, when mounted by the target user, will execute arbitrary code on the target user's system. Impact: A remote user can create a specially crafted filesystem that, when mounted

77

U-131: Adobe Photoshop TIFF Image Heap Overflow Lets Remote Users Execute  

Broader source: Energy.gov (indexed) [DOE]

131: Adobe Photoshop TIFF Image Heap Overflow Lets Remote Users 131: Adobe Photoshop TIFF Image Heap Overflow Lets Remote Users Execute Arbitrary Code U-131: Adobe Photoshop TIFF Image Heap Overflow Lets Remote Users Execute Arbitrary Code March 22, 2012 - 3:47am Addthis PROBLEM: Adobe Photoshop TIFF Image Heap Overflow Lets Remote Users Execute Arbitrary Code PLATFORM: Adobe Photoshop CS5 12.x ABSTRACT: Successful exploitation may allow execution of arbitrary code reference LINKS: SecurityTracker Alert ID: 1026831 Secunia Advisory: SA48457 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Adobe Photoshop. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a specially crafted TIFF file that, when loaded by the target user, will trigger a heap overflow and execute arbitrary code on the target

78

U-041: Google Chrome Out-of-Bounds Write Error Lets Remote Users Execute  

Broader source: Energy.gov (indexed) [DOE]

1: Google Chrome Out-of-Bounds Write Error Lets Remote Users 1: Google Chrome Out-of-Bounds Write Error Lets Remote Users Execute Arbitrary Code U-041: Google Chrome Out-of-Bounds Write Error Lets Remote Users Execute Arbitrary Code November 18, 2011 - 9:00am Addthis PROBLEM: Google Chrome Out-of-Bounds Write Error Lets Remote Users Execute Arbitrary Code. PLATFORM: Version(s) prior to 15.0.874.121 ABSTRACT: A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system. reference LINKS: Stable Channel Update CVE-2011-3900 SecurityTracker Alert ID: 1026338 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create specially crafted HTML that, when loaded by the target user,

79

U-075: Apache Struts Bug Lets Remote Users Overwrite Files and Execute  

Broader source: Energy.gov (indexed) [DOE]

075: Apache Struts Bug Lets Remote Users Overwrite Files and 075: Apache Struts Bug Lets Remote Users Overwrite Files and Execute Arbitrary Code U-075: Apache Struts Bug Lets Remote Users Overwrite Files and Execute Arbitrary Code January 5, 2012 - 8:15am Addthis PROBLEM: Apache Struts Bug Lets Remote Users Overwrite Files and Execute Arbitrary Code PLATFORM: Version(s): 2.1.0 - 2.3.1 ABSTRACT: A remote user can execute arbitrary Java code on the target system. reference LINKS: SecurityTracker Alert ID: 1026484 Secunia Advisory SA47393 Bugtraq ID: 51257 Apache Struts 2 Documentation S2-008 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Apache Struts. A remote user can execute arbitrary Java code on the target system. A remote user can overwrite arbitrary files on the target system. A remote user can send specially

80

EMSL User Executive Committe Meeting  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

User Executive User Executive Committee Meeting July 13, 2011 Recommendations Valerie Copie, UEC Chair User Meetings/Workshops EUC Comments & Recommendations: The UEC supports EMSL's focus on specific areas for User meetings and workshops rather than organizing a generalized User Meeting Focused meetings may provide opportunities for users to visit EMSL more often and to participate in team building as envisaged by the new vision of EMSL2.0 The UEC would like EMSL to have broad representations at these workshops to avoid having too many internal participants. The Pore-scale workshop may be a good model to follow for focused workshops While the UEC supports focused workshops, the entire user community should be welcome to attend them and informed about these activities

Note: This page contains sample records for the topic "users execute arbitrary" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

V-109: Google Chrome WebKit Type Confusion Error Lets Remote Users Execute  

Broader source: Energy.gov (indexed) [DOE]

09: Google Chrome WebKit Type Confusion Error Lets Remote Users 09: Google Chrome WebKit Type Confusion Error Lets Remote Users Execute Arbitrary Code V-109: Google Chrome WebKit Type Confusion Error Lets Remote Users Execute Arbitrary Code March 12, 2013 - 12:11am Addthis PROBLEM: Google Chrome WebKit Type Confusion Error Lets Remote Users Execute Arbitrary Code PLATFORM: Google Chrome prior to 25.0.1364.160 ABSTRACT: A vulnerability was reported in Google Chrome. REFERENCE LINKS: Stable Channel Update SecurityTracker Alert ID: 1028266 CVE-2013-0912 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create specially crafted HTML that, when loaded by the target user, will trigger a type confusion error in WebKit and execute arbitrary code on the target system. The code will run with the privileges

82

U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Users Deny Service and Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users...

83

Fermilab Users' Executive Committee  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Outreach Subcommittee Outreach Subcommittee Purpose: Work with Fermilab and with external institutions to increase public awareness of the physics being done at Fermilab. Subcommittee Members 2012-2013 Name Organization Email Mandy Rominsky, Chair Fermilab rominsky AT fnal.gov Mary Anne Cummings Muons, Inc macc AT fnal.gov Daniel Kaplan Illinois Institute of Technology kaplan AT iit.edu Ryan Patterson California Institute of Technology rbpatter AT caltech.edu Breese Quinn University of Mississippi quinn AT phy.olemiss.edu Lee Roberts Boston University roberts AT bu.edu Nikos Varelas (ex-officio) University of Illinois at Chicago varelas AT uic.edu Fermilab User University Profiles Fermilab Outreach Fermilab Office of Communication Fermilab Guided Tours Ask a Scientist Program Physics for Everyone Lecture Series

84

U-095: HP Data Protector Media Operations Lets Remote Users Execute  

Broader source: Energy.gov (indexed) [DOE]

5: HP Data Protector Media Operations Lets Remote Users Execute 5: HP Data Protector Media Operations Lets Remote Users Execute Arbitrary Code U-095: HP Data Protector Media Operations Lets Remote Users Execute Arbitrary Code February 3, 2012 - 1:33am Addthis PROBLEM: HP Data Protector Media Operations Lets Remote Users Execute Arbitrary Code PLATFORM: Windows (2003, XP, 2008), HP Data Protector Media Operations version 6.11 and earlier ABSTRACT: Remote execution of arbitrary code reference LINKS: SecurityTracker Alert ID: 1026626 HP Support Center Document ID: c03179046 CVE-2011-4791 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in HP Data Protector Media Operations. A remote user can execute arbitrary code on the target system. Information on CVSS is documented in HP Customer Notice: HPSN-2008-002. Impact:

85

U-025: HP OpenView Network Node Manager Bugs Let Remote Users Execute  

Broader source: Energy.gov (indexed) [DOE]

U-025: HP OpenView Network Node Manager Bugs Let Remote Users U-025: HP OpenView Network Node Manager Bugs Let Remote Users Execute Arbitrary Code U-025: HP OpenView Network Node Manager Bugs Let Remote Users Execute Arbitrary Code November 2, 2011 - 8:00am Addthis PROBLEM: HP OpenView Network Node Manager Bugs Let Remote Users Execute Arbitrary Code. PLATFORM: HP OpenView Network Node Manager (OV NNM) v7.51, v7.53 running on HP-UX, Linux, Solaris, and Windows ABSTRACT: A remote user can execute arbitrary code on the target system. reference LINKS: HP Support Center Document ID: c03054052 SecurityTracker Alert ID: 1026260 CVE-2011-1365 CVE-2011-1366 CVE-2011-1367 IMPACT ASSESSMENT: Medium Discussion: Several vulnerabilities were reported in HP OpenView Network Node Manager. A remote user can execute arbitrary code on the target system.

86

T-708:Pidgin Bugs Let Remote Users Deny Service and Potentially Execute  

Broader source: Energy.gov (indexed) [DOE]

T-708:Pidgin Bugs Let Remote Users Deny Service and Potentially T-708:Pidgin Bugs Let Remote Users Deny Service and Potentially Execute Arbitrary Code T-708:Pidgin Bugs Let Remote Users Deny Service and Potentially Execute Arbitrary Code September 1, 2011 - 12:00pm Addthis PROBLEM: gtkutils.c in Pidgin before 2.10.0 on Windows allows user-assisted remote attackers to execute arbitrary programs via a file: URL in a message. PLATFORM: Pidgin before 2.10.0 on Windows ABSTRACT: Pidgin bugs let remote users deny service and potentially execute arbitrary code. reference LINKS: CVE-2011-3185 CVE-2011-2943 CVE-2011-3184 SecurityTracker Alert ID: 1025961 Pidgin Security Advisories IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in Pidgin. A remote user can cause denial of service conditions. A remote user can cause arbitrary code to be

87

T-652: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and Execute  

Broader source: Energy.gov (indexed) [DOE]

2: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and 2: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and Execute Arbitrary Code T-652: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and Execute Arbitrary Code June 22, 2011 - 2:55pm Addthis PROBLEM: Multiple vulnerabilities were reported in Mozilla Thunderbird. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can obtain cookies from another domain in certain cases. A remote user can create specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system [CVE-2011-2364, CVE-2011-2374, CVE-2011-2375, CVE-2011-2376]. The code will run with the privileges of the target user. PLATFORM: Mozilla Thunderbird prior to 3.1.11

88

U-079: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute  

Broader source: Energy.gov (indexed) [DOE]

79: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute 79: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code U-079: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code January 11, 2012 - 8:00am Addthis PROBLEM: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code. PLATFORM: Adobe Acrobat/Reader Version(s): 9.x prior to 9.5, 10.x prior to 10.1.2 ABSTRACT: A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026496 Adobe Security Bulletin APSB12-01 CVE-2011-2462, CVE-2011-4369, CVE-2011-4370, CVE-2011-4371, CVE-2011-4372, CVE-2011-4373. IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in Adobe Acrobat/Reader. A remote

89

T-538: HP OpenView Storage Data Protector Bug Lets Remote Users Execute  

Broader source: Energy.gov (indexed) [DOE]

T-538: HP OpenView Storage Data Protector Bug Lets Remote Users T-538: HP OpenView Storage Data Protector Bug Lets Remote Users Execute Arbitrary Code T-538: HP OpenView Storage Data Protector Bug Lets Remote Users Execute Arbitrary Code January 20, 2011 - 6:39am Addthis PROBLEM: HP OpenView Storage Data Protector Bug Lets Remote Users Execute Arbitrary Code. PLATFORM: HP OpenView Storage Data Protector v6.11 ABSTRACT: A vulnerability was reported in HP OpenView Storage Data Protector. A remote user can execute arbitrary code on the target system. reference LINKS: HP Security Bulletin SecurityTracker Alert ID: 1024983 CVE-2011-0273 IMPACT ASSESSMENT: High Discussion: A potential security vulnerability has been identified with HP OpenView Storage Data Protector. The vulnerability could be remotely exploited to execute arbitrary code.

90

U-137: HP Performance Manager Unspecified Bug Lets Remote Users Execute  

Broader source: Energy.gov (indexed) [DOE]

7: HP Performance Manager Unspecified Bug Lets Remote Users 7: HP Performance Manager Unspecified Bug Lets Remote Users Execute Arbitrary Codes U-137: HP Performance Manager Unspecified Bug Lets Remote Users Execute Arbitrary Codes March 30, 2012 - 9:15am Addthis PROBLEM: HP Performance Manager Unspecified Bug Lets Remote Users Execute Arbitrary Codes PLATFORM: HP-UX B.11.31 HP-UX B.11.23 ABSTRACT: A remote user can execute arbitrary code on the target system. REFERENCE LINKS: HP Support Document ID: c03255321 SecurityTracker Alert ID: 1026869 CVE-2012-0127 IMPACT ASSESSMENT: High Discussion: A potential security vulnerability has been identified with HP Performance Manager running on HP-UX, Linux, Solaris, and Windows. The vulnerability could be exploited remotely to execute arbitrary code and to create a Denial of Service (DoS).

91

V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution...  

Broader source: Energy.gov (indexed) [DOE]

2: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities December 21, 2012 -...

92

V-027: Adobe InDesign Server SOAP Interface Lets Remote Users Execute  

Broader source: Energy.gov (indexed) [DOE]

7: Adobe InDesign Server SOAP Interface Lets Remote Users 7: Adobe InDesign Server SOAP Interface Lets Remote Users Execute Arbitrary Commands V-027: Adobe InDesign Server SOAP Interface Lets Remote Users Execute Arbitrary Commands November 19, 2012 - 2:30am Addthis PROBLEM: Adobe InDesign Server SOAP Interface Lets Remote Users Execute Arbitrary Commands PLATFORM: CS5.5 7.5.0.142; possibly other versions ABSTRACT: Adobe InDesign Server "RunScript" SOAP Message Command Execution Vulnerability REFERENCE LINKS: Secunia Advisory SA48572 SecurityTracker Alert ID: 1027783 Adobe IMPACT ASSESSMENT: Medium DISCUSSION: A vulnerability was reported in Adobe InDesign Server. A remote user can execute arbitrary commands on the target system. A remote user can send a specially crafted "RunScript" SOAP message to

93

V-027: Adobe InDesign Server SOAP Interface Lets Remote Users Execute  

Broader source: Energy.gov (indexed) [DOE]

27: Adobe InDesign Server SOAP Interface Lets Remote Users 27: Adobe InDesign Server SOAP Interface Lets Remote Users Execute Arbitrary Commands V-027: Adobe InDesign Server SOAP Interface Lets Remote Users Execute Arbitrary Commands November 19, 2012 - 2:30am Addthis PROBLEM: Adobe InDesign Server SOAP Interface Lets Remote Users Execute Arbitrary Commands PLATFORM: CS5.5 7.5.0.142; possibly other versions ABSTRACT: Adobe InDesign Server "RunScript" SOAP Message Command Execution Vulnerability REFERENCE LINKS: Secunia Advisory SA48572 SecurityTracker Alert ID: 1027783 Adobe IMPACT ASSESSMENT: Medium DISCUSSION: A vulnerability was reported in Adobe InDesign Server. A remote user can execute arbitrary commands on the target system. A remote user can send a specially crafted "RunScript" SOAP message to

94

V -209:Cisco WAAS (Wide Area Application Services) Arbitrary Code Execution  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

V -209:Cisco WAAS (Wide Area Application Services) Arbitrary Code V -209:Cisco WAAS (Wide Area Application Services) Arbitrary Code Execution Vulnerabilities V -209:Cisco WAAS (Wide Area Application Services) Arbitrary Code Execution Vulnerabilities August 2, 2013 - 2:25am Addthis PROBLEM: Two vulnerabilities have been reported in Cisco WAAS (Wide Area Application Services), which can be exploited by malicious users and malicious people to compromise a vulnerable system. PLATFORM: Versions 5.0.x, 5.1.x, and 5.2.x. ABSTRACT: Cisco Wide Area Application Services (WAAS) when configured as Central Manager (CM), contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on the affected system. REFERENCE LINKS: Secunia Advisory SA54372 CVE-2013-3443 CVE-2013-3444 IMPACT ASSESSMENT: High

95

U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute  

Broader source: Energy.gov (indexed) [DOE]

9: Cisco Firewall Services Module Bugs Let Remote Users Execute 9: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service October 11, 2012 - 6:00am Addthis PROBLEM: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service PLATFORM: Version(s): prior to 4.1(9) ABSTRACT: Several vulnerabilities were reported in Cisco Firewall Services Module. reference LINKS: Cisco Advisory ID: cisco-sa-20121010-fwsm SecurityTracker Alert ID: 1027640 CVE-2012-4661 CVE-2012-4662 CVE-2012-4663 IMPACT ASSESSMENT: High Discussion: A remote user can send specially crafted DCERPC data through the target device to trigger a stack overflow in the DCERPC inspection engine and execute arbitrary code on the target device or cause the target device to

96

U-089:Apache Struts ParameterInterceptor() Flaw Lets Remote Users Execute  

Broader source: Energy.gov (indexed) [DOE]

9:Apache Struts ParameterInterceptor() Flaw Lets Remote Users 9:Apache Struts ParameterInterceptor() Flaw Lets Remote Users Execute Arbitrary Commands U-089:Apache Struts ParameterInterceptor() Flaw Lets Remote Users Execute Arbitrary Commands January 26, 2012 - 6:45am Addthis PROBLEM: Apache Struts ParameterInterceptor() Flaw Lets Remote Users Execute Arbitrary Commands PLATFORM: Struts 2.0.0 - Struts 2.3.1.1 ABSTRACT: A remote user can execute arbitrary code on the target system. reference LINKS: CVE-2011-3923 SecurityTracker Alert ID: 1026575 Apache Struts 2 Documentation S2-009 blog.o0o.nu IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Apache Struts. The vulnerability allows a malicious user to bypass all the protections (regex pattern, deny method invocation) built into the ParametersInterceptor, thus being able to inject

97

T-699: EMC AutoStart Buffer Overflows Let Remote Users Execute...  

Broader source: Energy.gov (indexed) [DOE]

EMC AutoStart Technical Info EMC Support Addthis Related Articles U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code T-639:...

98

Fermilab | Users' Executive Committee | Home  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Users' Office Fermilab Student and Post Doc Association (FSPA) Fermi Research Alliance LLC (FRA) P5 Report HEPAP APS National User Facility Organization (NUFO) Library of...

99

V-066: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute  

Broader source: Energy.gov (indexed) [DOE]

6: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users 6: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges V-066: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges January 10, 2013 - 2:00am Addthis PROBLEM: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges PLATFORM: *Adobe Reader XI (11.0.0) for Windows and Macintosh *Adobe Reader X (10.1.4) and earlier 10.x versions for Windows and Macintosh *Adobe Reader 9.5.2 and earlier 9.x versions for Windows and Macintosh *Adobe Reader 9.5.1 and earlier 9.x versions for Linux *Adobe Acrobat XI (11.0.0) for Windows and Macintosh *Adobe Acrobat X (10.1.4) and earlier 10.x versions for Windows and

100

V-066: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute  

Broader source: Energy.gov (indexed) [DOE]

66: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users 66: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges V-066: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges January 10, 2013 - 2:00am Addthis PROBLEM: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges PLATFORM: *Adobe Reader XI (11.0.0) for Windows and Macintosh *Adobe Reader X (10.1.4) and earlier 10.x versions for Windows and Macintosh *Adobe Reader 9.5.2 and earlier 9.x versions for Windows and Macintosh *Adobe Reader 9.5.1 and earlier 9.x versions for Linux *Adobe Acrobat XI (11.0.0) for Windows and Macintosh *Adobe Acrobat X (10.1.4) and earlier 10.x versions for Windows and

Note: This page contains sample records for the topic "users execute arbitrary" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

U-119: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute  

Broader source: Energy.gov (indexed) [DOE]

9: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users 9: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute Arbitrary Code U-119: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute Arbitrary Code March 7, 2012 - 7:00am Addthis PROBLEM: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute Arbitrary Code PLATFORM: BlackBerry 6, BlackBerry 7, BlackBerry 7.1, and BlackBerry PlayBook tablet software ABSTRACT: A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026769 BlackBerry Security Notice Article ID: KB30152 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Blackberry PlayBook. A remote user can cause arbitrary code to be executed on the target user's system. A remote

102

T-635: Cisco AnyConnect Secure Mobility Client Lets Remote Users Execute  

Broader source: Energy.gov (indexed) [DOE]

5: Cisco AnyConnect Secure Mobility Client Lets Remote Users 5: Cisco AnyConnect Secure Mobility Client Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges T-635: Cisco AnyConnect Secure Mobility Client Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges June 2, 2011 - 4:38pm Addthis PROBLEM: The Cisco AnyConnect Secure Mobility Client is the Cisco next-generation VPN client, which provides remote users with secure IPsec (IKEv2) or SSL Virtual Private Network (VPN) connections to Cisco 5500 Series Adaptive Security Appliances (ASA) and devices that are running Cisco IOS Software. PLATFORM: Cisco AnyConnect Secure Mobility Client Platform & Affected Versions ABSTRACT: Cisco AnyConnect Secure Mobility Client contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on a

103

V-065: Adobe Flash Player Buffer Overflow Lets Remote Users Execute  

Broader source: Energy.gov (indexed) [DOE]

5: Adobe Flash Player Buffer Overflow Lets Remote Users Execute 5: Adobe Flash Player Buffer Overflow Lets Remote Users Execute Arbitrary Code V-065: Adobe Flash Player Buffer Overflow Lets Remote Users Execute Arbitrary Code January 9, 2013 - 12:10am Addthis PROBLEM: Adobe Flash Player Buffer Overflow Lets Remote Users Execute Arbitrary Code PLATFORM: Adobe Flash Player 11.5.502.135 and earlier versions for Windows Adobe Flash Player 11.5.502.136 and earlier versions for Macintosh Adobe Flash Player 11.2.202.258 and earlier versions for Linux Adobe Flash Player 11.1.115.34 and earlier versions for Android 4.x Adobe Flash Player 11.1.111.29 and earlier versions for Android 3.x and 2.x. ABSTRACT: Security updates available for Adobe Flash Player REFERENCE LINKS: Adobe Security Bulletin APSB13-01 SecurityTracker Alert ID: 1027950

104

Fermilab | Users' Executive Committee | History  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Date Established: December 1967 Purpose: To conduct the business affairs of the Fermilab Users Organization between meetings of the general membership. Meeting Pattern: As...

105

V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets |  

Broader source: Energy.gov (indexed) [DOE]

7: IBM Lotus Notes Mail Client Lets Remote Users Execute Java 7: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets May 2, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in IBM Lotus Notes PLATFORM: IBM Notes 8.0.x, 8.5.x, 9.0 ABSTRACT: A remote user can cause Java applets to be executed on the target user's system REFERENCE LINKS: Security Tracker Alert ID 1028504 IBM Security Bulletin 1633819 CVE-2013-0127 CVE-2013-0538 IMPACT ASSESSMENT: Medium DISCUSSION: The mail client does not filter 'applet' and 'javascript' tags in HTML-based email messages. A remote user can send a specially crafted email message that, when loaded by the target user, will execute arbitrary Java code on the target system. The code will run with the privileges of the

106

V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets |  

Broader source: Energy.gov (indexed) [DOE]

7: IBM Lotus Notes Mail Client Lets Remote Users Execute Java 7: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets May 2, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in IBM Lotus Notes PLATFORM: IBM Notes 8.0.x, 8.5.x, 9.0 ABSTRACT: A remote user can cause Java applets to be executed on the target user's system REFERENCE LINKS: Security Tracker Alert ID 1028504 IBM Security Bulletin 1633819 CVE-2013-0127 CVE-2013-0538 IMPACT ASSESSMENT: Medium DISCUSSION: The mail client does not filter 'applet' and 'javascript' tags in HTML-based email messages. A remote user can send a specially crafted email message that, when loaded by the target user, will execute arbitrary Java code on the target system. The code will run with the privileges of the

107

T-635: Cisco AnyConnect Secure Mobility Client Lets Remote Users...  

Broader source: Energy.gov (indexed) [DOE]

Client Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges T-635: Cisco AnyConnect Secure Mobility Client Lets Remote Users Execute Arbitrary Code...

108

V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute  

Broader source: Energy.gov (indexed) [DOE]

6: Adobe Flash Player Memory Corruption Flaw Lets Remote Users 6: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code June 12, 2013 - 12:15am Addthis PROBLEM: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Adobe Flash Player 11.7.700.202 and earlier versions for Windows Adobe Flash Player 11.7.700.203 and earlier versions for Macintosh Adobe Flash Player 11.2.202.285 and earlier versions for Linux Adobe Flash Player 11.1.115.58 and earlier versions for Android 4.x Adobe Flash Player 11.1.111.54 and earlier versions for Android 3.x and 2.x Adobe AIR 3.7.0.1860 and earlier versions for Windows and Macintosh Adobe AIR 3.7.0.1860 and earlier versions for Android

109

U-075: Apache Struts Bug Lets Remote Users Overwrite Files and...  

Broader source: Energy.gov (indexed) [DOE]

Flaw Lets Remote Users Execute Arbitrary Commands V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code U-058: Apache Struts Conversion Error...

110

V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution  

Broader source: Energy.gov (indexed) [DOE]

52: Drupal Core Access Bypass and Arbitrary PHP Code Execution 52: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities December 21, 2012 - 12:15am Addthis PROBLEM: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities PLATFORM: Drupal 6.x versions prior to 6.27 Drupal 7.x versions prior to 7.18 ABSTRACT: Drupal Core Multiple vulnerabilities REFERENCE LINKS: SA-CORE-2012-004 - Drupal core Bugtraq ID: 56993 Secunia Advisory SA51517 CVE-2012-5651 CVE-2012-5652 CVE-2012-5653 IMPACT ASSESSMENT: Medium DISCUSSION: An attacker can exploit these issues to execute arbitrary PHP code within the context of the web server, bypass certain security restrictions, and perform unauthorized actions; this may aid in launching further attacks.

111

U-081: McAfee SaaS 'myCIOScn.dll' ActiveX Control Lets Remote Users Execute  

Broader source: Energy.gov (indexed) [DOE]

1: McAfee SaaS 'myCIOScn.dll' ActiveX Control Lets Remote Users 1: McAfee SaaS 'myCIOScn.dll' ActiveX Control Lets Remote Users Execute Arbitrary Code U-081: McAfee SaaS 'myCIOScn.dll' ActiveX Control Lets Remote Users Execute Arbitrary Code January 13, 2012 - 9:15am Addthis PROBLEM: McAfee SaaS 'myCIOScn.dll' ActiveX Control Lets Remote Users Execute Arbitrary Code PLATFORM: McAfee ABSTRACT: A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026513 Zero Day Initiative ZDI-12-012 McAfee Threat Intelligence IMPACT ASSESSMENT: High Discussion: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of McAfee Security-as-a-Service. User interaction is required to exploit this vulnerability in that the target must visit a

112

T-656: Microsoft Office Visio DXF File Handling Arbitrary Code Execution  

Broader source: Energy.gov (indexed) [DOE]

6: Microsoft Office Visio DXF File Handling Arbitrary Code 6: Microsoft Office Visio DXF File Handling Arbitrary Code Execution Vulnerability T-656: Microsoft Office Visio DXF File Handling Arbitrary Code Execution Vulnerability June 28, 2011 - 3:42pm Addthis PROBLEM: Functional code that demonstrates an exploit of the Microsoft Office Visio DXF file handling arbitrary code execution vulnerability is publicly available. PLATFORM: Microsoft Office Visio 2002 SP2 and prior Microsoft Office Visio 2003 SP3 and prior Microsoft Office Visio 2007 SP2 and prior ABSTRACT: Microsoft Office Visio contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on a targeted system. reference LINKS: IntelliShield ID: 20432 Original Release: S516 CVE-2010-1681 IMPACT ASSESSMENT: High Discussion: The vulnerability exists because the affected software does not perform

113

T-579: BlackBerry Device Software Bug in WebKit Lets Remote Users Execute  

Broader source: Energy.gov (indexed) [DOE]

9: BlackBerry Device Software Bug in WebKit Lets Remote Users 9: BlackBerry Device Software Bug in WebKit Lets Remote Users Execute Code T-579: BlackBerry Device Software Bug in WebKit Lets Remote Users Execute Code March 15, 2011 - 5:05pm Addthis PROBLEM: A vulnerability was reported in BlackBerry Device Software. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: BlackBerry Device Software version 6.0 and later. ABSTRACT: BlackBerry Device Software Bug in WebKit Lets Remote Users Execute Code. reference LINKS: BlackBerry Advisory: KB26132 CVE-2011-1290 BlackBerry Security Note BlackBerry Device Storage IMPACT ASSESSMENT: Moderate Discussion: A vulnerability exists in the open source WebKit browser engine provided in BlackBerry Device Software version 6.0 and later. The issue could result in

114

Continuous execution : improving user feedback in the development cycle  

E-Print Network [OSTI]

Programming environments are increasing the amount of feedback given to users during the development cycle. This work continues with this trend by exploring continuous execution, a programming environment where the result ...

Su, Kevin

2007-01-01T23:59:59.000Z

115

T-554: Race condition in Google Chrome before 9.0.597.84 allows remote attackers to execute arbitrary code  

Broader source: Energy.gov [DOE]

Race condition in Google Chrome before 9.0.597.84 allows remote attackers to execute arbitrary code via vectors related to audio.

116

SHUG Executive Committee | ORNL Neutron Sciences Users  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Executive Committee Executive Committee SHUG Executive Committee Members Tyrel McQueen Tyrel McQueen mcqueen@jhu.edu Term expires December 2014 Chair: Tyrel McQueen Assistant Professor of Chemistry Johns Hopkins University Research interests: New solid state chemistry materials design and synthesis techniques; experimental condensed matter physics, quantum magnetism, heat- and light-induced charge separation through strong electron correlations; superconductivity. Greg Beaucage Greg Beaucage beaucag@uc.edu Term expires December 2014 Past Chair: Greg Beaucage University of Cincinnati Research interests: Soft condensed matter and polymers, especially quantification of molecular topology using SANS, in the hierarchical structure of ceramic and metallic aggregates, and in the study of protein

117

V-027: Adobe InDesign Server SOAP Interface Lets Remote Users...  

Broader source: Energy.gov (indexed) [DOE]

Code U-131: Adobe Photoshop TIFF Image Heap Overflow Lets Remote Users Execute Arbitrary Code U-166: Adobe Shockwave Player Memory Corruption Flaws Let Remote Users Execute...

118

U-093: Mozilla Firefox Multiple Flaws Permit Remote Code Execution...  

Broader source: Energy.gov (indexed) [DOE]

a specially crafted content that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target user's system...

119

U-048: HP LaserJet Printers Unspecified Flaw Lets Remote Users...  

Broader source: Energy.gov (indexed) [DOE]

AutoStart Buffer Overflows Let Remote Users Execute Arbitrary Code U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code U-052:...

120

U-047: Siemens Automation License Manager Bugs Let Remote Users...  

Broader source: Energy.gov (indexed) [DOE]

7: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or...

Note: This page contains sample records for the topic "users execute arbitrary" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

U-266: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP  

Broader source: Energy.gov (indexed) [DOE]

6: Apache CXF Lets Remote Authenticated Users Execute 6: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP Actions U-266: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP Actions September 24, 2012 - 6:00am Addthis PROBLEM: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP Actions PLATFORM: This vulnerability affects all released versions of Apache CXF. ABSTRACT: A vulnerability was reported in Apache CXF reference LINKS: SecurityTracker Alert ID: 1027554 Apache CXF Security Advisories Apache CXF Advisory - CVE-2012-3451 CVE-2012-3451 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Apache CXF. A remote authenticated user can execute unauthorized commands on the target web service. Impact: A remote authenticated user can execute potentially unauthorized actions on

122

U-266: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP  

Broader source: Energy.gov (indexed) [DOE]

6: Apache CXF Lets Remote Authenticated Users Execute 6: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP Actions U-266: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP Actions September 24, 2012 - 6:00am Addthis PROBLEM: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP Actions PLATFORM: This vulnerability affects all released versions of Apache CXF. ABSTRACT: A vulnerability was reported in Apache CXF reference LINKS: SecurityTracker Alert ID: 1027554 Apache CXF Security Advisories Apache CXF Advisory - CVE-2012-3451 CVE-2012-3451 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Apache CXF. A remote authenticated user can execute unauthorized commands on the target web service. Impact: A remote authenticated user can execute potentially unauthorized actions on

123

U-163: PHP Command Parameter Bug Lets Remote Users Obtain Potentially...  

Broader source: Energy.gov (indexed) [DOE]

63: PHP Command Parameter Bug Lets Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code U-163: PHP Command Parameter Bug Lets Remote Users Obtain...

124

U-045: Windows Win32k.sys Keyboard Layout Bug Lets Local Users...  

Broader source: Energy.gov (indexed) [DOE]

Restrict access to trusted users only. Addthis Related Articles U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code U-046:...

125

U-095: HP Data Protector Media Operations Lets Remote Users Execute...  

Broader source: Energy.gov (indexed) [DOE]

of arbitrary code via network, User access via network Solution: Hp has provided a patch (SMO A.06.20.01) to resolve this vulnerability. Addthis Related Articles T-538: HP...

126

A Process for Anticipating and Executing Icon Selection in Graphical User Interfaces  

E-Print Network [OSTI]

A Process for Anticipating and Executing Icon Selection in Graphical User Interfaces David M. Lane presents a system for predicting the icon a user will select from an icon toolbar, based on command use that only predicted the most frequently used icon choices was better than one that predicted all choices

Lane, David

127

V-035: Google Chrome Multiple Flaws Let Remote Users Execute...  

Broader source: Energy.gov (indexed) [DOE]

of the target user. An out-of-bounds read may occur in Skia CVE-2012-5130. A memory corruption error may occur in the Apple OSX driver for Intel GPUs CVE-2012-5131. A...

128

T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain...  

Broader source: Energy.gov (indexed) [DOE]

Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct...

129

U-049: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users...  

Energy Savers [EERE]

Netcool Reporter Support and Downloads . Addthis Related Articles U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code U-048:...

130

U-076: OpenSSL Bugs Let Remote Users Deny Service, Obtain Information, and  

Broader source: Energy.gov (indexed) [DOE]

76: OpenSSL Bugs Let Remote Users Deny Service, Obtain 76: OpenSSL Bugs Let Remote Users Deny Service, Obtain Information, and Potentially Execute Arbitrary Code U-076: OpenSSL Bugs Let Remote Users Deny Service, Obtain Information, and Potentially Execute Arbitrary Code January 6, 2012 - 8:15am Addthis PROBLEM: OpenSSL Bugs Let Remote Users Deny Service, Obtain Information, and Potentially Execute Arbitrary Code PLATFORM: OpenSSL prior to 0.9.8s; 1.x prior to 1.0.0f ABSTRACT: A remote user may be able to execute arbitrary code on the target system. reference LINKS: SecurityTracker Alert ID: 1026485 OpenSSL Security Advisory IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in OpenSSL. A remote user can cause denial of service conditions. A remote user can obtain sensitive information. A remote user may be able to execute arbitrary code on the

131

T-555: Adobe Acrobat and Reader Image Parsing Arbitrary Code Execution Vulnerability  

Broader source: Energy.gov [DOE]

Critical vulnerabilities have been identified in Adobe Reader X (10.0) for Windows and Macintosh; Adobe Reader 9.4.1 and earlier versions for Windows, Macintosh and UNIX; and Adobe Acrobat X (10.0) and earlier versions for Windows and Macintosh. These vulnerabilities could cause the application to crash and potentially allow an attacker to take control of the affected system. Risk for Adobe Reader X users is significantly lower, as none of these issues bypass Protected Mode mitigations.

132

V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot...  

Broader source: Energy.gov (indexed) [DOE]

Bug Lets Local Users Deny Service V-098: Linux Kernel Extended Verification Module Bug Lets Local Users Deny Service U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...

133

U-161: Citrix Provisioning Services Unspecified Flaw Lets Remote Users  

Broader source: Energy.gov (indexed) [DOE]

1: Citrix Provisioning Services Unspecified Flaw Lets Remote 1: Citrix Provisioning Services Unspecified Flaw Lets Remote Users Execute Arbitrary Code U-161: Citrix Provisioning Services Unspecified Flaw Lets Remote Users Execute Arbitrary Code May 3, 2012 - 7:00am Addthis PROBLEM: Citrix Provisioning Services Unspecified Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: 6.1 and prior ABSTRACT: A vulnerability was reported in Citrix Provisioning Services. A remote user can execute arbitrary code on the target system. reference LINKS: SecurityTracker Alert ID: 1027004 Secunia Advisory SA48971 Citrix advisory IMPACT ASSESSMENT: Medium Discussion: A remote user can send a specially crafted packet to trigger an unspecified flaw and execute arbitrary code on the target system. The code will run with the privileges of the target service.

134

T-545: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets Remote Users  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

45: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets 45: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets Remote Users Execute Arbitrary Code T-545: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets Remote Users Execute Arbitrary Code January 28, 2011 - 7:21am Addthis PROBLEM: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets Remote Users Execute Arbitrary Code. PLATFORM: RealPlayer 14.0.1 and prior versions ABSTRACT: A vulnerability was reported in RealPlayer. A remote user can cause arbitrary code to be executed on the target user's system. reference LINKS: Security Tracker Alert CVE-2010-4393 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a specially crafted AVI file that, when loaded by the target user, will trigger a heap corruption error in 'vidplin.dll' and execute arbitrary code on the target system. The code will run with the

135

U-122 Google Chrome Two Code Execution Vulnerabilities | Department of  

Broader source: Energy.gov (indexed) [DOE]

2 Google Chrome Two Code Execution Vulnerabilities 2 Google Chrome Two Code Execution Vulnerabilities U-122 Google Chrome Two Code Execution Vulnerabilities March 12, 2012 - 7:00am Addthis PROBLEM: Google Chrome Two Code Execution Vulnerabilities PLATFORM: Google Chrome 17.x ABSTRACT: Two vulnerabilities have been reported in Google Chrome, which can be exploited by malicious people to compromise a user's system. reference LINKS: Secunia Advisory SA48321 SecurityTracker Alert ID: 1026776 CVE-2011-3046 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create specially crafted HTML that, when loaded by the target user, will trigger an unspecified flaw and execute arbitrary code (outside of the

136

T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site...  

Broader source: Energy.gov (indexed) [DOE]

Let Remote Users Conduct Cross-Site Request Forgery Attacks and Execute Arbitrary Code T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request Forgery Attacks...

137

U-163: PHP Command Parameter Bug Lets Remote Users Obtain Potentially  

Broader source: Energy.gov (indexed) [DOE]

3: PHP Command Parameter Bug Lets Remote Users Obtain 3: PHP Command Parameter Bug Lets Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code U-163: PHP Command Parameter Bug Lets Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code May 7, 2012 - 7:00am Addthis PROBLEM: PHP Command Parameter Bug Lets Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code PLATFORM: Prior to 5.3.12 and 5.4.2 ABSTRACT: A vulnerability was reported in PHP. A remote user can obtain potentially sensitive information. A remote user can execute arbitrary code on the target system. reference LINKS: SecurityTracker Alert ID: 1027022 CVE-2012-1823 CVE-2012-2311 IMPACT ASSESSMENT: High Discussion: A remote user can submit a specially crafted request containing a command

138

U-166: Adobe Shockwave Player Memory Corruption Flaws Let Remote Users  

Broader source: Energy.gov (indexed) [DOE]

6: Adobe Shockwave Player Memory Corruption Flaws Let Remote 6: Adobe Shockwave Player Memory Corruption Flaws Let Remote Users Execute Arbitrary Code U-166: Adobe Shockwave Player Memory Corruption Flaws Let Remote Users Execute Arbitrary Code May 10, 2012 - 7:00am Addthis PROBLEM: Adobe Shockwave Player Memory Corruption Flaws Let Remote Users Execute Arbitrary Code PLATFORM: 11.6.4.634 and prior ABSTRACT: Multiple vulnerabilities were reported in Adobe Shockwave Player. A remote user can cause arbitrary code to be executed on the target user's system. reference LINKS: SecurityTracker Alert ID: 1027037 CVE-2012-2029 CVE-2012-2030 CVE-2012-2031 CVE-2012-2032 CVE-2012-2033 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted Shockwave content that, when loaded by the target user, will trigger a memory corruption error and

139

U-047: Siemens Automation License Manager Bugs Let Remote Users Deny  

Broader source: Energy.gov (indexed) [DOE]

7: Siemens Automation License Manager Bugs Let Remote Users 7: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code November 29, 2011 - 9:00am Addthis PROBLEM: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code. PLATFORM: Siemens Automation License Manager 500.0.122.1 ABSTRACT: Several vulnerabilities were reported in Siemens Automation License Manager. reference LINKS: SecurityTracker Alert ID: 1026354 Bugtraq Siemens Advisory Services IMPACT ASSESSMENT: Medium Discussion: A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions. A remote user can send specially crafted *_licensekey commands to trigger a

140

U-155: WebCalendar Access Control and File Inclusion Bugs Let Remote Users  

Broader source: Energy.gov (indexed) [DOE]

5: WebCalendar Access Control and File Inclusion Bugs Let 5: WebCalendar Access Control and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code U-155: WebCalendar Access Control and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code April 25, 2012 - 7:00am Addthis PROBLEM: WebCalendar Access Control and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code PLATFORM: 1.2.4 and prior versions ABSTRACT: Two vulnerabilities were reported in WebCalendar. A remote user may be able to execute arbitrary PHP code on the target system. reference links: SecurityTracker Alert ID: 1026966 CVE-2012-1495 CVE-2012-1496 IMPACT ASSESSMENT: Medium Discussion: A remote user can access '/install/index.php' to potentially modify '/includes/settings/' with arbitrary values or PHP code. A remote

Note: This page contains sample records for the topic "users execute arbitrary" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

T-656: Microsoft Office Visio DXF File Handling Arbitrary Code...  

Broader source: Energy.gov (indexed) [DOE]

6: Microsoft Office Visio DXF File Handling Arbitrary Code Execution Vulnerability T-656: Microsoft Office Visio DXF File Handling Arbitrary Code Execution Vulnerability June 28,...

142

T-539: Adobe Acrobat, Reader, and Flash Player Arbitrary Code...  

Broader source: Energy.gov (indexed) [DOE]

T-539: Adobe Acrobat, Reader, and Flash Player Arbitrary Code Execution Vulnerability T-539: Adobe Acrobat, Reader, and Flash Player Arbitrary Code Execution Vulnerability January...

143

V-149: Microsoft Internet Explorer Object Access Bug Lets Remote Users  

Broader source: Energy.gov (indexed) [DOE]

9: Microsoft Internet Explorer Object Access Bug Lets Remote 9: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code V-149: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code May 6, 2013 - 12:07am Addthis PROBLEM: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code PLATFORM: Internet Explorer 8 ABSTRACT: A vulnerability was reported in Microsoft Internet Explorer. REFERENCE LINKS: SecurityTracker Alert ID: 1028514 Microsoft Security Advisory (2847140) CVE-2013-1347 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will access and object that has been deleted or not properly allocated and execute arbitrary code on the target system. The code will run with the privileges of the target user.

144

T-541: Citrix Provisioning Services Unspecified Flaw Let's Remote Users  

Broader source: Energy.gov (indexed) [DOE]

41: Citrix Provisioning Services Unspecified Flaw Let's Remote 41: Citrix Provisioning Services Unspecified Flaw Let's Remote Users Execute Arbitrary Code T-541: Citrix Provisioning Services Unspecified Flaw Let's Remote Users Execute Arbitrary Code January 24, 2011 - 5:34pm Addthis PROBLEM: Citrix Provisioning Services Unspecified Flaw Let's Remote Users Execute Arbitrary Code PLATFORM: * Provisioning Services 5.1 * Provisioning Services 5.6 ABSTRACT: A vulnerability has been identified in Citrix Provisioning Services that could result in arbitrary code execution. This vulnerability can be triggered by an attacker sending a specially crafted packet to the Provisioning Services server. This vulnerability is present in all supported versions of Citrix Provisioning Services up to and including version 5.6. reference LINKS:

145

T-613: Microsoft Excel Axis Properties Remote Code Execution Vulnerability  

Broader source: Energy.gov (indexed) [DOE]

613: Microsoft Excel Axis Properties Remote Code Execution 613: Microsoft Excel Axis Properties Remote Code Execution Vulnerability T-613: Microsoft Excel Axis Properties Remote Code Execution Vulnerability May 2, 2011 - 7:42am Addthis PROBLEM: Microsoft Excel is prone to a remote code-execution vulnerability because the applications fail to sufficiently validate user-supplied input. PLATFORM: Microsoft Excel (2002-2010) ABSTRACT: Microsoft Excel is prone to a remote code-execution vulnerability because the applications fails to sufficiently validate user-supplied input. Attackers can exploit this issue by enticing an unsuspecting user to open a specially crafted Excel file. Successful exploits can allow attackers to execute arbitrary code with the privileges of the user running the application. Failed exploit attempts will result in a denial-of-service

146

T-573: Windows Remote Desktop Client DLL Loading Error Lets Remote Users  

Broader source: Energy.gov (indexed) [DOE]

3: Windows Remote Desktop Client DLL Loading Error Lets Remote 3: Windows Remote Desktop Client DLL Loading Error Lets Remote Users Execute Arbitrary Code T-573: Windows Remote Desktop Client DLL Loading Error Lets Remote Users Execute Arbitrary Code March 9, 2011 - 3:05pm Addthis PROBLEM: Vulnerability in Remote Desktop Client Could Allow Remote Code Execution. PLATFORM: Remote Desktop Connection Client Version(s): 5.2, 6.0, 6.1, 7.0 ABSTRACT: A vulnerability was reported in Windows Remote Desktop Client. A remote user can cause arbitrary code to be executed on the target user's system. reference LINKS: Microsoft Security Bulletin MS11-017 SecurityTracker Alert ID:1025172 CVE-2011-0029 IMPACT ASSESSMENT: Moderate Discussion: A remote user can create a specially crafted DLL file on a remote share (e.g., WebDAV, SMB share). When the target user opens a valid Remote

147

V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site...  

Broader source: Energy.gov (indexed) [DOE]

U-255: Apache Wicket Input Validation Flaw Permits Cross-Site Scripting Attacks U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting...

148

V-203: HP LoadRunner Multiple Bugs Let Remote Users Deny Service...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

system. SOLUTION: The vendor has issued a fix(11.52) Addthis Related Articles V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code V-171: Apple Safari Bugs Let...

149

V-203: HP LoadRunner Multiple Bugs Let Remote Users Deny Service and  

Broader source: Energy.gov (indexed) [DOE]

3: HP LoadRunner Multiple Bugs Let Remote Users Deny Service 3: HP LoadRunner Multiple Bugs Let Remote Users Deny Service and Execute Arbitrary Code V-203: HP LoadRunner Multiple Bugs Let Remote Users Deny Service and Execute Arbitrary Code July 26, 2013 - 3:31am Addthis PROBLEM: A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions. PLATFORM: HP LoadRunner prior to 11.52 ABSTRACT: Multiple vulnerabilities were reported in HP LoadRunner. REFERENCE LINKS: Security Tracker Alert ID: 1028833 CVE-2013-2368 CVE-2013-2369 CVE-2013-2370 CVE-2013-4797 CVE-2013-4798 CVE-2013-4799 CVE-2013-4800 CVE-2013-4801 IMPACT ASSESSMENT: Medium DISCUSSION: Potential security vulnerabilities have been identified with HP LoadRunner. The vulnerabilities could be remotely exploited to allow execution of code

150

U-219: Symantec Web Gateway Input Validation Flaws Lets Remote Users Inject  

Broader source: Energy.gov (indexed) [DOE]

19: Symantec Web Gateway Input Validation Flaws Lets Remote 19: Symantec Web Gateway Input Validation Flaws Lets Remote Users Inject SQL Commands, Execute Arbitrary Commands, and Change User Passwords U-219: Symantec Web Gateway Input Validation Flaws Lets Remote Users Inject SQL Commands, Execute Arbitrary Commands, and Change User Passwords July 24, 2012 - 7:00am Addthis PROBLEM: Symantec Web Gateway Input Validation Flaws Lets Remote Users Inject SQL Commands, Execute Arbitrary Commands, and Change User Passwords PLATFORM: Symantec Web Gateway 5.0.x.x ABSTRACT: Several vulnerabilities were reported in Symantec Web Gateway. REFERENCE LINKS: Security Advisories Relating to Symantec Products SecurityTracker Alert ID: 1027289 Bugtraq ID: 54424 Bugtraq ID: 54425 Bugtraq ID: 54426 Bugtraq ID: 54427 Bugtraq ID: 54429 Bugtraq ID: 54430

151

V-002: EMC NetWorker Module for Microsoft Applications Lets Remote Users  

Broader source: Energy.gov (indexed) [DOE]

2: EMC NetWorker Module for Microsoft Applications Lets Remote 2: EMC NetWorker Module for Microsoft Applications Lets Remote Users Execute Arbitrary Code and Local Users Obtain Passwords V-002: EMC NetWorker Module for Microsoft Applications Lets Remote Users Execute Arbitrary Code and Local Users Obtain Passwords October 15, 2012 - 6:00am Addthis PROBLEM: EMC NetWorker Module for Microsoft Applications Lets Remote Users Execute Arbitrary Code and Local Users Obtain Passwords PLATFORM: EMC NetWorker Module for Microsoft Applications 2.2.1, 2.3 prior to build 122, 2.4 prior to build 375 ABSTRACT: EMC NetWorker Module for Microsoft Applications Two Vulnerabilities REFERENCE LINKS: EMC Identifier: ESA-2012-025 Secunia Advisory SA50957 SecurityTracker Alert ID: 1027647 CVE-2012-2284 CVE-2012-2290 IMPACT ASSESSMENT: Medium DISCUSSION:

152

U-219: Symantec Web Gateway Input Validation Flaws Lets Remote Users Inject  

Broader source: Energy.gov (indexed) [DOE]

19: Symantec Web Gateway Input Validation Flaws Lets Remote 19: Symantec Web Gateway Input Validation Flaws Lets Remote Users Inject SQL Commands, Execute Arbitrary Commands, and Change User Passwords U-219: Symantec Web Gateway Input Validation Flaws Lets Remote Users Inject SQL Commands, Execute Arbitrary Commands, and Change User Passwords July 24, 2012 - 7:00am Addthis PROBLEM: Symantec Web Gateway Input Validation Flaws Lets Remote Users Inject SQL Commands, Execute Arbitrary Commands, and Change User Passwords PLATFORM: Symantec Web Gateway 5.0.x.x ABSTRACT: Several vulnerabilities were reported in Symantec Web Gateway. REFERENCE LINKS: Security Advisories Relating to Symantec Products SecurityTracker Alert ID: 1027289 Bugtraq ID: 54424 Bugtraq ID: 54425 Bugtraq ID: 54426 Bugtraq ID: 54427 Bugtraq ID: 54429 Bugtraq ID: 54430

153

V-002: EMC NetWorker Module for Microsoft Applications Lets Remote Users  

Broader source: Energy.gov (indexed) [DOE]

2: EMC NetWorker Module for Microsoft Applications Lets Remote 2: EMC NetWorker Module for Microsoft Applications Lets Remote Users Execute Arbitrary Code and Local Users Obtain Passwords V-002: EMC NetWorker Module for Microsoft Applications Lets Remote Users Execute Arbitrary Code and Local Users Obtain Passwords October 15, 2012 - 6:00am Addthis PROBLEM: EMC NetWorker Module for Microsoft Applications Lets Remote Users Execute Arbitrary Code and Local Users Obtain Passwords PLATFORM: EMC NetWorker Module for Microsoft Applications 2.2.1, 2.3 prior to build 122, 2.4 prior to build 375 ABSTRACT: EMC NetWorker Module for Microsoft Applications Two Vulnerabilities REFERENCE LINKS: EMC Identifier: ESA-2012-025 Secunia Advisory SA50957 SecurityTracker Alert ID: 1027647 CVE-2012-2284 CVE-2012-2290 IMPACT ASSESSMENT: Medium DISCUSSION:

154

T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request  

Broader source: Energy.gov (indexed) [DOE]

68: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site 68: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request Forgery Attacks and Execute Arbitrary Code T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request Forgery Attacks and Execute Arbitrary Code March 2, 2011 - 3:05pm Addthis PROBLEM: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request Forgery Attacks and Execute Arbitrary Code. PLATFORM: Firefox, Thunderbird, SeaMonkey ABSTRACT: Mozilla developers identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and Mozilla presume that with enough effort at least some of these could be exploited to run arbitrary code. reference LINKS:

155

U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic 259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL Buffer Overflow Lets Remote Users Execute Arbitrary Code U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL Buffer Overflow Lets Remote Users Execute Arbitrary Code September 13, 2012 - 6:00am Addthis PROBLEM: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL Buffer Overflow Lets Remote Users Execute Arbitrary Code PLATFORM: RSA BSAFE SSL-C prior to 2.8.6 ABSTRACT: RSA BSAFE SSL-C Multiple Vulnerabilities reference LINKS: Secunia Advisory SA50601 SecurityTracker Alert ID: 1027514 SecurityTracker Alert ID: 1027513 CVE-2011-3389 CVE-2012-2110 CVE-2012-2131 IMPACT ASSESSMENT: High Discussion: EMC has acknowledged a weakness and a vulnerability in RSA BSAFE, which can

156

U-140: HP-UX Unspecified Flaw in DCE Lets Remote Users Execute...  

Broader source: Energy.gov (indexed) [DOE]

code via network, User access via network Solution: The vendor has issued a fix. The patch is available at HP support Center Addthis Related Articles U-137: HP Performance...

157

U-097: PHP "php_register_variable_ex()" Code Execution Vulnerability |  

Broader source: Energy.gov (indexed) [DOE]

097: PHP "php_register_variable_ex()" Code Execution 097: PHP "php_register_variable_ex()" Code Execution Vulnerability U-097: PHP "php_register_variable_ex()" Code Execution Vulnerability February 7, 2012 - 9:00am Addthis PROBLEM: PHP "php_register_variable_ex()" Code Execution Vulnerability PLATFORM: PHP 5.3.x ABSTRACT: Execution of arbitrary code via network as well as user access via network reference LINKS: PHP Security Archive SecurityTracker Alert ID: 1026631 Secunia Advisory SA47806 CVE-2012-0830 IMPACT ASSESSMENT: High Discussion: A vulnerability has been reported in PHP, which can be exploited by malicious people to compromise a vulnerable system. Impact: A remote user can send specially crafted data to trigger a memory error in php_register_variable_ex() and execute arbitrary code on the target system.

158

U-064: Adobe Acrobat/Reader PRC Memory Corruption Error Lets Remote Users  

Broader source: Energy.gov (indexed) [DOE]

4: Adobe Acrobat/Reader PRC Memory Corruption Error Lets Remote 4: Adobe Acrobat/Reader PRC Memory Corruption Error Lets Remote Users Execute Arbitrary Code U-064: Adobe Acrobat/Reader PRC Memory Corruption Error Lets Remote Users Execute Arbitrary Code December 19, 2011 - 9:15am Addthis PROBLEM: Adobe Acrobat/Reader PRC Memory Corruption Error Lets Remote Users Execute Arbitrary Code. PLATFORM: Adobe Acrobat Reader Version(s): 10.1.1 and prior versions ABSTRACT: A vulnerability was reported in Adobe Acrobat/Reader, this vulnerability is being actively exploited against Windows-based systems. reference LINKS: SecurityTracker Alert ID: 1026432 APSB11-30 CVE-2011-4369 JC3-CIRC Tech Bulletin U-054 APSA11-04 IMPACT ASSESSMENT: High Discussion: A remote user can create a specially crafted PDF file that, when loaded by the target user, will trigger a memory corruption error in the PRC

159

U-064: Adobe Acrobat/Reader PRC Memory Corruption Error Lets Remote Users  

Broader source: Energy.gov (indexed) [DOE]

4: Adobe Acrobat/Reader PRC Memory Corruption Error Lets Remote 4: Adobe Acrobat/Reader PRC Memory Corruption Error Lets Remote Users Execute Arbitrary Code U-064: Adobe Acrobat/Reader PRC Memory Corruption Error Lets Remote Users Execute Arbitrary Code December 19, 2011 - 9:15am Addthis PROBLEM: Adobe Acrobat/Reader PRC Memory Corruption Error Lets Remote Users Execute Arbitrary Code. PLATFORM: Adobe Acrobat Reader Version(s): 10.1.1 and prior versions ABSTRACT: A vulnerability was reported in Adobe Acrobat/Reader, this vulnerability is being actively exploited against Windows-based systems. reference LINKS: SecurityTracker Alert ID: 1026432 APSB11-30 CVE-2011-4369 JC3-CIRC Tech Bulletin U-054 APSA11-04 IMPACT ASSESSMENT: High Discussion: A remote user can create a specially crafted PDF file that, when loaded by the target user, will trigger a memory corruption error in the PRC

160

V-049: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

9: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let 9: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users Execute Arbitrary Code V-049: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users Execute Arbitrary Code December 18, 2012 - 1:30am Addthis PROBLEM: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users Execute Arbitrary Code PLATFORM: Windows RealPlayer 15.0.6.14 and prior. ABSTRACT: Two vulnerabilities were reported in RealPlayer. REFERENCE LINKS: RealPlayer Security Vulnerabilities Secunia Advisory SA51589 SecurityTracker Alert ID: 1027893 CVE-2012-5690 CVE-2012-5691 IMPACT ASSESSMENT: Medium DISCUSSION: Two vulnerabilities have been reported in RealPlayer, which can be exploited by malicious people to compromise a user's system. A remote user can create a specially crafted RealAudio file that, when

Note: This page contains sample records for the topic "users execute arbitrary" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information,  

Broader source: Energy.gov (indexed) [DOE]

3:Adobe Flash Player Multiple Bugs Let Remote Users Obtain 3:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code September 22, 2011 - 8:00am Addthis PROBLEM: Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code. PLATFORM: Adobe Flash Player 10.3.183.7 and earlier versions for Windows, Macintosh, Linux and Solaris. Adobe Flash Player 10.3.186.6 and earlier versions for Android. ABSTRACT: An attacker can exploit this issue by enticing an unsuspecting victim into visiting a malicious website. reference LINKS: Adobe Security Bulletin

162

U-037: Linux Kernel NFSv4 ACL Attribute Processing Error Lets Remote Users  

Broader source: Energy.gov (indexed) [DOE]

7: Linux Kernel NFSv4 ACL Attribute Processing Error Lets 7: Linux Kernel NFSv4 ACL Attribute Processing Error Lets Remote Users Execute Arbitrary Code U-037: Linux Kernel NFSv4 ACL Attribute Processing Error Lets Remote Users Execute Arbitrary Code November 16, 2011 - 7:43am Addthis PROBLEM: Linux Kernel NFSv4 ACL Attribute Processing Error Lets Remote Users Execute Arbitrary Code. PLATFORM: Kernel version 2.6.x ABSTRACT: A remote server can cause the target connected client to crash. reference LINKS: The Linux Kernel Archives CVE-2011-4131 SecurityTracker Alert ID: 1026324 Linux Kernel [PATCH 1/1] NFSv4 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in the Linux Kernel. A remote user can cause denial of service conditions. Impact: A remote server can return specially crafted data to the connected target

163

User Executive Committee | EMSL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Tratnyek (Vice-chair), Oregon Health & Science University Simon R. Bare, UOP LLC, a Honeywell Company David A. Dixon The University of Alabama Mary Gilles, Lawrence Berkeley...

164

V-054: IBM WebSphere Application Server for z/OS Arbitrary Command...  

Broader source: Energy.gov (indexed) [DOE]

4: IBM WebSphere Application Server for zOS Arbitrary Command Execution Vulnerability V-054: IBM WebSphere Application Server for zOS Arbitrary Command Execution Vulnerability...

165

U-007: IBM Rational AppScan Import/Load Function Flaws Let Remote Users  

Broader source: Energy.gov (indexed) [DOE]

7: IBM Rational AppScan Import/Load Function Flaws Let Remote 7: IBM Rational AppScan Import/Load Function Flaws Let Remote Users Execute Arbitrary Code U-007: IBM Rational AppScan Import/Load Function Flaws Let Remote Users Execute Arbitrary Code October 10, 2011 - 9:15am Addthis PROBLEM: IBM Rational AppScan Import/Load Function Flaws Let Remote Users Execute Arbitrary Code. PLATFORM: Version(s): 7.8, 7.8.0.1, 7.8.0.2, 7.9, 7.9.0.1, 7.9.0.2, 7.9.0.3, 8.0, 8.0.0.1, 8.0.0.2 ABSTRACT: Two vulnerabilities were reported in IBM Rational AppScan. A remote user can cause arbitrary code to be executed on the target user's system. reference LINKS: IBM Security Advisory Document ID: 1515110 IBM Fix Pack Document ID: 4030774 SecurityTracker Alert ID: 1026154 IMPACT ASSESSMENT: High Discussion: A high risk security vulnerability in the "Import functionality" of IBM

166

V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and  

Broader source: Energy.gov (indexed) [DOE]

6: Cisco Wireless LAN Controller Bugs Let Remote Users Deny 6: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code January 24, 2013 - 6:00am Addthis PROBLEM: Several vulnerabilities were reported in Cisco Wireless LAN Controller. PLATFORM: The vulnerabilities are reported in: Cisco 2000 Series WLC Cisco 2100 Series WLC Cisco 2500 Series WLC Cisco 4100 Series WLC Cisco 4400 Series WLC Cisco 5500 Series WLC Cisco 7500 Series WLC Cisco 8500 Series WLC Cisco 500 Series Wireless Express Mobility Controllers Cisco Wireless Services Module (Cisco WiSM) Cisco Wireless Services Module version 2 (Cisco WiSM version 2)

167

T-680:Samba SWAT 'user' Field Cross Site Scripting Vulnerability |  

Broader source: Energy.gov (indexed) [DOE]

0:Samba SWAT 'user' Field Cross Site Scripting Vulnerability 0:Samba SWAT 'user' Field Cross Site Scripting Vulnerability T-680:Samba SWAT 'user' Field Cross Site Scripting Vulnerability August 1, 2011 - 2:10pm Addthis PROBLEM: Samba SWAT 'user' Field Cross Site Scripting Vulnerability PLATFORM: All Linux ABSTRACT: It was found that the 'Change Password' page / screen of the Samba Web Administration Tool did not properly sanitize content of the user-provided "user" field, prior printing it back to the page content. A remote attacker could provide a specially-crafted URL, which once visited by an authenticated Samba SWAT user could allow the attacker to conduct cross-site scripting attacks (execute arbitrary HTML or script code). reference LINKS: SecurityFocus - Bugtraq ID: 48901 Secunia CVE Reference: CVE-2011-2694

168

T-680:Samba SWAT 'user' Field Cross Site Scripting Vulnerability |  

Broader source: Energy.gov (indexed) [DOE]

80:Samba SWAT 'user' Field Cross Site Scripting Vulnerability 80:Samba SWAT 'user' Field Cross Site Scripting Vulnerability T-680:Samba SWAT 'user' Field Cross Site Scripting Vulnerability August 1, 2011 - 2:10pm Addthis PROBLEM: Samba SWAT 'user' Field Cross Site Scripting Vulnerability PLATFORM: All Linux ABSTRACT: It was found that the 'Change Password' page / screen of the Samba Web Administration Tool did not properly sanitize content of the user-provided "user" field, prior printing it back to the page content. A remote attacker could provide a specially-crafted URL, which once visited by an authenticated Samba SWAT user could allow the attacker to conduct cross-site scripting attacks (execute arbitrary HTML or script code). reference LINKS: SecurityFocus - Bugtraq ID: 48901 Secunia CVE Reference: CVE-2011-2694

169

U-069: Telnet code execution vulnerability: FreeBSD and Kerberos |  

Broader source: Energy.gov (indexed) [DOE]

69: Telnet code execution vulnerability: FreeBSD and Kerberos 69: Telnet code execution vulnerability: FreeBSD and Kerberos U-069: Telnet code execution vulnerability: FreeBSD and Kerberos December 27, 2011 - 5:18am Addthis PROBLEM: Telnet code execution vulnerability: FreeBSD and Kerberos PLATFORM: Operating System: FreeBSD 7.1, 7.3, 8.0 and 8.1 and Software: Kerberos ABSTRACT: Vulnerability was reported in FreeBSD Telnet. A remote user can execute arbitrary code on the target system. reference LINKS: FreeBSD-SA-11:08.telnetd MITKRB5-SA-2011-008 Secunia Advisory: SA47397 (FreeBSD) Secunia Advisory: SA47348 (Kerberos) SecurityTracker Alert ID: 1026460 CVE-2011-4862 IMPACT ASSESSMENT: High Discussion: When an encryption key is supplied via the TELNET protocol, its length is not validated before the key is copied into a fixed-size buffer. The telnet

170

SSRL Users' Organization | Stanford Synchrotron Radiation Lightsource  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

concerned with representing the interests of the SSRL users (see Charter). Users elect members to serve on the Users' Executive Committee (UEC) to carry out the business of...

171

Executive Summary  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Executive Summary Executive Summary Highway-based excise taxes are paid by highway users, and the tax revenues are distributed to States for supporting highways, safety, and transit programs. The processes for collecting these taxes and redistributing them to the States are very complex. The U.S. Treasury collects most of the taxes from a relatively small number of large corporations located in only a few States. The Internal Revenue Service (IRS) does not have an accurate picture of where the motor fuel is eventually consumed. Because the actual State-by-State contributions are not available, detailed analyses are required to estimate a State's on-highway motor fuel use. The attribution process uses State-reported data and nationally applied statistical models to determine how much fuel is used on highways in each State and the proportion of each State's usage in comparison to the total motor fuel usage for all States.

172

U-265: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain  

Broader source: Energy.gov (indexed) [DOE]

5: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users 5: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain Information and Execute Arbitrary Code U-265: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain Information and Execute Arbitrary Code September 21, 2012 - 6:00am Addthis PROBLEM: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain Information and Execute Arbitrary Code PLATFORM: HP SiteScope v11.10, v11.11, v11.12 for Windows, Linux and Solaris ABSTRACT: A vulnerability was reported in HP SiteScope. reference LINKS: HP Security Bulletin Document ID: c03489683 SecurityTracker Alert ID: 1027547 CVE-2012-3259 CVE-2012-3260 CVE-2012-3261 CVE-2012-3262 CVE-2012-3263 CVE-2012-3264 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in HP SiteScope. A remote user can execute

173

U-265: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain  

Broader source: Energy.gov (indexed) [DOE]

5: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users 5: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain Information and Execute Arbitrary Code U-265: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain Information and Execute Arbitrary Code September 21, 2012 - 6:00am Addthis PROBLEM: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain Information and Execute Arbitrary Code PLATFORM: HP SiteScope v11.10, v11.11, v11.12 for Windows, Linux and Solaris ABSTRACT: A vulnerability was reported in HP SiteScope. reference LINKS: HP Security Bulletin Document ID: c03489683 SecurityTracker Alert ID: 1027547 CVE-2012-3259 CVE-2012-3260 CVE-2012-3261 CVE-2012-3262 CVE-2012-3263 CVE-2012-3264 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in HP SiteScope. A remote user can execute

174

T-643: HP OpenView Storage Data Protector Unspecified Code Execution  

Broader source: Energy.gov (indexed) [DOE]

643: HP OpenView Storage Data Protector Unspecified Code 643: HP OpenView Storage Data Protector Unspecified Code Execution Vulnerability T-643: HP OpenView Storage Data Protector Unspecified Code Execution Vulnerability June 9, 2011 - 3:45pm Addthis PROBLEM: HP OpenView Storage Data Protector Unspecified Code Execution Vulnerability PLATFORM: Versions 6.0, 6.10, and 6.11 running on HP-UX, Solaris, Linux and Windows. ABSTRACT: A vulnerability has been reported in HP OpenView Storage Data Protector, which can be exploited by malicious people to compromise a vulnerable system. reference LINKS: Secunia Advisory SA44884 CVE-2011-1864 SecurityTracker Alert ID: 1025620 HP Document ID: c02712867 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in HP OpenView Storage Data Protector. A remote user can execute arbitrary code on the target system.

175

U-149: Apache OFBiz Cross-Site Scripting and Code Execution Vulnerabilities  

Broader source: Energy.gov (indexed) [DOE]

9: Apache OFBiz Cross-Site Scripting and Code Execution 9: Apache OFBiz Cross-Site Scripting and Code Execution Vulnerabilities U-149: Apache OFBiz Cross-Site Scripting and Code Execution Vulnerabilities April 17, 2012 - 8:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Apache OFBiz, which can be exploited by malicious people to conduct cross-site scripting attacks and compromise a vulnerable system. PLATFORM: Apache OFBiz 10.x ABSTRACT: The vulnerabilities are reported in version 10.04.01. Prior versions may also be affected. references LINKS: Vendor Advisory Secunia Advisory 48800 CVE-2012-1621 IMPACT ASSESSMENT: High Discussion: 1) Certain unspecified input is not properly sanitised within the "getServerError()" function in checkoutProcess.js before being returned to the user. This can be exploited to execute arbitrary HTML and script code

176

ARM - User Executive Committee Bios  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

the ARM SGP site during multiple cloud intensive observation periods. More recently, he led an IOP in 2010 at the ARM SPG site to study greenhouse gases. He is currently involved...

177

NIF User Group Executive Board  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Los Alamos National Laboratory Dr. Paul Neumayer GSI Darmstadt Dr. Hye-Sook Park Lawrence Livermore National Laboratory Dr. Mingsheng Wei General Atomics Professor Michael...

178

ARM - User Executive Committee Bios  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

studies supported by the National Science Foundation, the Department of Homeland Security and the DOE Wind Power program. Andrew Gettelman Andrew Gettelman - National Center...

179

U-148: ActiveScriptRuby GRScript18.dll ActiveX Control Ruby Code Execution  

Broader source: Energy.gov (indexed) [DOE]

48: ActiveScriptRuby GRScript18.dll ActiveX Control Ruby Code 48: ActiveScriptRuby GRScript18.dll ActiveX Control Ruby Code Execution Vulnerability U-148: ActiveScriptRuby GRScript18.dll ActiveX Control Ruby Code Execution Vulnerability April 16, 2012 - 7:00am Addthis PROBLEM: A vulnerability has been reported in ActiveScriptRuby, which can be exploited by malicious people to potentially compromise a user's system. PLATFORM: Version(s): 1.2.2.0 and prior ABSTRACT: The vulnerability is caused due to an error in GRScript18.dll and can be exploited to execute arbitrary Ruby commands. reference LINKS: Secunia Advisory 48811 CVE-2012-1241 IMPACT ASSESSMENT: High Discussion: ActiveScriptRuby is a software to implement Ruby into a Windows environment. ActiveScriptRuby contains a vulnerability where an arbitrary Ruby script may be executed on the web browser that can execute ActiveX

180

U-056: Linux Kernel HFS Buffer Overflow Lets Local Users Gain Root  

Broader source: Energy.gov (indexed) [DOE]

6: Linux Kernel HFS Buffer Overflow Lets Local Users Gain Root 6: Linux Kernel HFS Buffer Overflow Lets Local Users Gain Root Privileges U-056: Linux Kernel HFS Buffer Overflow Lets Local Users Gain Root Privileges December 9, 2011 - 8:00am Addthis PROBLEM: Linux Kernel HFS Buffer Overflow Lets Local Users Gain Root Privileges. PLATFORM: Linux kernel ABSTRACT: A vulnerability was reported in the Linux Kernel. reference LINKS: The Linux Kernel Archives SecurityTracker Alert ID: 1026395 CVE-2011-4330 IMPACT ASSESSMENT: Medium Discussion: When a specially crafted Hierarchical File System (HFS) file system is mounted, a local user can to trigger a buffer overflow and execute arbitrary code on the target system with root privileges. The vulnerability resides in the hfs_mac2asc() function. Impact: A local user can obtain root privileges on the target system.

Note: This page contains sample records for the topic "users execute arbitrary" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

U-092: Sudo Format String Bug Lets Local Users Gain Elevated Privileges |  

Broader source: Energy.gov (indexed) [DOE]

2: Sudo Format String Bug Lets Local Users Gain Elevated 2: Sudo Format String Bug Lets Local Users Gain Elevated Privileges U-092: Sudo Format String Bug Lets Local Users Gain Elevated Privileges January 31, 2012 - 5:45am Addthis PROBLEM: A vulnerability was reported in Sudo. A local user can obtain elevated privileges on the target system. PLATFORM: Linux (Any) Version(s): 1.8.0 - 1.8.3p1 ABSTRACT: A local user can supply a specially crafted command line argument to trigger a format string flaw and execute arbitrary commands on the target system with root privileges. reference LINKS: CVE-2012-0809 SecurityTracker Alert ID: 1026600 Vendor Site IMPACT ASSESSMENT: Medium Discussion: The vulnerability resides in the sudo_debug() function in 'src/sudo.c'. This can be exploited by local users, regardless of whether they are listed

182

U-026: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject  

Broader source: Energy.gov (indexed) [DOE]

6: Cisco Small Business SRP500 Series Bug Lets Remote Users 6: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject Commands U-026: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject Commands November 3, 2011 - 8:15am Addthis PROBLEM: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject Commands. PLATFORM: The following models are affected when running firmware prior to version 1.1.24: Cisco SRP521W Cisco SRP526W Cisco SRP527W The following models are affected when running firmware prior to version 1.2.1: Cisco SRP541W Cisco SRP546W Cisco SRP547W ABSTRACT: A remote user can create a URL that, when loaded by the target authenticated administrative user, will execute arbitrary commands on the target system. reference LINKS: Advisory ID: cisco-sa-20111102-srp500 SecurityTracker Alert ID: 1026266

183

V-093: Symantec PGP Desktop Buffer Overflows Let Local Users Gain Elevated  

Broader source: Energy.gov (indexed) [DOE]

3: Symantec PGP Desktop Buffer Overflows Let Local Users Gain 3: Symantec PGP Desktop Buffer Overflows Let Local Users Gain Elevated Privileges V-093: Symantec PGP Desktop Buffer Overflows Let Local Users Gain Elevated Privileges February 18, 2013 - 12:53am Addthis PROBLEM: Symantec PGP Desktop Buffer Overflows Let Local Users Gain Elevated Privileges PLATFORM: Symantec PGP Desktop 10.2.x,10.1.x,10.0.x Symantec Encryption Desktop 10.3.0 ABSTRACT: Two vulnerabilities were reported in Symantec PGP Desktop. REFERENCE LINKS: Symantec Security Advisory SYM13-001 Bugtraq ID: 57170 SecurityTracker Alert ID: 1028145 CVE-2012-4351 CVE-2012-4352 IMPACT ASSESSMENT: Medium DISCUSSION: A local user can trigger an integer overflow in 'pgpwded.sys' to execute arbitrary code on the target system [CVE-2012-4351]. On Windows XP and Windows Sever 2003, a local user can trigger a buffer

184

Executive Director  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Executive Director Executive Director Rich Marquez, Executive Director, leads institutional initiatives and provides oversight for the Laboratory's organizations for Ethics and Audits, Prime Contract, Chief Financial Officer, Chief Information Officer, Ombuds, and Communications and Government Affairs. Contact Operator Los Alamos National Laboratory (505) 667-5061 Marquez has received a number of significant awards and recognitions, including the Presidential Rank Award for Meritorious Service. Rich Marquez Executive Director Rich Marquez, Executive Director Richard A. (Rich) Marquez currently serves Los Alamos National Laboratory as executive director reporting to the Laboratory director. Marquez leads institutional initiatives and provides oversight for several Laboratory organizations, including

185

T-690: Check Point Endpoint Security On-Demand Client Lets Remote Users  

Broader source: Energy.gov (indexed) [DOE]

0: Check Point Endpoint Security On-Demand Client Lets Remote 0: Check Point Endpoint Security On-Demand Client Lets Remote Users Execute Arbitrary Code T-690: Check Point Endpoint Security On-Demand Client Lets Remote Users Execute Arbitrary Code August 10, 2011 - 8:45am Addthis PROBLEM: Due to quality issues within the software, an attacker is able to access insecure methods from the "trustworthy" Java applet or ActiveX control and exploit those features to compromise all client systems that trust the correctly signed Java applet or ActiveX control (e.g. all users that need to use this software for accessing internal systems over company VPN). PLATFORM: Multiple products:- R65.70 - R70.40 - R71.30 - R75 - Connectra R66.1 - Connectra R66.1n - VSX R65.20 - VSX R67 ABSTRACT: Check Point Endpoint Security On-Demand Client Lets Remote Users Execute

186

T-567: Linux Kernel Buffer Overflow in ldm_frag_add() May Let Local Users  

Broader source: Energy.gov (indexed) [DOE]

7: Linux Kernel Buffer Overflow in ldm_frag_add() May Let Local 7: Linux Kernel Buffer Overflow in ldm_frag_add() May Let Local Users Gain Elevated Privileges T-567: Linux Kernel Buffer Overflow in ldm_frag_add() May Let Local Users Gain Elevated Privileges March 1, 2011 - 6:44pm Addthis PROBLEM: Linux Kernel Buffer Overflow in ldm_frag_add() May Let Local Users Gain Elevated Privileges . PLATFORM: Linux Kernel 2.4.x, 2.6.x ABSTRACT: A vulnerability was reported in the Linux Kernel. A local user may be able to obtain elevated privileges on the target system. A physically local user can connect a storage device with a specially crafted LDM partition table to trigger a buffer overflow in the ldm_frag_add() function in 'fs/partitions/ldm.c' and potentially execute arbitrary code with elevated privileges. reference LINKS: Security Tracker - Alert ID: 1025128

187

V-156: Linux Kernel Array Bounds Checking Flaw Lets Local Users Gain  

Broader source: Energy.gov (indexed) [DOE]

6: Linux Kernel Array Bounds Checking Flaw Lets Local Users 6: Linux Kernel Array Bounds Checking Flaw Lets Local Users Gain Elevated Privileges V-156: Linux Kernel Array Bounds Checking Flaw Lets Local Users Gain Elevated Privileges May 15, 2013 - 12:19am Addthis PROBLEM: Linux Kernel Array Bounds Checking Flaw Lets Local Users Gain Elevated Privileges PLATFORM: Version(s): 2.6.37 to 3.8.9 ABSTRACT: A vulnerability was reported in the Linux Kernel. REFERENCE LINKS: Linux Kernel SecurityTracker Alert ID: 1028565 CVE-2013-2094 IMPACT ASSESSMENT: Medium DISCUSSION: On systems compiled with PERF_EVENTS support, a local user can supply a specially crafted perf_event_open() call to execute arbitrary code on the target system with root privileges. The vulnerability resides in the perf_swevent_init() function in 'kernel/events/core.c'.

188

T-567: Linux Kernel Buffer Overflow in ldm_frag_add() May Let Local Users  

Broader source: Energy.gov (indexed) [DOE]

7: Linux Kernel Buffer Overflow in ldm_frag_add() May Let Local 7: Linux Kernel Buffer Overflow in ldm_frag_add() May Let Local Users Gain Elevated Privileges T-567: Linux Kernel Buffer Overflow in ldm_frag_add() May Let Local Users Gain Elevated Privileges March 1, 2011 - 6:44pm Addthis PROBLEM: Linux Kernel Buffer Overflow in ldm_frag_add() May Let Local Users Gain Elevated Privileges . PLATFORM: Linux Kernel 2.4.x, 2.6.x ABSTRACT: A vulnerability was reported in the Linux Kernel. A local user may be able to obtain elevated privileges on the target system. A physically local user can connect a storage device with a specially crafted LDM partition table to trigger a buffer overflow in the ldm_frag_add() function in 'fs/partitions/ldm.c' and potentially execute arbitrary code with elevated privileges. reference LINKS: Security Tracker - Alert ID: 1025128

189

T-593: Microsoft Internet Explorer unspecified code execution | Department  

Broader source: Energy.gov (indexed) [DOE]

593: Microsoft Internet Explorer unspecified code execution 593: Microsoft Internet Explorer unspecified code execution T-593: Microsoft Internet Explorer unspecified code execution April 1, 2011 - 6:22am Addthis PROBLEM: Microsoft Internet Explorer could allow a remote attacker to execute arbitrary code on the system. A remote attacker could exploit this vulnerability using unknown attack vectors to execute arbitrary code on the system. PLATFORM: Microsoft Internet Explorer 8 ABSTRACT: Unspecified vulnerability in Microsoft Internet Explorer 8 on Windows 7 allows remote attackers to bypass Protected Mode and create arbitrary files by leveraging access to a Low integrity process. reference LINKS: CVE-2011-1347 Update Date : 2011-03-30 Microsoft >> IE: Vulnerability Statistics IMPACT ASSESSMENT: High Discussion: Microsoft Internet Explorer could allow a remote attacker to execute

190

V-170: Apache Subversion Hook Scripts Arbitrary Command Injection  

Broader source: Energy.gov (indexed) [DOE]

0: Apache Subversion Hook Scripts Arbitrary Command Injection 0: Apache Subversion Hook Scripts Arbitrary Command Injection Vulnerability V-170: Apache Subversion Hook Scripts Arbitrary Command Injection Vulnerability June 4, 2013 - 12:17am Addthis PROBLEM: Apache Subversion Hook Scripts Arbitrary Command Injection Vulnerability PLATFORM: Apache Subversion 1.x ABSTRACT: A vulnerability has been reported in Apache Subversion. REFERENCE LINKS: Apache Original Advisory Secunia Advisory SA53727 CVE-2013-2088 IMPACT ASSESSMENT: Medium DISCUSSION: The vulnerability is caused due to an input validation error in the svn-keyword-check.pl hook script while processing filenames and can be exploited to inject and execute arbitrary shell commands via a specially crafted request. Successful exploitation requires that contrib scripts are used on the

191

U-201: HP System Management Homepage Bugs Let Remote Users Deny Service |  

Broader source: Energy.gov (indexed) [DOE]

1: HP System Management Homepage Bugs Let Remote Users Deny 1: HP System Management Homepage Bugs Let Remote Users Deny Service U-201: HP System Management Homepage Bugs Let Remote Users Deny Service June 28, 2012 - 7:00am Addthis PROBLEM: A vulnerability was reported in HP System Management Homepage. PLATFORM: Version(s): prior to 7.1.1 ABSTRACT: The vulnerabilities could be exploited remotely resulting in unauthorized access, disclosure of information, data modification, Denial of Service (DoS), and execution of arbitrary code. Reference links: Original Advisory Security Tracker ID 1027209 CVE-2012-2012, CVE-2012-2013, CVE-2012-2014 CVE-2012-2015, CVE-2012-2016 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in HP System Management Homepage. A remote authenticated user can gain elevated privileges. A remote authenticated

192

FY2008 SSRLUO Executive Committee  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

8 Executive Committee 8 Executive Committee corner corner Environmental Sciences Graduate Student LCLS Macromolecular Crystallography Materials Chemistry SSRL Liaison Biospectroscopy corner corner Joy Andrews California State University East Bay, Chemistry, 25800 Carlos Bee Blvd., Hayward, CA 94542 Professor in the Department of Chemistry and Biochemistry at California State University, East Bay, where she has taught since 1996. Her B.A. degree is in biochemistry from Barnard College, and Ph.D. in Biophysical Chemistry from UC Berkeley. Her research is on the detection, speciation and remediation of heavy metal contamination at various environmental sites, using atomic absorption spectroscopy, ion chromatography, and x-ray absorption spectroscopy. She is also conducting continuous monitoring of water quality parameters in SF Bay, funded by CICORE/NOAA. She was Chair, Executive Committee, Stanford Synchrotron Radiation Laboratory User's Organization Oct 2005-Oct 2006; and Chair, Synchrotron and Neutron User's Group Advocacy Committee since October 2005.

193

V-054: IBM WebSphere Application Server for z/OS Arbitrary Command  

Broader source: Energy.gov (indexed) [DOE]

4: IBM WebSphere Application Server for z/OS Arbitrary Command 4: IBM WebSphere Application Server for z/OS Arbitrary Command Execution Vulnerability V-054: IBM WebSphere Application Server for z/OS Arbitrary Command Execution Vulnerability December 25, 2012 - 12:08am Addthis PROBLEM: IBM WebSphere Application Server for z/OS Arbitrary Command Execution Vulnerability PLATFORM: IBM HTTP Server for z/OS Version 5.3 ABSTRACT: A vulnerability was reported in the IBM HTTP Server component 5.3 in IBM WebSphere Application Server (WAS) for z/OS REFERENCE LINKS: Security vulnerability Reference #:1620945 Xforce: 80684 Secunia Advisory SA51656 CVE-2012-5955 IMPACT ASSESSMENT: High DISCUSSION: A vulnerability has been reported in IBM WebSphere Application Server for z/OS, which can be exploited by malicious people to compromise a vulnerable

194

U-201: HP System Management Homepage Bugs Let Remote Users Deny Service  

Broader source: Energy.gov [DOE]

The vulnerabilities could be exploited remotely resulting in unauthorized access, disclosure of information, data modification, Denial of Service (DoS), and execution of arbitrary code.

195

T-541: Citrix Provisioning Services Unspecified Flaw Let's Remote...  

Broader source: Energy.gov (indexed) [DOE]

Citrix Provisioning Services Unspecified Flaw Let's Remote Users Execute Arbitrary Code T-541: Citrix Provisioning Services Unspecified Flaw Let's Remote Users Execute Arbitrary...

196

V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote...  

Broader source: Energy.gov (indexed) [DOE]

6: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code June...

197

Executive MBA* Executive MBA at a Glance  

E-Print Network [OSTI]

Manufacturing Natural Resources Not-for-Profit Public Service Real Estate Development Technology Transportation, strategic analysis, and change management * Additional Options The Americas MBA for Executives Executive MBA

198

EXECUTIVE SUMMARY  

National Nuclear Security Administration (NNSA)

FUSION ENERGY SCIENCE ADVISORY COMMITTEE FUSION ENERGY SCIENCE ADVISORY COMMITTEE Panel on High Energy Density Laboratory Plasmas ADVANCING THE SCIENCE OF HIGH ENERGY DENSITY LABORATORY PLASMAS January 2009 UNITED STATES DEPARTMENT OF ENERGY 1 TABLE OF CONTENTS EXECUTIVE SUMMARY.......................................................................................... 5 1 HIGH ENERGY DENSITY LABORATORY PLASMA SCIENCE .................................... 15 2 THE CHARGE TO FESAC ...................................................................................... 19 3 THE PANEL PROCESS ............................................................................................ 20 4 STEWARDSHIP OF THE JOINT PROGRAM ............................................................... 23

199

Executive Summary  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Worker Safety and Health Program LBNL/PUB-3851, Rev. 2.2 (March 2012) Worker Safety and Health Program LBNL/PUB-3851, Rev. 2.2 (March 2012) Worker Safety and Health Program Lawrence Berkeley National Laboratory LBNL Worker Safety and Health Program LBNL/PUB-3851, Rev. 2.2 (March 2012) This page intentionally left blank. LBNL Worker Safety and Health Program LBNL/PUB-3851, Rev. 2.2 (March 2012) i Contents Executive Summary .............................................................................................. v 1. Introduction................................................................................................... 1 1.1 Work Activities .............................................................................................. 1

200

T-579: BlackBerry Device Software Bug in WebKit Lets Remote Users...  

Broader source: Energy.gov (indexed) [DOE]

79: BlackBerry Device Software Bug in WebKit Lets Remote Users Execute Code T-579: BlackBerry Device Software Bug in WebKit Lets Remote Users Execute Code March 15, 2011 - 5:05pm...

Note: This page contains sample records for the topic "users execute arbitrary" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

T-559: Stack-based buffer overflow in oninit in IBM Informix Dynamic Server (IDS) 11.50 allows remote execution  

Broader source: Energy.gov [DOE]

Stack-based buffer overflow in oninit in IBM Informix Dynamic Server (IDS) 11.50 allows remote execution attackers to execute arbitrary code via crafted arguments in the USELASTCOMMITTED session environment option in a SQL SET ENVIRONMENT statement

202

EXECUTIVE SUMMARY  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

EXECUTIVE SUMMARY This document contains an assessment of the first project to be completed under the U.S. Department of Energy Clean Coal Technology Program. The project was selected under Round I and is known officially as "The Demonstration of an Advanced Cyclone Coal Combustor, with Internal Sulfur, Nitrogen, and Ash Control for the Conversion of a 23 MMBtu/hour Oil-Fired Boiler to Pulverized Coal." The project was carried out by the Coal Tech Corporation over the period March 1987 February 1991 at the site of the Keeler/Dorr-Oliver Boiler Company in Williamsport, Pennsylvania. The project was a three-year demonstration scale test of a 30 MMBtu/hr air-cooled ceramic slagging cyclone combustor retrofitted to a horizontal 23-MMBtu/hr oil or natural gas-fired Keeler/Dorr-Oliver DS-9

203

E-Print Network 3.0 - arbitrary meshes nouvelles Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

3D scalar volume or a triangulated surface mesh with very low quality. Figure 1 shows the pipeline... a user-defined arbitrary triangular mesh that has very low quality or is too...

204

U-178: VMware vMA Library Loading Error Lets Local Users Gain Elevated  

Broader source: Energy.gov (indexed) [DOE]

8: VMware vMA Library Loading Error Lets Local Users Gain 8: VMware vMA Library Loading Error Lets Local Users Gain Elevated Privileges U-178: VMware vMA Library Loading Error Lets Local Users Gain Elevated Privileges May 29, 2012 - 7:00am Addthis PROBLEM: A vulnerability was reported in VMware vMA PLATFORM: Version(s): vMA 4.0, 4.1, 5 patch 1 (5.0.0.1) ABSTRACT: A local user can obtain elevated privileges on the target system. Reference Links: SecurityTracker Alert ID: 1027099 CVE-2012-2752 Vendor Advisory IMPACT ASSESSMENT: High Discussion: A local user can exploit a library loading error to cause arbitrary code to be executed on the target system with elevated privileges. Impact: Privilege escalation Solution: The vendor has issued a fix (vSphere Management Assistant 5.0 Patch 2 (5.0.0.2)). Addthis Related Articles T-591: VMware vmrun Utility Lets Local Users Gain Elevated Privileges

205

T-570: HP Security Bulletin - HP-UX Running OpenSSL, Remote Execution of  

Broader source: Energy.gov (indexed) [DOE]

70: HP Security Bulletin - HP-UX Running OpenSSL, Remote 70: HP Security Bulletin - HP-UX Running OpenSSL, Remote Execution of Arbitrary Code, Denial of Service (DoS), Authentication Bypass T-570: HP Security Bulletin - HP-UX Running OpenSSL, Remote Execution of Arbitrary Code, Denial of Service (DoS), Authentication Bypass March 4, 2011 - 3:05pm Addthis PROBLEM: Potential Security Impact: Remote execution of arbitrary code, Denial of Service (DoS), authentication bypass. PLATFORM: HP-UX B.11.11, B.11.23, B.11.31 running OpenSSL before vA.00.09.08q. ABSTRACT: A potential security vulnerability has been identified with HP-UX OpenSSL. This vulnerability could be exploited remotely to execute arbitrary code or create a Denial of Service (DoS) or an authentication bypass. reference LINKS: Net-Security Advisory: HPSBUX02638

206

T-570: HP Security Bulletin - HP-UX Running OpenSSL, Remote Execution of  

Broader source: Energy.gov (indexed) [DOE]

0: HP Security Bulletin - HP-UX Running OpenSSL, Remote 0: HP Security Bulletin - HP-UX Running OpenSSL, Remote Execution of Arbitrary Code, Denial of Service (DoS), Authentication Bypass T-570: HP Security Bulletin - HP-UX Running OpenSSL, Remote Execution of Arbitrary Code, Denial of Service (DoS), Authentication Bypass March 4, 2011 - 3:05pm Addthis PROBLEM: Potential Security Impact: Remote execution of arbitrary code, Denial of Service (DoS), authentication bypass. PLATFORM: HP-UX B.11.11, B.11.23, B.11.31 running OpenSSL before vA.00.09.08q. ABSTRACT: A potential security vulnerability has been identified with HP-UX OpenSSL. This vulnerability could be exploited remotely to execute arbitrary code or create a Denial of Service (DoS) or an authentication bypass. reference LINKS: Net-Security Advisory: HPSBUX02638

207

Implementing Executive Order 13423  

Broader source: Energy.gov [DOE]

Guide describes the instructions on the requirements and how fleets should implement the Executive Order 13423.

208

Prospective Users  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Prospective Users Prospective Users Prospective Users Print The Advanced Light Source (ALS) welcomes researchers from universities, government labs, and industry who are interested in performing experiments at the general sciences and structural biology beamlines open to users. An overview of user opportunities, and the procedures to become a user, are outlined below: What is an ALS User? Research Facilities Available to Users Costs to Users Users from Industry User Policy How to Become an ALS User What is an ALS User? The ALS is a third generation synchrotron light source, providing over 35 beamlines, where samples may be illuminated with x-ray, ultraviolet or infrared light to explore the structure and electronic properties of materials. The ALS operates as a national user facility, and is open to researchers worldwide to submit proposals for research.

209

MRDAP User/Developer Documentation  

SciTech Connect (OSTI)

The Multi-Reactor Design and Analysis Platform (MRDAP) is designed to simplify the creation, transfer and processing of data between computational codes. MRDAP accomplishes these objectives with three parts: 1. allows each integrated code, through a plugin, to specify the required input for execution and the required output needed, 2. creates an interface for execution and data transfer, 3. enables the creation of Graphical User Interfaces (GUI) to assist with input preparation and data visualization. Ultimately, the main motivation of this work is to enable analysts (who perform reactor physics calculations routinely), by providing a tool that increases efficiency and minimizes the potential for errors or failed executions.

Joshua Cogliati; Michael Milvich

2009-09-01T23:59:59.000Z

210

Prospective Users  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Prospective Users Print Prospective Users Print The Advanced Light Source (ALS) welcomes researchers from universities, government labs, and industry who are interested in performing experiments at the general sciences and structural biology beamlines open to users. An overview of user opportunities, and the procedures to become a user, are outlined below: What is an ALS User? Research Facilities Available to Users Costs to Users Users from Industry User Policy How to Become an ALS User What is an ALS User? The ALS is a third generation synchrotron light source, providing over 35 beamlines, where samples may be illuminated with x-ray, ultraviolet or infrared light to explore the structure and electronic properties of materials. The ALS operates as a national user facility, and is open to researchers worldwide to submit proposals for research.

211

User Services  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Contacts for Users Contacts for Users User Services Print The User Services Group is available to aid ALS users before they arrive, while they are here, and after they leave. User Office Experiment Coordination Section Sue Bailey This e-mail address is being protected from spambots. You need JavaScript enabled to view it User Services Group Leader Prospective users Proprietary users Tel: 510-486-7727 ALS User Office The User Office is located on the mezzanine of Building 6 (the ALS), Room 2212. Contact Email: This e-mail address is being protected from spambots. You need JavaScript enabled to view it Tel: 510-486-7745 Fax: 510-486-4773 Address: Advanced Light Source, Berkeley Lab, MS 6-2100, Berkeley, CA 94720 Hours User Office: Monday-Friday 8.00 a.m. - 12.00 p.m. and 1.00 p.m. - 5.00 p.m.

212

Certifying Program Execution with Secure Processors Benjie Chen Robert Morris  

E-Print Network [OSTI]

for Computer Science {benjie,rtm}@lcs.mit.edu Abstract Cerium is a trusted computing architecture that protects computing architecture, Cerium, that uses a se- cure processor to protect a program's execution, so. Instead, Cerium tells a user what pro- gram executed and what hardware and software envir- onment

213

User Agreements | Stanford Synchrotron Radiation Lightsource  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Agreements Agreements Institutional Agreements Required to Access DOE National User Facilities In recognition of the nation's expanding need to engage businesses and universities in the areas of commercial and basic science research, the Department of Energy (DOE) has developed two special types of agreements for use at all DOE National Laboratories with approved designated user facilities, see http://www.gc.doe.gov/1002.htm. Non-Proprietary User Agreement (PDF) (General User Agreement; no cost for general users) Proprietary User Agreement (PDF) (For Confidential or Proprietary Research; also requires advance payment) A User Agreement is required for all users and must be executed by the appropriate institutional officer(s) at the user's institution. A single User Agreement covers all experimenters from that institution (User

214

User Services  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Home Contact Home Contact User Services Print The User Services Group is available to aid ALS users before they arrive, while they are here, and after they leave. User Office Experiment Coordination Section Sue Bailey This e-mail address is being protected from spambots. You need JavaScript enabled to view it User Services Group Leader Prospective users Proprietary users Tel: 510-486-7727 ALS User Office The User Office is located on the mezzanine of Building 6 (the ALS), Room 2212. Contact Email: This e-mail address is being protected from spambots. You need JavaScript enabled to view it Tel: 510-486-7745 Fax: 510-486-4773 Address: Advanced Light Source, Berkeley Lab, MS 6-2100, Berkeley, CA 94720 Hours User Office: Monday-Friday 8.00 a.m. - 12.00 p.m. and 1.00 p.m. - 5.00 p.m.

215

U-048: HP LaserJet Printers Unspecified Flaw Lets Remote Users Update  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

8: HP LaserJet Printers Unspecified Flaw Lets Remote Users 8: HP LaserJet Printers Unspecified Flaw Lets Remote Users Update Firmware with Arbitrary Code U-048: HP LaserJet Printers Unspecified Flaw Lets Remote Users Update Firmware with Arbitrary Code November 30, 2011 - 8:15am Addthis PROBLEM: HP LaserJet Printers Unspecified Flaw Lets Remote Users Update Firmware with Arbitrary Code . PLATFORM: HP LaserJet Printers manufactured prior to 2009 ABSTRACT A remote user can upgrade the printer's firmware with arbitrary code. reference LINKS: SecurityTracker Alert ID:1026357 HP Security for Imaging and Printing HP Clarifies on Printer Security IMPACT ASSESSMENT: Low Discussion: A vulnerability was reported in some HP LaserJet Printers. A remote user can update the firmware with arbitrary code. A remote user can send a specially crafted print job or specially crafted data to the

216

U-199: Drupal Drag & Drop Gallery Module Arbitrary File Upload  

Broader source: Energy.gov (indexed) [DOE]

9: Drupal Drag & Drop Gallery Module Arbitrary File Upload 9: Drupal Drag & Drop Gallery Module Arbitrary File Upload Vulnerability U-199: Drupal Drag & Drop Gallery Module Arbitrary File Upload Vulnerability June 26, 2012 - 7:00am Addthis PROBLEM: A vulnerability has been reported in the Drag & Drop Gallery module for Drupal, which can be exploited by malicious people to compromise a vulnerable system. PLATFORM: Drupal Drag & Drop Gallery Module 6.x ABSTRACT: The vulnerability is caused due to the sites/all/modules/dragdrop_gallery/upload.php script improperly validating uploaded files, which can be exploited to execute arbitrary PHP code by uploading a PHP file with e.g. an appended ".gif" file extension. Reference Links: Original Advisory Secunia ID 49698 No Current CVE Reference IMPACT ASSESSMENT:

217

Arbitrary cutting of deformable tetrahedralized objects  

Science Journals Connector (OSTI)

We propose a flexible geometric algorithm for placing arbitrary cracks and incisions on tetrahedralized deformable objects. Although techniques based on remeshing can also accommodate arbitrary fracture patterns, this flexibility comes at the risk of ...

Eftychios Sifakis; Kevin G. Der; Ronald Fedkiw

2007-08-01T23:59:59.000Z

218

U-052: HP Protect Tools Device Access Manager Unspecified Bug...  

Broader source: Energy.gov (indexed) [DOE]

Flaw Lets Remote Users Update Firmware with Arbitrary Code U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code U-049:...

219

User Services  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

User Services Print User Services Print The User Services Group is available to aid ALS users before they arrive, while they are here, and after they leave. User Office Experiment Coordination Section Sue Bailey This e-mail address is being protected from spambots. You need JavaScript enabled to view it User Services Group Leader Prospective users Proprietary users Tel: 510-486-7727 ALS User Office The User Office is located on the mezzanine of Building 6 (the ALS), Room 2212. Contact Email: This e-mail address is being protected from spambots. You need JavaScript enabled to view it Tel: 510-486-7745 Fax: 510-486-4773 Address: Advanced Light Source, Berkeley Lab, MS 6-2100, Berkeley, CA 94720 Hours User Office: Monday-Friday 8.00 a.m. - 12.00 p.m. and 1.00 p.m. - 5.00 p.m. New user registration: Monday-Friday 8.00 a.m. - 12.00 p.m. and

220

User Services  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

User Services Print User Services Print The User Services Group is available to aid ALS users before they arrive, while they are here, and after they leave. User Office Experiment Coordination Section Sue Bailey This e-mail address is being protected from spambots. You need JavaScript enabled to view it User Services Group Leader Prospective users Proprietary users Tel: 510-486-7727 ALS User Office The User Office is located on the mezzanine of Building 6 (the ALS), Room 2212. Contact Email: This e-mail address is being protected from spambots. You need JavaScript enabled to view it Tel: 510-486-7745 Fax: 510-486-4773 Address: Advanced Light Source, Berkeley Lab, MS 6-2100, Berkeley, CA 94720 Hours User Office: Monday-Friday 8.00 a.m. - 12.00 p.m. and 1.00 p.m. - 5.00 p.m. New user registration: Monday-Friday 8.00 a.m. - 12.00 p.m. and

Note: This page contains sample records for the topic "users execute arbitrary" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

User Services  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

User Services Print User Services Print The User Services Group is available to aid ALS users before they arrive, while they are here, and after they leave. User Office Experiment Coordination Section Sue Bailey This e-mail address is being protected from spambots. You need JavaScript enabled to view it User Services Group Leader Prospective users Proprietary users Tel: 510-486-7727 ALS User Office The User Office is located on the mezzanine of Building 6 (the ALS), Room 2212. Contact Email: This e-mail address is being protected from spambots. You need JavaScript enabled to view it Tel: 510-486-7745 Fax: 510-486-4773 Address: Advanced Light Source, Berkeley Lab, MS 6-2100, Berkeley, CA 94720 Hours User Office: Monday-Friday 8.00 a.m. - 12.00 p.m. and 1.00 p.m. - 5.00 p.m. New user registration: Monday-Friday 8.00 a.m. - 12.00 p.m. and

222

User Services  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

User Services Print User Services Print The User Services Group is available to aid ALS users before they arrive, while they are here, and after they leave. User Office Experiment Coordination Section Sue Bailey This e-mail address is being protected from spambots. You need JavaScript enabled to view it User Services Group Leader Prospective users Proprietary users Tel: 510-486-7727 ALS User Office The User Office is located on the mezzanine of Building 6 (the ALS), Room 2212. Contact Email: This e-mail address is being protected from spambots. You need JavaScript enabled to view it Tel: 510-486-7745 Fax: 510-486-4773 Address: Advanced Light Source, Berkeley Lab, MS 6-2100, Berkeley, CA 94720 Hours User Office: Monday-Friday 8.00 a.m. - 12.00 p.m. and 1.00 p.m. - 5.00 p.m. New user registration: Monday-Friday 8.00 a.m. - 12.00 p.m. and

223

GSS, a user interface specification framework  

E-Print Network [OSTI]

of objects whose behavior is reasonably uniform. The ontology intro- duces two new constructs, the configuration set and the template. It also formalizes to some extent the output behavior of graphical user interfaces. An implementation architecture... is presented which elaborates this ontology into an object oriented development environment containing a substrate, a number of user interface building blocks and a user interface executive. The architecture describes in detail mechanisms for integrat- ing...

Morris, John Graham

2012-06-07T23:59:59.000Z

224

V-075: EMC AlphaStor Command Injection and Format String Flaws...  

Broader source: Energy.gov (indexed) [DOE]

Flaw Lets Remote Users Execute Arbitrary Commands V-181: Oracle Java SE Critical Patch Update Advisory - June 2013 V-067: Oracle Java Flaw Lets Remote Users Execute...

225

CEES Executive Committee  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Executive Committee photo of Michael Thackeray Name Michael Thackeray (Chair) Institution Argonne National Laboratory Department Chemical Sciences and Engineering Division Area of...

226

User Guide  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Guide Guide User Guide Print 1. Apply for Beam Time Submit a new proposal or a Beam Time Request (BTR) using an existing active proposal. 2. Establish a User Agreement Your institute must have a signed agreement with Berkeley Lab before you may do work at the ALS. 3. Complete Experiment Safety Documentation and Review Safety for Users Safety documentation must be completed and reviewed before your beam time. Experiments involving any biological material or radioactive material require more review steps so please allow several weeks for these. 4. Register with the User Office New and returning users need to register with the User Office TWO weeks before arriving at the ALS. Users arriving out of regular office hours must either have a valid Berkeley Lab ID badge, or have completed registration to be granted access to the ALS.

227

User Obligations  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

User Obligations User Obligations Summary of what APS expects of users in return for access to the facility. Registration Register with the APS as far in advance of your initial visit as possible (even when you are simply planning an experiment). User Agreement Ensure that a User Agreement is in place between the APS and your home institution. Training Ensure that you complete all required training before conducting hands-on work at the APS. Safety Assessement Complete Experiment Safety Assessment Forms. End of Experiment Form Complete End of Experiment form to provide feedback (required for General Users, optional for others). Published Reports of Work Carried Out at the APS As an APS user, you are required to notify both the APS and your host beamline staff of all work published in the open literature (including

228

NERSC Users Group  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

NUGEX NUGEX NUG Executive Committee (NUGEX) NUGEX is the voice of the user community to NERSC and DOE. While all NUG events are open to all NERSC users, NUGEX members regularly participate in the monthly teleconfernces and the annual face-to-face meeting. NUGEX is consulted on many NERSC policy issues, e.g., batch configurations, disk quotas, services and training offerings. Members of NUGEX also participate in their office's NERSC Requirements Reviews of High Performance Computing and Storage. There are three representatives from each office and three members-at-large. Name Institution Email Address DOE Office Term Expires PI's Project Title Mark Adams Columbia University mark.adams@columbia.edu ASCR Dec 2015 Composable Hierarchically Nested Solvers Anubhav Jain Berkeley Lab

229

2013 ALS User Meeting Highlights  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

2013 ALS User Meeting Highlights 2013 ALS User Meeting Highlights 2013 ALS User Meeting Highlights Print This year's ALS User Meeting launched with a welcome from Users' Executive Committee Chair Corie Ralston and LBNL Director Paul Alivisatos. ALS Director Roger Falcone followed with a "state of the ALS" presentation that began with a reminder of the ALS mission, which he noted remains true even in the midst of a government shutdown: "Supporting users in doing outstanding science in a safe environment." Falcone gave the 414 meeting attendees an update on the ALS beamlines, which included good news about increased user numbers thanks to the new RAPIDD access system, enhanced robotics, and remote capabilities. Falcone reflected that ALS metrics continue to represent our highly productive users-the number of journal articles and papers per user that come from ALS research have continued to grow in the past year. Looking forward, Falcone touched on how a proposed ALS upgrade to a diffraction-limited light source would increase scientific capabilities.

230

2013 ALS User Meeting Highlights  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

2013 ALS User Meeting Highlights 2013 ALS User Meeting Highlights 2013 ALS User Meeting Highlights Print Thursday, 24 October 2013 09:06 This year's ALS User Meeting launched with a welcome from Users' Executive Committee Chair Corie Ralston and LBNL Director Paul Alivisatos. ALS Director Roger Falcone followed with a "state of the ALS" presentation that began with a reminder of the ALS mission, which he noted remains true even in the midst of a government shutdown: "Supporting users in doing outstanding science in a safe environment." Falcone gave the 414 meeting attendees an update on the ALS beamlines, which included good news about increased user numbers thanks to the new RAPIDD access system, enhanced robotics, and remote capabilities. Falcone reflected that ALS metrics continue to represent our highly productive users-the number of journal articles and papers per user that come from ALS research have continued to grow in the past year. Looking forward, Falcone touched on how a proposed ALS upgrade to a diffraction-limited light source would increase scientific capabilities.

231

User Services  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Services Print Services Print The User Services Group is available to aid ALS users before they arrive, while they are here, and after they leave. User Office Experiment Coordination Section Sue Bailey This e-mail address is being protected from spambots. You need JavaScript enabled to view it User Services Group Leader Prospective users Proprietary users Tel: 510-486-7727 ALS User Office The User Office is located on the mezzanine of Building 6 (the ALS), Room 2212. Contact Email: This e-mail address is being protected from spambots. You need JavaScript enabled to view it Tel: 510-486-7745 Fax: 510-486-4773 Address: Advanced Light Source, Berkeley Lab, MS 6-2100, Berkeley, CA 94720 Hours User Office: Monday-Friday 8.00 a.m. - 12.00 p.m. and 1.00 p.m. - 5.00 p.m. New user registration: Monday-Friday 8.00 a.m. - 12.00 p.m. and

232

User Services  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Services Print Services Print The User Services Group is available to aid ALS users before they arrive, while they are here, and after they leave. User Office Experiment Coordination Section Sue Bailey This e-mail address is being protected from spambots. You need JavaScript enabled to view it User Services Group Leader Prospective users Proprietary users Tel: 510-486-7727 ALS User Office The User Office is located on the mezzanine of Building 6 (the ALS), Room 2212. Contact Email: This e-mail address is being protected from spambots. You need JavaScript enabled to view it Tel: 510-486-7745 Fax: 510-486-4773 Address: Advanced Light Source, Berkeley Lab, MS 6-2100, Berkeley, CA 94720 Hours User Office: Monday-Friday 8.00 a.m. - 12.00 p.m. and 1.00 p.m. - 5.00 p.m. New user registration: Monday-Friday 8.00 a.m. - 12.00 p.m. and

233

Industrial Users  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Industrial Users - Media Publications and Information The Invisible Neutron Threat Neutron-Induced Failures in Semiconductor Devices Nuclear Science Research at the LANSCE-WNR...

234

Industrial Users  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

on altitude. This large flux allows testing of semiconductor devices at greatly accelerated rates. Industry users are invited to contact Steve Wender, phone:505-667-1344 or...

235

Multiuser Mercury/waterfilling for Downlink OFDM with Arbitrary Signal Constellations  

E-Print Network [OSTI]

Multiuser Mercury/waterfilling for Downlink OFDM with Arbitrary Signal Constellations Angel Lozano tracked by the base station, adopts the form of a multiuser mercury/waterfilling procedure that generalizes the single-user mercury/waterfilling introduced in [1]. I. INTRODUCTION There is, of late, great

Lozano, Angel

236

User Policy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

User Policy Print User Policy Print 1. Guiding Principles The aim of User Policy at the Advanced Light Source (ALS) is to provide a framework for establishing a challenging yet congenial environment where talented scientists from different backgrounds can work together in pursuit of the new scientific opportunities presented by the availability of this innovative facility. User policy must address a variety of user needs and sensitivities. On one hand, the qualified researcher with little financial backing needs assurance of adequate access to the facility. On the other hand, qualified groups that make a large commitment of time and resources need some assurance of an equitable return on their investment. A national facility should be accessible to all qualified researchers and at the ALS there are three modes of access: as a General User, a member of an Approved Program (AP), or as a member of a Participating Research Team (PRT). All proposals for research to be conducted at the ALS are evaluated based on the criteria endorsed by the International Union of Pure and Applied Physics (IUPAP). These criteria are detailed on the IUPAP Web site at IUPAP Recommendations for the Use of Major Physics Users Facilities (pdf version).

237

INSTRUCTIONS FOR IMPLEMENTING EXECUTIVE  

Broader source: Energy.gov (indexed) [DOE]

March 29, 2007 INSTRUCTIONS FOR IMPLEMENTING EXECUTIVE ORDER 13423 "Strengthening Federal Environmental, Energy, and Transportation Management" i Contents I. Introduction ......................................................................................................................1 A. Purpose..................................................................................................................1 B. Authority ...............................................................................................................1 C. Organization and Oversight ..................................................................................1 D. Overarching Policy and Directives .......................................................................4

238

NIF Users  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

have never been created in a laboratory environment and exist naturally only during thermonuclear burn, in supernovae and in the fusion reactions that power our stars. The NIF User...

239

User Community  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Community Community Given the pressures of conducting experiments, it's sometimes hard to find time to connect with new potential colleagues, even though they may be working at the next beamline. There are many opportunities for making informal connections with other users and with APS staff; this page lists only a few of the many communication channels at the APS. Reaching Other Users Coffee Cart A source of morning sustenance and a chance to see who's been working in the hutch next to yours all night. An APS manager makes the rounds with the Coffee Cart each morning. Scientific Interest Groups Self-organizing groups of users and beamline staff interested in advancing synchrotron research in a particular area. User Science Seminars, General Seminars and Conferences

240

STEP Participant Survey Executive Summary  

Broader source: Energy.gov [DOE]

STEP Participant Survey Executive Summary, from the Tool Kit Framework: Small Town University Energy Program (STEP).

Note: This page contains sample records for the topic "users execute arbitrary" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

User Policy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Policy Policy User Policy Print 1. Guiding Principles The aim of User Policy at the Advanced Light Source (ALS) is to provide a framework for establishing a challenging yet congenial environment where talented scientists from different backgrounds can work together in pursuit of the new scientific opportunities presented by the availability of this innovative facility. User policy must address a variety of user needs and sensitivities. On one hand, the qualified researcher with little financial backing needs assurance of adequate access to the facility. On the other hand, qualified groups that make a large commitment of time and resources need some assurance of an equitable return on their investment. A national facility should be accessible to all qualified researchers and at the ALS there are three modes of access: as a General User, a member of an Approved Program (AP), or as a member of a Participating Research Team (PRT). All proposals for research to be conducted at the ALS are evaluated based on the criteria endorsed by the International Union of Pure and Applied Physics (IUPAP). These criteria are detailed on the IUPAP Web site at IUPAP Recommendations for the Use of Major Physics Users Facilities (pdf version).

242

User Policy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Policy Print Policy Print 1. Guiding Principles The aim of User Policy at the Advanced Light Source (ALS) is to provide a framework for establishing a challenging yet congenial environment where talented scientists from different backgrounds can work together in pursuit of the new scientific opportunities presented by the availability of this innovative facility. User policy must address a variety of user needs and sensitivities. On one hand, the qualified researcher with little financial backing needs assurance of adequate access to the facility. On the other hand, qualified groups that make a large commitment of time and resources need some assurance of an equitable return on their investment. A national facility should be accessible to all qualified researchers and at the ALS there are three modes of access: as a General User, a member of an Approved Program (AP), or as a member of a Participating Research Team (PRT). All proposals for research to be conducted at the ALS are evaluated based on the criteria endorsed by the International Union of Pure and Applied Physics (IUPAP). These criteria are detailed on the IUPAP Web site at IUPAP Recommendations for the Use of Major Physics Users Facilities (pdf version).

243

User Policy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Policy Print Policy Print 1. Guiding Principles The aim of User Policy at the Advanced Light Source (ALS) is to provide a framework for establishing a challenging yet congenial environment where talented scientists from different backgrounds can work together in pursuit of the new scientific opportunities presented by the availability of this innovative facility. User policy must address a variety of user needs and sensitivities. On one hand, the qualified researcher with little financial backing needs assurance of adequate access to the facility. On the other hand, qualified groups that make a large commitment of time and resources need some assurance of an equitable return on their investment. A national facility should be accessible to all qualified researchers and at the ALS there are three modes of access: as a General User, a member of an Approved Program (AP), or as a member of a Participating Research Team (PRT). All proposals for research to be conducted at the ALS are evaluated based on the criteria endorsed by the International Union of Pure and Applied Physics (IUPAP). These criteria are detailed on the IUPAP Web site at IUPAP Recommendations for the Use of Major Physics Users Facilities (pdf version).

244

User Manual  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Manual Manual Services Overview ECS Audio/Video Conferencing Fasterdata IPv6 Network Network Performance Tools (perfSONAR) ESnet OID Registry PGP Key Service Virtual Circuits (OSCARS) OSCARS Case Study Documentation User Manual Web Browser Interface (WBUI) Web Service Interface (API) FAQ Design Specifications Functional Specifications Notifications Publications Authorization Policy Default Attributes Message Security Clients For Developers Interfaces Links Hardware Requirements DOE Grids Service Transition Contact Us Technical Assistance: 1 800-33-ESnet (Inside the US) 1 800-333-7638 (Inside the US) 1 510-486-7600 (Globally) 1 510-486-7607 (Globally) Report Network Problems: trouble@es.net Provide Web Site Feedback: info@es.net User Manual Introduction The OSCARS Interdomain Controller (IDC) allows end users to reserve high

245

Project Execution Plan RM  

Broader source: Energy.gov (indexed) [DOE]

Project Execution Plan (PEP) Review Module Project Execution Plan (PEP) Review Module March 2010 CD-0 O 0 OFFICE OF P C CD-1 F ENVIRO Standard R Project E Rev Critical Decis CD-2 M ONMENTAL Review Plan Execution view Module sion (CD) Ap CD March 2010 L MANAGE n (SRP) n Plan e pplicability D-3 EMENT CD-4 Post Ope eration Standard Review Plan, 2 nd Edition, March 2010 i FOREWORD The Standard Review Plan (SRP) 1 provides a consistent, predictable corporate review framework to ensure that issues and risks that could challenge the success of Office of Environmental Management (EM) projects are identified early and addressed proactively. The internal EM project review process encompasses key milestones established by DOE O 413.3A, Change 1, Program and Project Management for the Acquisition of Capital Assets, DOE-STD-1189-2008,

246

Integrating Program Component Executables  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Integrating Integrating Program Component Executables on Distributed Memory Architectures via MPH Chris Ding and Yun He Computational Research Division, Lawrence Berkeley National Laboratory University of California, Berkeley, CA 94720, USA chqding@lbl.gov, yhe@lbl.gov Abstract A growing trend in developing large and complex ap- plications on today's Teraflop computers is to integrate stand-alone and/or semi-independent program components into a comprehensive simulation package. One example is the climate system model which consists of atmosphere, ocean, land-surface and sea-ice. Each component is semi- independent and has been developed at different institu- tions. We study how this multi-component multi-executable application can run effectively on distributed memory archi- tectures. We identify five effective execution modes and de- velop the MPH library to support

247

Scheduling algorithms for arbitrary communication networks  

E-Print Network [OSTI]

We consider the problem of designing scheduling schemes for networks with arbitrary topology and scheduling constraints. We address the optimality of scheduling schemes for packet networks in terms of throughput, delay and ...

Jagabathula, Srikanth

2008-01-01T23:59:59.000Z

248

Making Global Illumination User Friendly  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Making Global Illumination User Friendly Making Global Illumination User Friendly Title Making Global Illumination User Friendly Publication Type Conference Paper LBNL Report Number LBL-37860 Year of Publication 1995 Authors Ward, Gregory J. Conference Name 6th Eurographics Workshop on Rendering Date Published 06/1995 Conference Location Dublin, Ireland Call Number LBL-37860 Abstract Global illumination researchers tend to think in terms of mesh density and sampling frequency, and their software reflects this in its user interface. Advanced rendering systems are rife with long command lines and parameters for tuning the sample densities, thresholds and other algorithm-specific variables, and the novice user is quickly lost in a sea of possibilities. This paper details a successful effort of making one such global illumination system usable by people who understand their problems, even if they do not understand the methods needed to solve them, through an assisted oracle approach. A single program is introduced to map a small set of intuitive control variables to the rendering commands and parameter settings needed to produce the desired output in a reasonable time. This new executive program then serves as the basis for a graphical user interface that is both friendly in its appearance and reliable in its performance. Finally, we conclude with some future directions for improving this interface.

249

Worldline Green Functions for Arbitrary Feynman Diagrams  

E-Print Network [OSTI]

We propose a general method to obtain the scalar worldline Green function on an arbitrary 1D topological space, with which the first-quantized method of evaluating 1-loop Feynman diagrams can be generalized to calculate arbitrary ones. The electric analog of the worldline Green function problem is found and a compact expression for the worldline Green function is given, which has similar structure to the 2D bosonic Green function of the closed bosonic string.

Peng Dai; Warren Siegel

2006-08-09T23:59:59.000Z

250

V-149: Microsoft Internet Explorer Object Access Bug Lets Remote...  

Broader source: Energy.gov (indexed) [DOE]

CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code...

251

U-154: IBM Rational ClearQuest ActiveX Control Buffer Overflow...  

Broader source: Energy.gov (indexed) [DOE]

Architect ActiveBar ActiveX Control Lets Remote Users Execute Arbitrary Code V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code U-126: Cisco Adaptive...

252

U-120: RSA SecurID Software Token Converter Unspecified Buffer...  

Broader source: Energy.gov (indexed) [DOE]

Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code V-066: Adobe Acrobat...

253

JC3 Bulletin Archive | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

6, 2012 6, 2012 U-076: OpenSSL Bugs Let Remote Users Deny Service, Obtain Information, and Potentially Execute Arbitrary Code A remote user may be able to execute arbitrary code on the target system. January 5, 2012 U-075: Apache Struts Bug Lets Remote Users Overwrite Files and Execute Arbitrary Code A remote user can execute arbitrary Java code on the target system. January 4, 2012 U-074: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users A remote user can execute arbitrary commands on the target system. A remote user can access a target user's account. A remote user can redirect users to arbitrary sites. January 3, 2012 U-073: Bugzilla Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks Several vulnerabilities were reported in Bugzilla. A remote user can

254

John Hervey Executive Director  

E-Print Network [OSTI]

John Hervey Executive Director #12;Historical Perspective · NACS Technology Standards Project · Project Components ­ Four areas of concentration · Payment Systems ­ terminal-to-host · Device Integration. Impact 21 Group, LLC Incomm Intermec Technologies Corp Kenan Advantage Group, Inc. Lance, Inc. Liberty

Brock, David

255

Sustainability Initiative Executive Summary  

E-Print Network [OSTI]

UW­Madison Sustainability Initiative Executive Summary October 2010 #12;2 We are pleased to present the final report of the campus Sustainability Task Force. This report fulfills the charge we gave to sustainability for consideration by UW­Madison's leadership and campus community. There are many reasons why

Sheridan, Jennifer

256

Executive Branch Management Scorecard | Department of Energy  

Office of Environmental Management (EM)

Executive Branch Management Scorecard Executive Branch Management Scorecard More Documents & Publications Executive Branch Management Scorecard Slide 1 Three Year Rolling Timeline...

257

Execution Monitoring in MT Icon  

Science Journals Connector (OSTI)

MT Icon allows the execution of multiple Icon programs in almost any configuration, including execution ... monitoring. As motivated in Chapter 4, MT Icon characterizes monitoring as a special case of ... languag...

Clinton L. Jeffery

1999-01-01T23:59:59.000Z

258

T-650: Microsoft Word Unspecified Flaw Lets Remote Users Execute...  

Broader source: Energy.gov (indexed) [DOE]

vulnerability has been reported in Microsoft Office Word. The vulnerability is due to memory corruption when parsing a specially crafted Word file. Impact: An attacker can exploit...

259

U-277: Google Chrome Multiple Flaws Let Remote Users Execute...  

Broader source: Energy.gov (indexed) [DOE]

A crash may occur in Skia text rendering CVE-2012-2900. A race condition may occur in audio device handling CVE-2012-5108. An out-of-bounds read may occur in ICU regex...

260

Business Model Guide Executive Summary  

Broader source: Energy.gov [DOE]

The Business Model Guide Executive Summary by the U.S. Department of Energy's Better Buildings Neighborhood Program.

Note: This page contains sample records for the topic "users execute arbitrary" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

User Environment  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

User Environment Environment on Genepool When you log into the Genepool system you will land in your $HOME directory on NERSC's "global homes" file system. The global homes file system is mounted across all NERSC computation systems with the exception of PDSF. The $HOME directory has quota of 40GB and 1,000,000 inodes. To customize your environment, by setting environment variables or aliases, you will need to modify one of the "dot" files that NERSC has created for you. You may NOT modify the .bashrc or .cshrc files. These are set to read-only on NERSC systems and specify system specific customizations. Instead you should modify a file called .bashrc.ext or .cshrc.ext. Learn more about the global homes user environment. Important Environment Variables

262

User's Manual  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

User's User's Manual for Pelegant - Yusong Wang, Michael Borland, Robert Soliday - APS Accelerator Systems Division, Advanced Photon Source 1 Introduction Pelegant stands for "parallel elegant," which is a parallelized version of elegant [1]. Written in the C programming language with MPICH, the Pelegant has been successfully ported to several clusters and supercomputers, such as the "weed" cluster (a heterogeneous system of 100 CPUs) at Advanced Photon Source (APS), and the Jazz cluster (350 Intel Xeon CPUs) at Argonne National Lab (ANL) and the BlueGene/L supercomputer (1024 dual PowerPC 440 nodes) at Argonne National Lab. Thanks to careful design in parallelization and good architecture of the serial elegant, the Pelegant achieves very good performance. For example, for a simulation of 10 5 particles in APS including symplectic element-by-element tracking,

263

JC3 Bulletin Archive | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

upgrade the printer's firmware with arbitrary code November 29, 2011 U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code Several...

264

Extreme Users WHY engage with extreme users  

E-Print Network [OSTI]

Extreme Users METHOD WHY engage with extreme users HOW to engage extreme users Designers engage inspiration from their work-arounds and frameworks. When you speak with and observe extreme users, their needs extreme users are often also needs of a wider population. Determine who's extreme Determining who

Prinz, Friedrich B.

265

Executive Order 13423: Strengthening Federal Environmental, Energy...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Executive Order 13423: Strengthening Federal Environmental, Energy, and Transportation Management Executive Order 13423: Strengthening Federal Environmental, Energy, and...

266

NIF User Group  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

users NIF User Group The National Ignition Facility User Group provides an organized framework and independent vehicle for interaction between the scientists who use NIF for...

267

"Dimension theory of arbitrary modules over 2  

E-Print Network [OSTI]

finite von Neumann algebras and L -Betti numbers I: Foundations to define L2-Betti n* *umbers for arbitrary topological spaces with an action of a discrete group* *n amenable group that the p-th L2-Betti number depends only on the C -module given * *by

Lück, Wolfgang

268

Architecture-Dependent Execution Time of Shor's Algorithm  

E-Print Network [OSTI]

We show how the execution time of algorithms on quantum computers depends on the architecture of the quantum computer, the choice of algorithms (including subroutines such as arithmetic), and the ``clock speed'' of the quantum computer. The primary architectural features of interest are the ability to execute multiple gates concurrently, the number of application-level qubits available, and the interconnection network of qubits. We analyze Shor's algorithm for factoring large numbers in this context. Our results show that, if arbitrary interconnection of qubits is possible, a machine with an application-level clock speed of as low as one-third of a (possibly encoded) gate per second could factor a 576-bit number in under one month, potentially outperforming a large network of classical computers. For nearest-neighbor-only architectures, a clock speed of around twenty-seven gates per second is required.

Rodney Van Meter; Kohei M. Itoh; Thaddeus D. Ladd

2006-05-25T23:59:59.000Z

269

Office of the Executive Secretariat  

Broader source: Energy.gov (indexed) [DOE]

Executive Secretariat, MA-70 Executive Secretariat, MA-70 Acting Director Carol A. Matthews Special Projects Security Policy and Analysis Group Programmatic Expertise High-level Review and Analysis Correspondence Management Group Correspondence Control & Assignment Correspondence Support FOIA Management Special Projects Receiving and Delivery Administration and Executive Commitments Group eDOCS Executive Commitments Information Management Budget Personnel Administration Office of History and Heritage Resources Institutional Memory History Activities Historic Preservation Litigation Research Customer Research Archives Administration May 2013 Deputy Director Carol A. Matthews Federal Advisory Committee Management

270

Executive Summary | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Summary Executive Summary How clean energy investments can be used to spur local economic development. Spurring Local Economic Development with Clean Energy Investments:...

271

NCAI Executive Council Winter Session  

Broader source: Energy.gov [DOE]

National Congress of American Indians (NCAI) is hosting the 2015 Executive Council Winter Session in Washington, DC, Feb. 23-25, 2015.

272

V-099: Honeywell Multiple Products ActiveX Control Remote Code Execution  

Broader source: Energy.gov (indexed) [DOE]

099: Honeywell Multiple Products ActiveX Control Remote Code 099: Honeywell Multiple Products ActiveX Control Remote Code Execution Vulnerability V-099: Honeywell Multiple Products ActiveX Control Remote Code Execution Vulnerability February 26, 2013 - 12:26am Addthis PROBLEM: Honeywell Multiple Products ActiveX Control Remote Code Execution Vulnerability PLATFORM: Honeywell ComfortPoint Open Manager (CPO-M) Honeywell Enterprise Buildings Integrator (EBI) Honeywell SymmetrE ABSTRACT: A vulnerability has been reported in multiple Honeywell products REFERENCE LINKS: Secunia Advisory SA52389 ICSA-13-053-02 CVE-2013-0108 IMPACT ASSESSMENT: Medium DISCUSSION: The vulnerability is caused due to an unspecified error in the HscRemoteDeploy.dll module. No further information is currently available. Successful exploitation may allow execution of arbitrary code.

273

U-099: MySQL Unspecified Code Execution Vulnerability | Department of  

Broader source: Energy.gov (indexed) [DOE]

099: MySQL Unspecified Code Execution Vulnerability 099: MySQL Unspecified Code Execution Vulnerability U-099: MySQL Unspecified Code Execution Vulnerability February 9, 2012 - 7:00am Addthis PROBLEM: A vulnerability has been reported in MySQL, which can be exploited by malicious people to compromise a vulnerable system. PLATFORM: MySQL 5.x ABSTRACT: Successful exploitation allows execution of arbitrary code. Reference LINKS: Secunia Advisory SA47894 No CVE references currently available. IMPACT ASSESSMENT: Medium Discussion: The vulnerability is reported in version 5.5.20. Other versions may also be affected. The exploit has been tested with mysql-5.5.20-debian6.0-i686.deb on Debian 6.0. Impact: System access from local network Solution: An effective workaround cannot currently be provided due to limited vulnerability details.

274

V-099: Honeywell Multiple Products ActiveX Control Remote Code Execution  

Broader source: Energy.gov (indexed) [DOE]

9: Honeywell Multiple Products ActiveX Control Remote Code 9: Honeywell Multiple Products ActiveX Control Remote Code Execution Vulnerability V-099: Honeywell Multiple Products ActiveX Control Remote Code Execution Vulnerability February 26, 2013 - 12:26am Addthis PROBLEM: Honeywell Multiple Products ActiveX Control Remote Code Execution Vulnerability PLATFORM: Honeywell ComfortPoint Open Manager (CPO-M) Honeywell Enterprise Buildings Integrator (EBI) Honeywell SymmetrE ABSTRACT: A vulnerability has been reported in multiple Honeywell products REFERENCE LINKS: Secunia Advisory SA52389 ICSA-13-053-02 CVE-2013-0108 IMPACT ASSESSMENT: Medium DISCUSSION: The vulnerability is caused due to an unspecified error in the HscRemoteDeploy.dll module. No further information is currently available. Successful exploitation may allow execution of arbitrary code.

275

T-529: Apple Mac OS PackageKit Distribution Script Remote Code Execution  

Broader source: Energy.gov (indexed) [DOE]

29: Apple Mac OS PackageKit Distribution Script Remote Code 29: Apple Mac OS PackageKit Distribution Script Remote Code Execution Vulnerability T-529: Apple Mac OS PackageKit Distribution Script Remote Code Execution Vulnerability January 6, 2011 - 2:53pm Addthis PROBLEM: Apple Mac OS PackageKit Distribution Script Remote Code Execution Vulnerability PLATFORM: Apple Mac OS X Server 10.6 - 10.6.5, Apple Mac OS X 10.6 - 10.6.5 Vulnerable Platforms Details ABSTRACT: A format string issue exists in PackageKit's handling of distribution scripts. A man-in-the-middle attacker may be able to cause an unexpected application termination or arbitrary code execution when Software Update checks for new updates. This issue is addressed through improved validation of distribution scripts. This issue does not affect systems prior to Mac OS

276

Transverse Ising model with arbitrary spin  

Science Journals Connector (OSTI)

An effective-field theory that has recently been used for studying higher-spin Ising models is herein extended to the transverse Ising model with an arbitrary spin S. The general formulation for evaluating the transition line in the ?-T space and relevant statistical-mechanical quantities is derived. Numerical results are performed and analyzed for the particular cases S=3/2 and S=2.

T. Kaneyoshi; M. Ja?ur; I. P. Fittipaldi

1993-07-01T23:59:59.000Z

277

Building Relationships with Executive Search Firms Building Relationships with Executive Search Firms  

E-Print Network [OSTI]

Relationships Similar Searches Alumni Organizations Education Company Team - Sports Job Hunting / NetworkingBuilding Relationships with Executive Search Firms for Building Relationships with Executive Search Firms for Weiner & Associates, Inc. Executive Search Partners Weiner & Associates, Inc. Executive Search

Ferrari, Silvia

278

U-082: McAfee SaaS 'myCIOScn.dll' ActiveX Control Lets Remote...  

Broader source: Energy.gov (indexed) [DOE]

Lets Remote Users Execute Arbitrary Code January 17, 2012 - 1:00pm Addthis PROBLEM: PHP Null Pointer Dereference in zendstrndup() Lets Local Users Deny Service PLATFORM: PHP...

279

V-163: Red Hat Network Satellite Server Inter-Satellite Sync...  

Broader source: Energy.gov (indexed) [DOE]

Apache modproxymodrewrite Bug Lets Remote Users Access Internal Servers U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code...

280

JC3 Bulletin Archive | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

to Remote Users Two vulnerabilities were reported in Bugzilla. July 27, 2012 U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar,...

Note: This page contains sample records for the topic "users execute arbitrary" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

U-219: Symantec Web Gateway Input Validation Flaws Lets Remote...  

Broader source: Energy.gov (indexed) [DOE]

9: Symantec Web Gateway Input Validation Flaws Lets Remote Users Inject SQL Commands, Execute Arbitrary Commands, and Change User Passwords U-219: Symantec Web Gateway Input...

282

JC3 Bulletin Archive | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Users Execute Arbitrary Code. October 4, 2011 U-002:Adobe Photoshop Elements Multiple Memory Corruption Vulnerabilities A remote user can create a file that, when loaded by the...

283

Social Network Inference of Smartphone Users Based on Information Diffusion Models  

Science Journals Connector (OSTI)

In this paper we propose models for inferring a social network of smartphone users. By applying the concept of information diffusion models to the log of application executions in smartphones, strength of rela...

Tomonobu Ozaki; Minoru Etoh

2011-01-01T23:59:59.000Z

284

Trusted Computing Technologies, Intel Trusted Execution Technology.  

SciTech Connect (OSTI)

We describe the current state-of-the-art in Trusted Computing Technologies - focusing mainly on Intel's Trusted Execution Technology (TXT). This document is based on existing documentation and tests of two existing TXT-based systems: Intel's Trusted Boot and Invisible Things Lab's Qubes OS. We describe what features are lacking in current implementations, describe what a mature system could provide, and present a list of developments to watch. Critical systems perform operation-critical computations on high importance data. In such systems, the inputs, computation steps, and outputs may be highly sensitive. Sensitive components must be protected from both unauthorized release, and unauthorized alteration: Unauthorized users should not access the sensitive input and sensitive output data, nor be able to alter them; the computation contains intermediate data with the same requirements, and executes algorithms that the unauthorized should not be able to know or alter. Due to various system requirements, such critical systems are frequently built from commercial hardware, employ commercial software, and require network access. These hardware, software, and network system components increase the risk that sensitive input data, computation, and output data may be compromised.

Guise, Max Joseph; Wendt, Jeremy Daniel

2011-01-01T23:59:59.000Z

285

2014 NERSC User Survey  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

2014 NERSC User Survey 2014 NERSC User Survey December 17, 2014 by Francesca Verdier (0 Comments) Please take a few minutes to fill out NERSC's annual user survey. Your feedback is...

286

Safety for Users  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Safety for Users Print Safety at the ALS The mission of the ALS is "Support users in doing outstanding science in a safe environment." All users and staff participate in creating a...

287

Safety for Users  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Safety for Users Print Safety at the ALS The mission of the ALS is "Support users in doing outstanding science in a safe environment." All users and staff participate in creating...

288

General User Proposals  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

General User Proposals Print General Users are granted beam time through a peer review proposal process. They may use beamlines and endstations provided by the ALS or the...

289

General User Proposals  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Office General User Proposals Print General Users are granted beam time through a peer review proposal process. They may use beamlines and endstations provided by the ALS...

290

Federal Energy Management Program: Executive Order 13423  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Executive Order Executive Order 13423 to someone by E-mail Share Federal Energy Management Program: Executive Order 13423 on Facebook Tweet about Federal Energy Management Program: Executive Order 13423 on Twitter Bookmark Federal Energy Management Program: Executive Order 13423 on Google Bookmark Federal Energy Management Program: Executive Order 13423 on Delicious Rank Federal Energy Management Program: Executive Order 13423 on Digg Find More places to share Federal Energy Management Program: Executive Order 13423 on AddThis.com... Requirements by Subject Requirements by Regulation National Energy Conservation Policy Act Executive Order 13514 Energy Independence & Security Act Executive Order 13423 Energy Policy Act of 2005 Executive Order 13221 Energy Policy Act of 1992 Notices & Rules

291

T-555: Adobe Acrobat and Reader Image Parsing Arbitrary Code...  

Broader source: Energy.gov (indexed) [DOE]

page or execute a malicious .pdf document, the attacker-specified data could cause a memory corruption, resulting in the execution of code. The attacker could take advantage of...

292

Executive Summary By Blake Johnson  

E-Print Network [OSTI]

Executive Summary By Blake Johnson Creating Business Value with Analytics and Big Data A one and Teradata Corporation, and was led by Blake Johnson, consulting professor in the Department of Management

Straight, Aaron

293

EXECUTIVE ORDER 13514  

Broader source: Energy.gov (indexed) [DOE]

ORDER 13514 ORDER 13514 FEDERAL LEADERSHIP IN ENVIRONMENTAL, ENERGY AND ECONOMIC PERFORMANCE FAR and DEAR Implementation and User Aids. 1 Notice a Pattern * Third President in a Row to do this! * Clinton had 5 Greening Orders starting with 13101. * Bush trumped him by putting it all in one, i.e., EO 13423, [Did you know? Congress made this permanent by placing it in a continuing resolution!]. * Obama trumped him by adding Green House Gases and Plug In Hybrids in EO 13514. 2 FAR Case 2010-001 Sustainable Acquisition - What's New * A new 23.002 is established aimed directly at DOE. It repeats E.O. 13423, Section 3(e) requirement that contracts for Contractor operation of a Government facility must contain a clause requiring the Contractor to comply with E.O. 13423 to

294

CFEST Coupled Flow, Energy & Solute Transport Version CFEST005 Users Guide  

SciTech Connect (OSTI)

The CFEST (Coupled Flow, Energy, and Solute Transport) simulator described in this Users Guide is a three-dimensional finite-element model used to evaluate groundwater flow and solute mass transport. Confined and unconfined aquifer systems, as well as constant and variable density fluid flows can be represented with CFEST. For unconfined aquifers, the model uses a moving boundary for the water table, deforming the numerical mesh so that the uppermost nodes are always at the water table. For solute transport, changes in concentration of a single dissolved chemical constituent are computed for advective and hydrodynamic transport, linear sorption represented by a retardation factor, and radioactive decay. Although several thermal parameters described in this Users Guide are required inputs, thermal transport has not yet been fully implemented in the simulator. Once fully implemented, transport of thermal energy in the groundwater and solid matrix of the aquifer can also be used to model aquifer thermal regimes. The CFEST simulator is written in the FORTRAN 77 language, following American National Standards Institute (ANSI) standards. Execution of the CFEST simulator is controlled through three required text input files. These input file use a structured format of associated groups of input data. Example input data lines are presented for each file type, as well as a description of the structured FORTRAN data format. Detailed descriptions of all input requirements, output options, and program structure and execution are provided in this Users Guide. Required inputs for auxillary CFEST utilities that aide in post-processing data are also described. Global variables are defined for those with access to the source code. Although CFEST is a proprietary code (CFEST, Inc., Irvine, CA), the Pacific Northwest National Laboratory retains permission to maintain its own source, and to distribute executables to Hanford subcontractors.

Freedman, Vicky L.; Chen, Yousu; Gilca, Alex; Cole, Charles R.; Gupta, Sumant K.

2006-07-20T23:59:59.000Z

295

Historic Preservation Executed Programmatic Agreements  

Broader source: Energy.gov [DOE]

Programmatic Agreements offer a more streamlined process for grantees to satisfy their historic preservation requirements with minimum or no consultation with the State Historic Preservation Officer based on the type of activity that is being undertaken. Below please find state-specific executed Programmatic Agreements. Executed agreements will apply to counties, municipalities and other local governments within the respective state receiving DOE's financial assistance awards to ensure comprehensive coverage of DOE's program grantees.

296

Extension Program Council's Executive Board.  

E-Print Network [OSTI]

~IB-134'-! II"I~ I~? Extension Program Council's Executive Board Mary G. Marshall and Burl B. Richardson Extension Program Development Specialists The Extension Program Council works with Extension agents to plan, implement, evaluate... direction and scope of all educa tionallong-range plan activity. Since Extension does not have the resources to address every issue or need, long-range planning establishes priorities among the issues. The Executive Board has responsibility...

Marshall, Mary G.; Richardson, Burl B.

1986-01-01T23:59:59.000Z

297

Energy Savings Performance Contract Federal Project Executives  

Broader source: Energy.gov [DOE]

Federal project executive (FPEs) help agencies launch energy savings performance contract (ESPC) projects.

298

Arbitrary manipulation of nonlinear optical processes  

E-Print Network [OSTI]

Nonlinear optical processes are governed by the relative-phase relationships among the relevant electromagnetic fields in these processes. In this Letter, we describe the physics of arbitrary manipulation of nonlinear optical processes (AMNOP) by artificial control of relative phases. As a typical example, we show freely designable optical-frequency conversions to extreme spectral regions, mid-infrared and vacuum-ultraviolet, with near-unity quantum efficiencies. Furthermore, we show that such optical-frequency conversions can be realized by using a surprisingly simple technology where transparent plates are placed in a nonlinear optical medium and their positions and thicknesses are adjusted precisely. In a numerical experiment assuming practically applicable parameters in detail, we demonstrate a single-frequency tunable laser that covers the whole vacuum-ultraviolet spectral range of 120 to 200 nm.

Jian Zheng; Masayuki Katsuragawa

2014-06-16T23:59:59.000Z

299

VISION 2008 User's Guide  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

VISION 2008 User's Guide VISION 2008 User's Guide ANL-08/34 Energy Systems Division VISION 2008 User's Guide ANL-08/34 User's Guide by J. Ward Vehicle Technologies Program, U.S. Department of Energy, Energy Efficiency and Renewable Energy VISION model by A. Vyas and M. Singh Transportation Technology R&D Center, Argonne National Laboratory October 2008 VISION 2008 User's Guide October 2008 i Table of Contents Copyright Notification .............................................................................................................................. ii List of Abbreviations ................................................................................................................................ iii

300

Mercury/Waterfilling: Optimum Power Allocation with Arbitrary Input Constellations  

E-Print Network [OSTI]

Mercury/Waterfilling: Optimum Power Allocation with Arbitrary Input Constellations Angel Lozano gives the power allocation policy, referred to as mercury/waterfilling, that maximizes the sum mutual

Verdú, Sergio

Note: This page contains sample records for the topic "users execute arbitrary" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

FACET User Facility  

Broader source: All U.S. Department of Energy (DOE) Office Webpages

AD SLACPortal > Accelerator Research Division > FACET User Facility AD SLACPortal > Accelerator Research Division > FACET User Facility Sign In Launch the Developer Dashboard SLAC National Accelerator Laboratory DOE | Stanford | SLAC | SSRL | LCLS | AD | PPA | Photon Science | PULSE | SIMES FACET User Facility : FACET An Office of Science User Facility Search this site... Search Help (new window) Top Link Bar FACET User Facility FACET Home About FACET FACET Experimental Facilities FACET Users Research at FACET SAREC Expand SAREC FACET FAQs FACET User Facility Quick Launch FACET Users Home FACET Division ARD Home About FACET FACET News FACET Users FACET Experimental Facilities FACET Research Expand FACET Research FACET Images Expand FACET Images SAREC Expand SAREC FACET Project Site (restricted) FACET FAQs FACET Site TOC All Site Content

302

Users from Industry  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Users from Industry Users from Industry Users from Industry Print The Advanced Light Source (ALS) welcomes industrial users from large and small companies whose projects advance scientific knowledge, investigate the development of new products and manufacturing methods, or provide economic benefits and jobs to the economy. The nature of industrial research can be different from traditional university and government sponsored projects, so the ALS has created unique opportunities for new and existing industrial users to access our user facilities and engage in productive relationships with our scientific and engineering staff. Examples of past and current research conducted at the ALS can be viewed on the Industry @ ALS Web page. There are several modes of access; the ALS User and Scientific Support Groups are especially committed to helping new industrial users gain a foothold in our user community and welcome inquiries about how to make that happen.

303

User_ViewRecords  

Broader source: Energy.gov (indexed) [DOE]

User Records User Records © 2011 SuccessFactors, Inc. - 1 - SuccessFactors Learning Confidential. All rights reserved. Job Aid: Viewing User Records Purpose The purpose of this job aid is to guide users through the step-by-step process of viewing their records. Each task demonstrates viewing of different records. Task A. View To-Do List Enter the web address (URL) of the user application into your browser Address field and press the Enter key. Enter your user ID in the User ID textbox. Enter your password in the Password textbox. Click Sign In. View To-Do List (filter, view) 7 Steps Task A View Completed Work 8 Steps Task B View Curriculum Status and Details 11 Steps Task C 3 3 1 2 2 1 SuccessFactors Learning v 6.4 User Job Aid Viewing User Records

304

2012 PATRIOT SCRIPT User's Guide  

SciTech Connect (OSTI)

PATRIOT Script is an application that executes Patriot batch runs. This document provides a description of this application and how to run it. The basic user access tool PATRIOT Client allows a user to generate several most reliable paths in one run: one can specify a list of sources (origins) and targets, and PATRIOT finds for a given architecture option and one choice of device all the most reliable paths between all these sources and targets. The main objective of PATRIOT Script is to provide a tool for making automatic PATRIOT runs not only for a prespecified set of sources and targets, but also for a pre-specified set of devices and various architecture options. Running PATRIOT Script requires two basic steps that will be explained in more detail next: (1) Pre-preparation of an excel spreadsheet with the information about the desired runs; and (2) Opening the PATRIOT Script application, reading in the excel-spreadsheet and running the desired scenarios. Sections 1 and 2 explain each of these steps, and section 3 describes the output of the PATRIOT Script. For a detail description of the models and data behind PATRIOT and a detailed explanation of all the architecture options see [1]. For instructions of how to run PATRIOT Client see [2].

Cuellar, Leticia [Los Alamos National Laboratory; Cleland, Timothy J. [Los Alamos National Laboratory; Kubicek, Deborah A. [Los Alamos National Laboratory; Mathis, Mark M. [Los Alamos National Laboratory; Stroud, Phillip D. [Los Alamos National Laboratory

2012-05-31T23:59:59.000Z

305

Designing the user in user interfaces  

Science Journals Connector (OSTI)

In the good old days, the human was here, the computer there, and a good living was to be made by designing ways to interface between the two. Now we find ourselves unthinkingly pinching to zoom in on a picture in a paper magazine. User interfaces are ... Keywords: mixed reality, posthuman factors, transhumanism, user interace, virtual reality

Mark Bolas

2014-10-01T23:59:59.000Z

306

Social network inference of smartphone users based on information diffusion models  

Science Journals Connector (OSTI)

In this paper we propose models for inferring a social network of smartphone users. By applying the concept of information diffusion models to the log of application executions in smartphones, strength of relationships among users will be estimated as ... Keywords: information diffusion model, log analysis, smartphone, social network inference

Tomonobu Ozaki; Minoru Etoh

2011-12-01T23:59:59.000Z

307

The User Agreement  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

User Agreement User Agreement Oak Ridge National Laboratory is home to a number of highly sophisticated experimental user facilities. These research facilities, instruments, and laboratories are designed to serve Laboratory researchers, engineers, and technical staff, as well as external researchers from universities, industries, foreign institutions and other government laboratories. Sharing these state-of-the-art facilities with the scientific, industrial, and technical communities provides access to unique and specialized technology, equipment and instrumentation without burdening the user with the astronomical capital costs of building such facilities. Characteristics of User Agreements * User Agreements come in two types; proprietary and non-proprietary. The characteristics of

308

User Facilities | ORNL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

USER PORTAL USER PORTAL BTRICBuilding Technologies Research Integration Center CNMSCenter for Nanophase Materials Sciences CSMBCenter for Structural Molecular Biology CFTFCarbon Fiber Technology Facility HFIRHigh Flux Isotope Reactor MDF Manufacturing Demonstration Facility NTRCNational Transportation Research Center OLCFOak Ridge Leadership Computing Facility SNSSpallation Neutron Source Keeping it fresh at the Spallation Neutron Source Nanophase material sciences' nanotech toolbox Home | User Facilities SHARE ORNL User Facilities ORNL is home to a number of highly sophisticated experimental user facilities that provide unmatched capabilities to the broader scientific community, including a growing user community from universities, industry, and other laboratories research institutions, as well as to ORNL

309

EIA - AEO2010 - Executive Summary  

Gasoline and Diesel Fuel Update (EIA)

Executive Summary Executive Summary Annual Energy Outlook 2010 with Projections to 2035 Executive Summary In 2009, U.S. energy markets continued to show the impacts of the economic downturn that began in late 2007. After falling by 1 percent in 2008, total electricity generation dropped by another 3 percent in 2009. Although other factors, including weather, contributed to the decrease, it was the first time in the 60-year data series maintained by the EIA that electricity use fell in two consecutive years. Over the next few years, the key factors influencing U.S. energy markets will be the pace of the economic recovery, any lasting impacts on capital-intensive energy projects from the turmoil in financial markets, and the potential enactment of legislation related to energy and the environment.

310

2010 Resource Program Executive Summary  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

increase transmission flexibility * Directly involve electricity users through demand response programs BPA is actively pursuing all these areas. The Resource Program analysis...

311

Business Development Executive (BDE) Program  

SciTech Connect (OSTI)

The IPST BDE (Institute of Paper Science and Technology Business Development Executive) program was initiated in 1997 to make the paper industry better aware of the new manufacturing technologies being developed at IPST for the U.S. pulp and paper industry's use. In April 2000, the BDE program management and the 20 BDEs, all retired senior level industry manufacturing and research executives, were asked by Ms. Denise Swink of OIT at DOE to take the added responsibility of bringing DOE developed energy conservation technology to the paper industry. This project was funded by a DOE grant of $950,000.

Rice, E.J. "Woody"; Frederick, W. James

2005-12-05T23:59:59.000Z

312

JC3 Bulletin Archive | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Arbitrary Code A vulnerability was reported in HP SiteScope. September 20, 2012 U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges...

313

Other Executive Positions | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Executive Positions | National Nuclear Security Administration Executive Positions | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Other Executive Positions Home > Federal Employment > Our Jobs > Executive Positions > Other Executive Positions Other Executive Positions NNSA seeks highly qualified senior professionals to apply their knowledge,

314

Argonne CNM: Industrial Users  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

For Industrial Users For Industrial Users The Center for Nanoscale Materials (CNM) has specific interest in growing the industrial user program and encourages researchers in industry to consider the capabilities and expertise we have to offer. As a CNM user, you have easy access to sophisticated scientific instrumentation geared toward nanoscience and nanotechnology. Moreover, our widely recognized staff researchers offer support in designing your experiments, using the equipment, and analyzing your data. Access to the CNM is through peer review of user proposals. Before you submit your first user proposal, we encourage you to contact any of our staff researchers, group leaders, the User Office, or division management to discuss the feasibility of your intended research using the expertise and facilities at the CNM. We are here to serve you as part of our user community and will be happy to address any questions you might have.

315

Fermilab Users' Meeting, 2009  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Users Meeting Poster Fermilab Users' Meeting Users Meeting Poster Fermilab Users' Meeting June 3-4, 2009 The annual gathering of the Fermilab Users Organization will be held on June 3-4, 2009. This meeting is an opportunity for discussion of new physics results from the laboratory's experimental program, future initiatives at the lab, and thoughtful presentations from leaders of the scientific policy community. The meeting will also feature selected talks from outstanding young physicists. Topics to be covered at the Users Meeting include: Collider Physics Astro-particle Physics Neutrino Physics Future Plans Full Agenda Registration is now closed. NEW!: Pictures from the 2009 Users' Meeting can be found here. A poster session organized by the GSA will be held on June 3rd in the Atrium. The public lecture at this year's Users' Meeting will be given by Prof. Tom Katsouleas

316

NSLS Services | User Accounts  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

User Accounts User Accounts Operating Accounts (81000 accounts) General Users who are allocated beam time and Participating Research Teams (PRTs) or Contributing Users (CUs) who operate beamlines should establish a BNL operating account to cover the costs of materials while running an experiment, shipping, and/or miscellaneous BNL services (telephone & fax codes), if these needs are anticipated. The term of the purchase order must be specified and names of persons having signature authorization for charges against this account must be listed. Brookhaven's Fiscal Division will bill the user for any charges the user makes to the account. Users are obligated to pay outstanding debts promptly. All users should set up a $1,000 operating account to cover operating expenses while at the NSLS, such as charges for use of trades, shops, and

317

Users from Industry  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Users from Industry Print Users from Industry Print The Advanced Light Source (ALS) welcomes industrial users from large and small companies whose projects advance scientific knowledge, investigate the development of new products and manufacturing methods, or provide economic benefits and jobs to the economy. The nature of industrial research can be different from traditional university and government sponsored projects, so the ALS has created unique opportunities for new and existing industrial users to access our user facilities and engage in productive relationships with our scientific and engineering staff. Examples of past and current research conducted at the ALS can be viewed on the Industry @ ALS Web page. There are several modes of access; the ALS User and Scientific Support Groups are especially committed to helping new industrial users gain a foothold in our user community and welcome inquiries about how to make that happen.

318

Can execution time describe accurately the energy consumption of mobile apps? an experiment in Android  

Science Journals Connector (OSTI)

Measuring the energy spent by a software application is a problem that can be solved by having the proper hardware or software instruments. However, not always such tools are available or the provide resolution cannot fit the needs of the user, for ... Keywords: Android, Energy Consumption, Execution Time, Mobile

Luis Corral; Anton B. Georgiev; Alberto Sillitti; Giancarlo Succi

2014-06-01T23:59:59.000Z

319

LANSCE | Users | LUG | Charter  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

for the remainder of the term and the next term, and the Executive Committee shall elect a new Vice Chair from its membership. If the office of Vice Chair becomes vacant, the...

320

28th Annual SSRL Users' Meeting -- Lytle Award  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Program Program Workshops Abstracts Lytle Award Vendor Exhibit Registration Payment by Credit SSRLUO Ballot Lodging Directions Visitor Info General Info 28th Annual Stanford Synchrotron Radiation Laboratory Users' Meeting Menlo Park, California USA October 18-19, 2001 Annual Farrel W. Lytle Award -- Nominations Due September 5 The Annual Farrel W. Lytle Award was established by the SSRL Users' Organization Executive Committee to promote important technical or scientific accomplishments in synchrotron radiation-based science and to foster collaboration and efficient use of beam time among users and staff at SSRL. The Lytle Award consists of a plaque that is displayed in the User Research Administration Office at SSRL and $1000. All SSRL users and staff are eligible for this award.

Note: This page contains sample records for the topic "users execute arbitrary" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

V-170: Apache Subversion Hook Scripts Arbitrary Command Injection...  

Broader source: Energy.gov (indexed) [DOE]

by malicious users to compromise a vulnerable system. SOLUTION: Users to apply the patch. Addthis Related Articles V-129: Apache Subversion moddavsvn Multiple Denial of...

322

Project Description Executive Summary Report  

E-Print Network [OSTI]

$Total Project Cost: 1,000,000Auxillary Enterprises Balances $ 9,400,000Revenue Financing System Bonds $ 1Project Description Executive Summary Report Project Information Project Budget Project Funding 302-680 Parking Structure Phase I This project consists of a 750 space parking garage of approximately 251

O'Toole, Alice J.

323

Executive Order 11988 - Floodplain Management | Open Energy Informatio...  

Open Energy Info (EERE)

- Floodplain Management Jump to: navigation, search OpenEI Reference LibraryAdd to library Legal Document- Executive OrderExecutive Order: Executive Order 11988 - Floodplain...

324

FEMA - Executive Order 11990 - Protection of Wetlands 1977 |...  

Open Energy Info (EERE)

Protection of Wetlands 1977 Jump to: navigation, search OpenEI Reference LibraryAdd to library Legal Document- Executive OrderExecutive Order: FEMA - Executive Order 11990 -...

325

TRL Computer System Users Guide  

SciTech Connect (OSTI)

We have developed a wiki-based graphical user-interface system that implements our technology readiness level (TRL) uncertainty models. This document contains the instructions for using this wiki-based system.

Engel, David W.; Dalton, Angela C.

2014-01-31T23:59:59.000Z

326

LANSCE | Users | LUG | Topical User Workshop  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

to NNSA's call for major NNSA facility upgrades, as well as new end stations at the Lujan Neutron Scattering Center. All current and potential LANSCE users are encouraged to...

327

T-545: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets...  

Energy Savers [EERE]

T-545: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets Remote Users Execute Arbitrary Code T-545: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets Remote Users Execute...

328

U-064: Adobe Acrobat/Reader PRC Memory Corruption Error Lets...  

Broader source: Energy.gov (indexed) [DOE]

4: Adobe AcrobatReader PRC Memory Corruption Error Lets Remote Users Execute Arbitrary Code U-064: Adobe AcrobatReader PRC Memory Corruption Error Lets Remote Users Execute...

329

U-199: Drupal Drag & Drop Gallery Module Arbitrary File Upload...  

Office of Environmental Management (EM)

The vulnerability is caused due to the sitesallmodulesdragdropgalleryupload.php script improperly validating uploaded files, which can be exploited to execute...

330

Quantum Szilard engines with arbitrary spin  

E-Print Network [OSTI]

The quantum Szilard engine (QSZE) is a conceptual quantum engine for understanding the fundamental physics of quantum thermodynamics and information physics. We generalize the QSZE to an arbitrary spin case, i.e., a spin QSZE (SQSZE), and we systematically study the basic physical properties of both fermion and boson SQSZEs in a low-temperature approximation. We give the analytic formulation of the total work. For the fermion SQSZE, the work might be absorbed from the environment, and the change rate of the work with temperature exhibits periodicity and even-odd oscillation, which is a generalization of a spinless QSZE. It is interesting that the average absorbed work oscillates regularly and periodically in a large-number limit, which implies that the average absorbed work in a fermion SQSZE is neither an intensive quantity nor an extensive quantity. The phase diagrams of both fermion and boson SQSZEs give the SQSZE doing positive or negative work in the parameter space of the temperature and the particle number of the system, but they have different behaviors because the spin degrees of the fermion and the boson play different roles in their configuration states and corresponding statistical properties. The critical temperature of phase transition depends sensitively on the particle number. By using Landauer's erasure principle, we give the erasure work in a thermodynamic cycle, and we define an efficiency (we refer to it as information-work efficiency) to measure the engine's ability of utilizing information to extract work. We also give the conditions under which the maximum extracted work and highest information-work efficiencies for fermion and boson SQSZEs can be achieved.

Zekun Zhuang; Shi-Dong Liang

2015-02-02T23:59:59.000Z

331

Evaluation of the Compressed Air Challenge Training Program: Executive Summary  

Broader source: Energy.gov [DOE]

This is the executive summary of a report on an evaluation of the Compressed Air Challenge (CAC) training program, which was designed to provide plant personnel and compressed air system vendors with knowledge and tools required to effect improvements to the energy efficiency and overall performance of plant compressed air systems. The evaluation is based on three main research tasks: analysis of the CAC registration database, interviews with 100 end-user personnel who attended the CAC training, and interviews with 100 compressed air system vendors and consulting engineers who attended the training sessions.

332

STANDARD USER AGREEMENT  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

REV 6/3/2010 REV 6/3/2010 Proprietary User Agreement No. PR-14- BETWEEN UT-BATTELLE, LLC. ("CONTRACTOR") Operator of Oak Ridge National Laboratory (hereinafter "Laboratory") under U.S. Department of Energy (DOE) Contract No. DE-AC05-00OR22725 and NAME OF USER INSTITUTION ("USER") (Collectively, "the Parties") The obligations of the Contractor may be transferred and shall apply to any successor in interest to said Contractor continuing the operation of the DOE facilities involved in this Proprietary User Agreement. ARTICLE I. FACILITIES AND SCOPE OF WORK CONTRACTOR will make available to employees, consultants and representatives of USER

333

Implementing for Implementing Executive Order 13423  

Broader source: Energy.gov (indexed) [DOE]

IMPLEMENTING EXECUTIVE IMPLEMENTING EXECUTIVE ORDER 13423 "Strengthening Federal Environmental, Energy, and Transportation Management" March 29, 2007 0 Contents I. Introduction ......................................................................................................................1 A. Purpose..................................................................................................................1 B. Authority ...............................................................................................................1 C. Organization and Oversight ..................................................................................1 D. Overarching Policy and Directives .......................................................................4

334

Northwest Energy Efficiency Taskforce Executive Committee  

E-Print Network [OSTI]

#12;Northwest Energy Efficiency Taskforce Executive Committee Chairs Tom Karier, Washington Member, Northwest Energy Efficiency Alliance Bill Gaines, Director/Chief Executive Officer, Tacoma Public Utilities, Cowlitz County Public Utility District Cal Shirley, Vice President for Energy Efficiency Service, Puget

335

UCSF Sustainability Action Plan: Executive Summary  

E-Print Network [OSTI]

UCSF Sustainability Action Plan: Executive Summary Issue Date: April 21, 2011 #12;UCSF Sustainability Action Plan Executive Summary April 21, 2011 Page 1 Table of Contents An Introduction to the Sustainability Action Plan

Yamamoto, Keith

336

Safety for Users  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Safety for Users Safety for Users Safety for Users Print Safety at the ALS The mission of the ALS is "Support users in doing outstanding science in a safe environment." All users and staff participate in creating a culture and environment where performing research using the proper safeguards and fulfilling all safety requirements result in the success of the facility and its scientific program. The documents and guidance below will assist users and staff to achieve these goals. How Do I...? A series of fact sheets that explain what users need to know and do when preparing to conduct experiments at the ALS. Complete Experiment Safety Documentation? Work with Biological Materials? Work with Chemicals? Work with Regulated Soil? Bring and Use Electrical Equipment at the ALS?

337

ALS User Meeting Archives  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

User Meeting Archives Print User Meeting Archives Print Past User Meeting Agendas, Workshops, and Awards Year Agenda Workshops David A. Shirley (Science) Klaus Halbach (Instrumentation) Tim Renner (Service) 2012 2012 User Meeting Agenda 2012 User Meeting Workshops 2012 ALS User Meeting Awards Carl Percival, Dudley Shallcross, Craig Taatjes and David Osborn (Sandia), for making the first direct measurements of the reactions of Criegee intermediates, and showing that their impact on tropospheric chemistry and climate may be substantially greater than previously assumed. 2012 ALS User Meeting Awards Jeff Dickert and Simon Morton of Berkeley Lab's Physical Biosciences Division for the invention and implementation of the Compact Variable Collimator (CVC), which has led to a dramatic increase in productivity of protein crystallography.

338

ALS User Meeting Archives  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

ALS User Meeting Archives ALS User Meeting Archives Past User Meeting Agendas, Workshops, and Awards Year Agenda Workshops David A. Shirley (Science) Klaus Halbach (Instrumentation) Tim Renner (Service) 2012 2012 User Meeting Agenda 2012 User Meeting Workshops 2012 ALS User Meeting Awards Carl Percival, Dudley Shallcross, Craig Taatjes and David Osborn (Sandia), for making the first direct measurements of the reactions of Criegee intermediates, and showing that their impact on tropospheric chemistry and climate may be substantially greater than previously assumed. 2012 ALS User Meeting Awards Jeff Dickert and Simon Morton of Berkeley Lab's Physical Biosciences Division for the invention and implementation of the Compact Variable Collimator (CVC), which has led to a dramatic increase in productivity of protein crystallography.

339

NSLS User Access | Training  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Training Training Training for New Users and Users with Expired Training and/or Badges: All new users and users with expired badges must complete or update the training modules shown below prior to access to the experimental floor. The training can be completed online prior to arrival at the NSLS and is strongly recommended to save considerable time during check-in at the Guest, User, Visitor (GUV) Center in Building 400. Please note each training module is followed by an exam which asks for your name and guest number. If you do not already have a guest number, leave this entry blank. All new users and users with expired badges MUST arrive on a weekday (no weekends or holidays) and check in at the GUV Center so that your training can be verified and to receive a photo ID badge (new or updated). The GUV

340

Executive Order 13423- Strengthening Federal Environmental, Energy...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

423- Strengthening Federal Environmental, Energy, and Transportation Management Executive Order 13423- Strengthening Federal Environmental, Energy, and Transportation Management It...

Note: This page contains sample records for the topic "users execute arbitrary" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

EMPHASIS/Nevada CABANA user Guide. Version 2.0.  

SciTech Connect (OSTI)

The CABle ANAlysis (CABANA) portion of the EMPHASIS{trademark} suite is designed specifically for the simulation of cable system-generated electromagnetic pulse (SGEMP). The code can be used to evaluate the response of a specific cable design to threat or to compare and minimize the relative response of difference designs. This document provides user-specific information to facilitate the application of the code to cables of interest. It solves the electrical portion of a cable SGEMP simulation. It takes specific results from the deterministic radiation-transport code CEPTRE as sources and computes the resulting electrical response to an arbitrary cable load. The cable geometry itself is also arbitrary and is limited only by the patience of the user in meshing and by the available computing resources for the solution. The CABANA simulation involves solution of the quasi-static Maxwell equations using finite-element method (FEM) techniques.

Turner, C. David; Powell, Jennifer L.; Bohnhoff, William J.

2011-09-01T23:59:59.000Z

342

Executive Director Carleton Sustainable Energy Research Centre  

E-Print Network [OSTI]

Executive Director Carleton Sustainable Energy Research Centre Carleton University is seeking to appoint an Executive Director to its Sustainable Energy Research Centre. This Centre is one of a series of recent Carleton initiatives in the area of sustainable energy. The Executive Director

Dawson, Jeff W.

343

ADEQUACY REPORT … EXECUTIVE SUMMARY  

Broader source: Energy.gov (indexed) [DOE]

08 08 ADEQUACY REPORT - EXECUTIVE SUMMARY The electricity industry has gone through major changes in structure, shape, and form over the last decade. All signs indicate that business is far from "as usual". It is prudent at this time to ask if the present approaches can ensure reliable and cost effective supply of electricity over the next two decades and if not, then what is needed to achieve that. This was the prime reason for the formation of the Electricity Advisory Committee (EAC) for which this report was done. The answer to that key question is "no, unless....". A concise set of recommendations is included in this executive summary but more detailed lists are listed in the report. Today, the warning signs are here. Fuel transportation, particularly by rail, is congested,

344

Budget Formulation & Execution | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Budget Formulation & Execution Budget Formulation & Execution Budget Formulation & Execution The mission of the Office of Budget (CF-30) is to plan for, formulate, execute, analyze, and defend the Department of Energy's budget; to manage the corporate funds control process; and to serve as the external liaison for the Department of Energy on matters related to its budget. Functions: Coordinate and manage the Department's budget formulation, presentation, and execution processes. Provide central administration of Departmental appropriations, allotments, and financial controls. Formulate procedures for budgetary allocations and controls, reprogrammings, deferrals, and other financial actions. Develop budget tables, histories, statistics, and other data required for budget planning and control.

345

APS Users Organization  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

APSUO APSUO By-Laws Steering Commitee Employment Meetings Compton Award Franklin Award APS Users Organization The APSUO is responsible for advising the APS Associate Laboratory Director in the following areas: The Organization will serve as an advocacy group for the Facility and its user community. The Organization will provide advice to the ALD on matters affecting the user community. The Organization will assure good communication between the APS user community and the APS management. APSUO By-Laws The by-laws upon which the APS User Organization is based. List of Steering Committee Members Steering committee for the APS Users Organization. Employment Bulletin Board APS-related employment opportunities. APSUO Steering Committee Meetings Minutes and presentations from the APSUO meetings.

346

User Financial Account Form  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

URA REVISED 2/20/13 URA REVISED 2/20/13 User Financial Account Form Establish a user financial account at SLAC to procure gases, chemicals, supplies or services to support your experiment at SLAC's user facilities and to send samples, dewars, or other equipment between SLAC and your institution. To open or renew your SLAC user financial account, complete and submit this form along with a Purchase Order (PO) from your institution. The PO should be made to SLAC National Accelerator Laboratory for the amount of estimated expenditures (the suggested minimum is $1,000). Send this form with the PO (or a letter from the financial officer of your institution) to: Jackie Kerlegan (SSRL) or Theresa Wong (LCLS) User Research Administration, MS 99 User Research Administration, MS 99 SLAC National Accelerator Laboratory

347

JGI User Meeting 2007  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Second Annual Second Annual DOE Joint Genome Institute User Meeting Marriott Hotel Walnut Creek, California March 28-30, 2007 The U.S. Department of Energy Joint Genome Institute (JGI) welcomed its users and collaborators, as well as prospective new users, to the second annual JGI User Meeting. This international gathering of researchers with an interest in sequence-based science offered three days of user presentations, tours, workshops, and poster sessions. This was a unique opportunity to meet fellow users and JGI staff. Sessions and posters in the fields of microbial genomics, microbial communities, eukaryotic genomics, and genome technologies were presented. ©2006-2007, The Regents of the University of California. Last updated May 9, 2007. Disclaimer | Webmaster Agenda

348

Zimbra for APS Users  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Calendar Calendar Zimbra Calendar  ZWC Benefits: - Usable lab-wide, can schedule meetings with users and rooms outside APS - User friendly  Each Zimbra user has a personal calendar - Users migrated from Sun Calendar System optionally elected to migrate data from their personal calendar  With Zimbra, calendar terminology: - Appointments - Events - Meetings  Users can: - Create appointments - Create recurring events - Schedule all day events - Accept/Tentative/Reject an invitation with one click - Create additional calendars - Share their calendars with other users on and off-site - Delegate calendar management - Accept calendar shares - View calendar in various ways and print - Use color for quick calendar recognition - Schedule meetings * View multiple calendars to see potential scheduling

349

User_Login  

Broader source: Energy.gov (indexed) [DOE]

Logging In to SuccessFactors Learning Logging In to SuccessFactors Learning © 2011 SuccessFactors, Inc. - 1 - SuccessFactors Learning Confidential. All rights reserved. Job Aid: Logging In to SuccessFactors Learning Purpose The purpose of this job aid is to guide users through the step-by-step process of logging in to the SuccessFactors Learning Management System (LMS), retrieving your forgotten password and/or user ID, and using the LMS Help system. Task A. Log In to SuccessFactors Learning Enter the web address (URL) of the user application into your browser Address field and press the Enter key. Enter your user ID in the User ID textbox. Enter your password in the Password textbox. Click Sign In. 3 3 Log In to SuccessFactors Learning 5 Steps Task A Retrieve Forgotten Password and/or User

350

User_Navigation  

Broader source: Energy.gov (indexed) [DOE]

Online Learning Center v 6.4 Online Learning Center v 6.4 User Job Aid Navigation © 2012 Department of Energy - 1 - Online Learning Center (OLC) Job Aid: Navigation Purpose The purpose of this job aid is to guide users through the step-by-step process of navigating and identifying areas of the OLC, The Department of Energy's Learning Management System (LMS) user interface, and identifying some commonly used navigation icons. Identify Areas of the User Interface Task A Navigation Tips Task B How to Access in Online Learning Center Task C Online Learning Center v 6.4 User Job Aid Navigation © 2012 Department of Energy - 2 - Online Learning Center (OLC) Task A. Identify Areas of the OLC User Interface (OLC) Top Menu: Use the Home menu options in the top menu to navigate within the Online

351

V-155: Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session  

Broader source: Energy.gov (indexed) [DOE]

5: Apache Tomcat FORM Authenticator Lets Remote Users Conduct 5: Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks V-155: Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks May 14, 2013 - 12:08am Addthis PROBLEM: Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks PLATFORM: Tomcat 6.0.21 to 6.0.36, 7.0.0 to 7.0.32 ABSTRACT: A vulnerability was reported in Apache Tomcat. REFERENCE LINKS: Apache Tomcat SecurityTracker Alert ID: 1028534 CVE-2013-2067 IMPACT ASSESSMENT: High DISCUSSION: A remote user can repeatedly send a specially crafted request for a resource requiring authentication while the target user is completing the login form to cause the FORM authentication process to execute the remote user's request with the privileges of the target user.

352

Simplification of Arbitrary Polyhedral Meshes Shaun D. Ramsey  

E-Print Network [OSTI]

email: bertram@informatik.uni-kl.de Charles Hansen University of Utah Salt Lake City, UT, USA emailSimplification of Arbitrary Polyhedral Meshes Shaun D. Ramsey University of Utah Salt Lake City, UT

Hering-Bertram, Martin

353

SCALING RANDOM WALKS ON ARBITRARY SETS Simon C. Harris  

E-Print Network [OSTI]

SCALING RANDOM WALKS ON ARBITRARY SETS by Simon C. Harris , Robin Sibson and David Williams School deterministic sets I. In the 1-dimensional case discussed here and in the following paper by Harris, much

Harris, Simon Colin

354

ATF Program Advisory & Users  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

paths for flexibility & efficiency Old documentation not adequate Old hardware (PLC) no longer programmable ATF Program Advisory & Users Meeting, April 2-3,2009 M.Babzien...

355

Programs & User Facilities  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Facilities Programs & User Facilities Enabling remarkable discoveries and tools that transform our understanding of energy and matter and advance national, economic, and energy...

356

User Electrical Equipment Inspections  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

User Electronic and Electrical Equipment Inspection Criteria In order to be in compliance with NEC, OSHA, and DOE regulations all electronic and electrical equipment at the APS...

357

General User Proposals  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Proposals Print General Users are granted beam time through a peer review proposal process. They may use beamlines and endstations provided by the ALS or the Participating Research...

358

U-236: Microsoft JScript and VBScript Engine Integer Overflow Lets Remote  

Broader source: Energy.gov (indexed) [DOE]

36: Microsoft JScript and VBScript Engine Integer Overflow Lets 36: Microsoft JScript and VBScript Engine Integer Overflow Lets Remote Users Execute Arbitrary Code U-236: Microsoft JScript and VBScript Engine Integer Overflow Lets Remote Users Execute Arbitrary Code August 15, 2012 - 7:00am Addthis PROBLEM: Microsoft JScript and VBScript Engine Integer Overflow Lets Remote Users Execute Arbitrary Code PLATFORM: Version(s): 5.8 ABSTRACT: Execution of arbitrary code via network A remote user can cause arbitrary code to be executed on the target REFERENCE LINKS: technet.microsoft.com/en-us/security/bulletin/ms12-056 http://www.securitytracker.com/id/1027392 CVE-2012-2523 Impact assessment: Medium Discussion: Vulnerability was reported in Microsoft JScript and VBScript. A remote user can cause arbitrary code to be executed on the target user's system. A

359

Nanotechnology User Facility for  

E-Print Network [OSTI]

A National Nanotechnology User Facility for Industry Academia Government #12;The National Institute of Commerce's nanotechnology user facility. The CNST enables innovation by providing rapid access to the tools new measurement and fabrication methods in response to national nanotechnology needs. www

360

ARM User Survey Report  

SciTech Connect (OSTI)

The objective of this survey was to obtain user feedback to, among other things, determine how to organize the exponentially growing data within the Atmospheric Radiation Measurement (ARM) Climate Research Facility, and identify users preferred data analysis system. The survey findings appear to have met this objective, having received approximately 300 responses that give insight into the type of work users perform, usage of the data, percentage of data analysis users might perform on an ARM-hosted computing resource, downloading volume level where users begin having reservations, opinion about usage if given more powerful computing resources (including ability to manipulate data), types of tools that would be most beneficial to them, preferred programming language and data analysis system, level of importance for certain types of capabilities, and finally, level of interest in participating in a code-sharing community.

Roeder, LR

2010-06-22T23:59:59.000Z

Note: This page contains sample records for the topic "users execute arbitrary" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

DSDP4 User Guide  

E-Print Network [OSTI]

Mar 28, 2002 ... used as a subroutine library, and Matlab routine, and an executable that read SDPA files. New features in ... 3.4 Applying DSDP to Graph Problems . ... The variable X must be a symmetric positive semidefinite matrix. Here K...

2002-03-28T23:59:59.000Z

362

FY2006 SSRLUO Executive Committee  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

6 Executive Committee 6 Executive Committee corner corner Environmental Sciences Graduate Student LCLS Macromolecular Crystallography Materials Chemistry SSRL Liaison Biospectroscopy corner corner Juana Acrivos CSU San Jose, Chemistry, 1 Washington Square, SanJose, CA 95192-0101 Juana Acrivos has done experiments at SSRL since 1978. She is a chemist at SJSU (Professor). Her students first work at SSRL (Alan Robertson, Kevin Hathaway) showed how metal (Rb and Ba) in ammonia solutions change valence from 0 (in metallic solutions) to ionic values as the dilution is increased. The dynamics of intercalation chemistry was investigated in the '80s for TaS2 exposed to N2H4 in the beam (John Reynolds, Stuart S P Parkin). Battery action was revealed by investigating the Se edge shifts in (C(graphite|Cx(H2SeO4)|Cx

363

FY2005 SSRLUO Executive Committee  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

5 Executive Committee 5 Executive Committee corner corner Environmental Sciences Graduate Student LCLS Macromolecular Crystallography Materials Chemistry SSRL Liaison Structural Molecular Biology corner corner Juana Acrivos CSU San Jose, Chemistry, 1 Washington Square, SanJose, CA 95192-0101 Juana Acrivos has done experiments at SSRL since 1978. She is a chemist at SJSU (Professor). Her students first work at SSRL (Alan Robertson, Kevin Hathaway) showed how metal (Rb and Ba) in ammonia solutions change valence from 0 (in metallic solutions) to ionic values as the dilution is increased. The dynamics of intercalation chemistry was investigated in the '80s for TaS2 exposed to N2H4 in the beam (John Reynolds, Stuart S P Parkin). Battery action was revealed by investigating the Se edge shifts in (C(graphite|Cx(H2SeO4)|Cx

364

U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let...  

Broader source: Energy.gov (indexed) [DOE]

or execute arbitrary code on the target user's system. reference LINKS: Oracle Critical Patch Updates and Security Alerts Oracle Java SE Critical Patch Update Advisory - October...

365

JC3 Bulletin Archive | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Cisco Ironport Appliances Sophos Anti-Virus Vulnerabilities. November 9, 2012 V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code Multiple...

366

V-018: Adobe Flash Player Buffer Overflows and Memory Corruption...  

Broader source: Energy.gov (indexed) [DOE]

8: Adobe Flash Player Buffer Overflows and Memory Corruption Errors Let Remote Users Execute Arbitrary Code V-018: Adobe Flash Player Buffer Overflows and Memory Corruption Errors...

367

U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated  

Broader source: Energy.gov (indexed) [DOE]

2: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated 2: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated Privileges, Inject SQL Commands, and Spoof Certificates U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated Privileges, Inject SQL Commands, and Spoof Certificates February 28, 2012 - 8:45am Addthis PROBLEM: A vulnerability was reported in PostgreSQL. PLATFORM: Version(s): prior to 8.3.18, 8.4.11, 9.0.7, 9.1.3 ABSTRACT: A remote authenticated user can gain elevated privileges. A remote authenticated user can inject SQL commands. A remote user can spoof connections in certain cases. reference LINKS: Vendor Advisory Security Tracker ID 1026744 CVE-2012-0866 IMPACT ASSESSMENT: Medium Discussion: For trigger functions marked SECURITY DEFINER, a remote authenticated user can execute a trigger function and gain elevated privileges CVE-2012-0866.

368

Budget Formulation and Execution | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Formulation and Execution Formulation and Execution Budget Formulation and Execution The Office of Budget works on the Office of Energy Efficiency and Renewable Energy (EERE) corporate budget formulation and defense, annual performance plan facilitation, quarterly program performance reporting, accountability submissions, the Program Assessment Rating Tool (PART), and related President's Management Agenda (PMA) topics. The Office produces budget funding action documents, procurement and loan guarantee procedures, annual operating plans, fund transfers to laboratories, and contractor budget data analysis. The Office leads the budgeting process through two primary functions-formulation and execution: Budget Formulation The Office of Budget facilitates corporate budget formulation through

369

2014 NCAI Executive Council Winter Session  

Office of Energy Efficiency and Renewable Energy (EERE)

The Executive Council Winter Session is a working conference where members convene for in-depthconversations about policy, legislation, and the future of Indian Country.

370

2009 Wind Technologies Market Report: Executive Summary  

SciTech Connect (OSTI)

This is the Executive Summary of the full report entitled 2009 Wind Technologies Market Report (DOE/GO-102010-3107).

Wiser, R.; Bolinger, M.

2010-08-01T23:59:59.000Z

371

Microsoft Word - CTF Executive Summary 001.doc  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Component Test Facility Test Loop Pre-Conceptual Design Executive Summary December 2008 BEA Contract No. 000 75310 Disclaimer This report was prepared as an account of work...

372

Federal Executive Institute (FEI) | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

together managers and executives from 25 to 30 Federal agencies for a unique, residential learning experience. The objective is to help agencies in the development of their career...

373

Executive Order 11988: Floodplain Management | Department of...  

Broader source: Energy.gov (indexed) [DOE]

and Wetland Environmental Review Requirements (10 CFR Parts 1021 and 1022) Executive Order 11990-Protection Of Wetlands NATIONAL DEFENSE AUTHORIZATION ACT FOR FISCAL YEAR 2000...

374

User_TalentProfile  

Broader source: Energy.gov (indexed) [DOE]

Accessing and Modifying Talent Profile Accessing and Modifying Talent Profile © 2011 SuccessFactors, Inc. - 1 - SuccessFactors Learning Confidential. All rights reserved. Job Aid: Accessing and Modifying Talent Profile Purpose The purpose of this job aid is to guide users through the step-by-step process of accessing their talent profiles, adding information to their profiles, and editing existing talent profile information. Task A. Access Talent Profile Enter the web address (URL) of the user application into your browser Address field and press the Enter key. Enter your user ID in the User ID textbox. Enter your password in the Password textbox. Click Sign In. Access Talent Profile 4 Steps Task A Add Information to Talent Profile Sections 5 Steps Task B Edit Talent Profile Sections

375

REScheck Software User's Guide  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

REScheck Software REScheck Software User's Guide Building Energy Codes Program Table Of Contents Overview ................................................................................... 1 Tutorials ................................................................................. 2 Table Columns and Rows ............................................................. 3 Rows ...................................................................................... 3 Columns ................................................................................. 5 Project Information ..................................................................... 7 Location.................................................................................. 7 Project Type (2006 IECC) ..........................................................

376

JGI Compute User Training  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

JGI Compute JGI Compute User Training Series JGI Compute User Training Series homeh1 Overview NERSC and IT staff will host a series training sessions and open office hours to introduce new services and review best practices for using the Crius cluster. All sessions are hands on, so please bring your laptop. If you are or were a user of any of the following systems, Crius, Rhea, Kronos, Theia, Oceanus or Phoebe, it will be beneficial for you to attend these training sessions. And if you plan to use JGI compute resources in the future, we also encourage you to attend. It will also be an opportunity for JGI compute users to ask questions and give NERSC and IT staff feedback on your requirements. Session 3: February 24th, 2012 1:30-5pm rm 100-101 Agenda 1:30-1:45 - Intro and presentation of the transition schedule we talked

377

Office 2007 User Workshop  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Office 2007 User Workshop Office 2007 User Workshop M. Westbrook, APS-IT June 30, 2010 Goal: Quick Start for New Office 2007 Users Introduce and highlight new Office 2007 program feature (Word, Excel and PowerPoint) Identify sources of help with Office 2007 Provide opportunity for users to share experiences Office 2007: Introduction  Format for today's presentation is that of a workshop rather than training course  Many of the new features presented here apply to multiple Office applications  Sources for more information are identified throughout the presentation  Presenter is no expert, but plans to share what has been learned thus far  Attendees are encouraged to share what you have learned for the benefit of all

378

Bevalac user's handbook  

SciTech Connect (OSTI)

This report is a users manual on the Bevalac accelerator facility. This paper discuses: general information; the Bevalac and its operation; major facilities and experimental areas; and experimental equipment.

Not Available

1990-04-01T23:59:59.000Z

379

User Manual Extended Video  

E-Print Network [OSTI]

User Manual TDS3VID Extended Video Application Module 071-0328-02 *P071032802* 071032802 #12. . . . . . . . . . . . . . . . . . . . . . . . . . . Accessing Extended Video Functions 7. . . . . . . . . . . . Extended Video Conventions 10. . . . . . . . . . . . . . . . . . . Changes to the Video Trigger Menu 11. . . . . . . . . . . . . . Changes to the Display Menu 15

Kleinfeld, David

380

International aeronautical user charges  

E-Print Network [OSTI]

Introduction: 1.1 BACKGROUND AND MOTIVATION Very few issues relating to the international air transportation industry are today as divisive as those pertaining to user charges imposed at international airports and enroute ...

Odoni, Amedeo R.

1985-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "users execute arbitrary" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

User Data Forum Presentations  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

-pcds-user-forum-data-intensive-jun14-1.pdf | pdf | 459 KB T08: ACME - Accelerated Climate Modeling For Energy June 17, 2014 | Author(s): Marcia Branstetter, Katherine Evans, John...

382

User Data Forum Presentations  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

File: T10-Joint-Facilities-User-Forum.pdf | pdf | 7 MB T08: ACME - Accelerated Climate Modeling For Energy June 17, 2014 | Author(s): Marcia Branstetter, Katherine Evans, John...

383

General User Proposals  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Proposals Print Tuesday, 01 June 2010 09:36 General Users are granted beam time through a peer review proposal process. They may use beamlines and endstations provided by the ALS...

384

User Operation Manual  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

SNS-NSSD-TOF-TD-0002 - R00 SNS-NSSD-TOF-TD-0002 - R00 1 SEQUOIA Operations Manual for Users G.E. Granroth SEQUOIA Lead Instrument Scientist A.I. Kolesnikov SEQUOIA Instrument Scientist L.M. DeBeer-Schmitt SEQUOIA Scientific Associate T.E. Sherline Sample Environment Scientist Revised - May 13, 2013 SNS-NSSD-TOF-TD-0002 - R00 2 Abstract The SEQUOIA Operations Manual for Users presents a description of the SEQUOIA spectrometer located at beamline 17 (BL17) of the Spallation Neutron Source (SNS). It is the intent of this manual to inform the user regarding the SEQUOIA spectrometer and available sample environment, to run experiments, to access and analyze the collected data, and to provide the user with other potentially useful information. The first section serves to describe the components of which the instrument is comprised.

385

VOLTTRON: User Guide  

SciTech Connect (OSTI)

This document is a user guide for the deployment of the Transactional Network platform and agent/application development within the VOLTTRON. The intent of this user guide is to provide a description of the functionality of the Transactional Network Platform. This document describes how to deploy the platform, including installation, use, guidance, and limitations. It also describes how additional features can be added to enhance its current functionality.

Lutes, Robert G.; Katipamula, Srinivas; Akyol, Bora A.; Tenney, Nathan D.; Haack, Jereme N.; Monson, Kyle E.; Carpenter, Brandon J.

2014-04-24T23:59:59.000Z

386

Microsoft PowerPoint - Executive Order13423rbl  

Broader source: Energy.gov (indexed) [DOE]

Executive Order 13423 Executive Order 13423 Executive Order 13423 Strengthening Federal Strengthening Federal Environmental, Energy and Environmental, Energy and Transportation Management Transportation Management 2 2 Executive Order 13423 Replaces the Executive Order 13423 Replaces the Greening the Government Series of Greening the Government Series of Executive Orders Executive Orders 13101 Recovered Materials 13101 Recovered Materials 13123 Energy Efficiency 13123 Energy Efficiency 13148 Environment 13148 Environment 13149 Transportation 13149 Transportation BUT BUT 13221 Standby Power was retained 13221 Standby Power was retained 3 3 Two Parts Involved Two Parts Involved Executive Order Executive Order States Policy States Policy Establishes Goals Establishes Goals Assigns Responsibilities for Agencies, CEQ, Assigns Responsibilities for Agencies, CEQ,

387

Teleportation of arbitrary $n$-qudit state with multipartite entanglement  

E-Print Network [OSTI]

We propose a protocol ${\\cal D}_n$ for faithfully teleporting an arbitrary $n$-qudit state with the tensor product state (TPS) of $n$ generalized Bell states (GBSs) as the quantum channel. We also put forward explicit protocol ${\\cal D}'_n$ and ${\\cal D}''_n$ for faithfully teleporting an arbitrary $n$-qudit state with two classes of $2n$-qudit GESs as the quantum channel, where the GESs are a kind of genuine entangled states we construct and can not be reducible to the TPS of $n$ GBSs.

Zhan-jun Zhang

2006-11-30T23:59:59.000Z

388

Hypersonic Arbitrary-Body Aerodynamics (HABA) for conceptual design  

SciTech Connect (OSTI)

The Hypersonic Arbitrary-Body Aerodynamics (HABA) computer program predicts static and dynamic aerodynamic derivatives at hypersonic speeds for any vehicle geometry. It is intended to be used during conceptual design studies where fast computational speed is required. It uses the same geometry and hypersonic aerodynamic methods as the Mark IV Supersonic/Hypersonic Arbitrary-Body Program (SHABP) developed under sponsorship of the Air Force Flight Dynamics Laboratory; however, the input and output formats have been improved to make it easier to use. This program is available as part of the Department 9140 CAE software.

Salguero, D.E.

1990-03-15T23:59:59.000Z

389

Testing the Results of Static Worst-Case Execution-Time Analysis P. Puschner and R. Nossaly  

E-Print Network [OSTI]

Testing the Results of Static Worst-Case Execution-Time Analysis P. Puschner and R. Nossaly provided by the user. This pa- per presents a method for testing the results of static WCET analysis. The proposed test method is a black- box test method that uses a genetic algorithm (GA) for test

390

EXECUTIVE OFFICE OF THE PRESIDENT  

Broader source: Energy.gov (indexed) [DOE]

EXECUTIVE OFFICE OF THE PRESIDENT COUNCIL ON ENVIRONMENTAL QUALITY 722 JACKSON PLACE, N. W. WASHINGTON, D. C. April 30, 1981 MEMORANDUM FOR GENERAL COUNSELS, NEPA LIAISONS AND PARTICIPANTS IN SCOPING SUBJECT: Scoping Guidance As part of its continuing oversight of the implementation of the NEPA regulations, the Council on Environmental Quality has been investigating agency experience with scoping. This is the process by which the scope of the issues and alternatives to be examined in an EIS is determined. In a project led by Barbara Bramble of the General Counsel's staff the Council asked federal agencies to report their scoping experiences; Council staff held meetings and workshops in all regions of the country to discuss scoping practice; and a contract study was performed for the Council to investigate what techniques work best for

391

1.0EXECUTIVE SUMMARY  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

ARC-TR-03-0002 ARC-TR-03-0002 Electrochemical Noise Sensors for Detection of Localized and General Corrosion of Natural Gas Transmission Pipelines Final Report for the Period July 2001 - October 2002 December 2002 Sophie J. Bullard, Bernard S. Covino, Jr., James H. Russell, Gordon R. Holcomb, Stephen D. Cramer, and Margaret Ziomek-Moroz Albany Research Center U.S. Department of Energy Albany, OR PREPARED FOR THE UNITED STATES DEPARTMENT OF ENERGY, NATIONAL ENERGY TECHNOLOGY LABORATORY. Work Performed Under Work Package Number FE-01-06 This page left intentionally blank. 2 Electrochemical Noise Sensors for Detection of Localized and General Corrosion of Natural Gas Transmission Pipelines TABLE OF CONTENTS 1.0 EXECUTIVE SUMMARY

392

Advanced Fuels Campaign Execution Plan  

SciTech Connect (OSTI)

The purpose of the Advanced Fuels Campaign (AFC) Execution Plan is to communicate the structure and management of research, development, and demonstration (RD&D) activities within the Fuel Cycle Research and Development (FCRD) program. Included in this document is an overview of the FCRD program, a description of the difference between revolutionary and evolutionary approaches to nuclear fuel development, the meaning of science-based development of nuclear fuels, and the 'Grand Challenge' for the AFC that would, if achieved, provide a transformational technology to the nuclear industry in the form of a high performance, high reliability nuclear fuel system. The activities that will be conducted by the AFC to achieve success towards this grand challenge are described and the goals and milestones over the next 20 to 40 year period of research and development are established.

Kemal Pasamehmetoglu

2011-09-01T23:59:59.000Z

393

Carlsbad Area Office Executive Summary  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

June 1998 June 1998 Carlsbad Area Office Executive Summary The mission of the Carlsbad Area Office (CAO) is to protect human health and the environment by opening and operating the Waste Isolation Pilot Plant (WIPP) for safe disposal of transuranic (TRU) waste and by establishing an effective system for management of TRU waste from generation to disposal. It includes personnel assigned to CAO, WIPP site operations, transportation, and other activities associated with the National TRU Program (NTP). The CAO develops and directs implementation of the TRU waste program, and assesses compliance with the program guidance, as well as the commonality of activities and assumptions among all TRU waste sites. A cornerstone of the Department of Energy's (DOE) national cleanup strategy, WIPP is

394

Recycled Materials Affirmative Procurement Tracking System (RMAPTS). Software user`s manual  

SciTech Connect (OSTI)

RMAPTS is designed to interact with other computer systems. This system can upload or download data from other RMAPTS systems. RMAPTS also complies with Federal Acquisition Regulations (FARs). Section 6002 of the Resource Conservation of Recovery Act (RCRA), Title 40 Part 247-25 of the Code of Federal Regulations, and Executive Order 12780 present mandates and guidelines to the Department of Energy (DOE) and its contractors for the procurement of products containing recycled materials. These regulations promote cost-effective waste reduction and recovery of reusable materials from Federally generated waste; promote environmentally sound and economically efficient waste reduction and recycling of the nation`s resources; and stimulate private sector markets through preferential procurement of designated items. On August 4, 1992, the Deputy Secretary of the Department of Energy requested DOE to show its commitment to Executive Order 12780, Federal Agency Recycling and Procurement Policy. This software was developed in response to this request. RMAPTS will allow users to track and report specific data concerning the procurement of products that contain recycled material and the quantity of recycled material contained in each product. This system provides greater detail, improved accuracy, and less time spent on year-end reporting. Users can quickly check the year-to-date status of recycled material purchases and recycled material contents of products at any time.

Not Available

1994-07-01T23:59:59.000Z

395

LANSCE | Lujan Center | Industrial Users  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Industrial Users The Lujan Neutron Scattering Center offers a diverse set of capabilities and instruments for industrial projects. Industrial users are invited to contact the Lujan...

396

2002 Fusion Summer Study Executive Summary  

E-Print Network [OSTI]

2002 Fusion Summer Study Executive Summary 31 July 2002 #12;page 2 of 15 2002 Fusion Summer Study Executive Summary The 2002 Fusion Summer Study was conducted from July 8-19, 2002, in Snowmass, CO, and carried out a critical assessment of major next-steps in the fusion energy sciences program in both

397

Executive Fleet Vehicles Report | Department of Energy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Executive Fleet Vehicles Report Executive Fleet Vehicles Report Executive Fleet Vehicles Report On May 24, 2011, the President issued a Presidential Memorandum on Federal Fleet Performance. In accordance with Section 1 (b) of the Presidential Memorandum and pursuant to Federal Management Regulation 102-34.50 (41 CFR 102-34.50), executive fleets are required to achieve maximum fuel efficiency; be limited in motor vehicle body size, engine size, and optional equipment to what is essential to meet agency mission; and be midsize or smaller sedans, except where larger sedans are essential to the agency mission. Executive fleet vehicles that are larger than midsize sedans or are not AFVs must be disclosed on the website of the agency operating the vehicles within 180 days of the date of the memorandum (on or before November 17,

398

Sample Project Execution Plan | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Sample Project Execution Plan Sample Project Execution Plan Sample Project Execution Plan The project execution plan (PEP) is the governing document that establishes the means to execute, monitor, and control projects. The plan serves as the main communication vehicle to ensure that everyone is aware and knowledgeable of project objectives and how they will be accomplished. The plan is the primary agreement between Headquarters and the federal project director and a preliminary plan should be developed and approved at Critical Decision-1. Project objectives are derived from the mission needs statement, and an integrated project team assists in development of the PEP. The plan is a living document and should be updated to describe current and future processes and procedures, such as integrating safety

399

Executive Potential Program (EPP) | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Executive Potential Program (EPP) Executive Potential Program (EPP) Executive Potential Program (EPP) January 10, 2014 (All day) Application Procedure: Nomination packages for EPP-2015-1 and EPP 2015-DC, must be received by deadline dates of January 10, 2014 and April 8, 2014 respectively, and must include the following: -The completed Executive Potential Program Application that includes information about the applicant, the applicant's immediate supervisor, and the DOE program coordinator, Johnny McChriston. - A statement from the applicant indicating the purpose for applying and how participation in the Executive Potential Program will support the applicant's career goals. -The applicant's current resume, signed and dated by the applicant - Payment must accompany the application before it will be processed.

400

User Charter Rights and Responsibilities of Neutron Sciences Users  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

-G01182/gim -G01182/gim User Charter Rights and Responsibilities of Neutron Sciences Users Rights of Users: * Be treated with respect and courtesy. * Have details of experiment proposals kept confidential. * Have consultations with instrument staff before proposal submission, during experiment planning, and while evaluating results and analyzing data. * Receive beam time on the basis of external peer evaluation of submitted proposals. Users can

Note: This page contains sample records for the topic "users execute arbitrary" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Quantum Mechanics of Successive Measurements with Arbitrary Meter Coupling  

E-Print Network [OSTI]

We study successive measurements of two observables using von Neumann's measurement model. The two-pointer correlation for arbitrary coupling strength allows retrieving the initial system state. We recover Luders rule, the Wigner formula and the Kirkwood-Dirac distribution in the appropriate limits of the coupling strength.

Lars M. Johansen; Pier A. Mello

2009-01-21T23:59:59.000Z

402

Computationally Efficient Winding Loss Calculation with Multiple Windings, Arbitrary  

E-Print Network [OSTI]

windings occurs at the level of individual turns, the method could be applied, but its advantages are lessComputationally Efficient Winding Loss Calculation with Multiple Windings, Arbitrary Waveforms and Two- or Three-Dimensional Field Geometry C. R. Sullivan From IEEE Transactions on Power Electronics

403

Nested Lattice Codes for Arbitrary Continuous Sources and Channels  

E-Print Network [OSTI]

Nested Lattice Codes for Arbitrary Continuous Sources and Channels Aria G. Sahebi and S. Sandeep 48109, USA. Email: ariaghs@umich.edu, pradhanv@umich.edu Abstract--In this paper, we show that nested information at the transmitter. We also show that nested lattice codes are optimal for source coding

Pradhan, Sandeep

404

Monitoring the execution of temporal plans for robotic systems  

E-Print Network [OSTI]

To achieve robustness in dynamic and uncertain environments, robotic systems must monitor the progress of their plans during execution. This thesis develops a plan executive called Pike that is capable of executing and ...

Levine, Steven James

2012-01-01T23:59:59.000Z

405

Monitoring the Execution of Temporal Plans for Robotic Systems  

E-Print Network [OSTI]

To achieve robustness in dynamic and uncertain environments, robotic systems must monitor the progress of their plans during execution. This thesis develops a plan executive called Pike that is capable of executing and ...

Levine, Steven J.

2012-10-04T23:59:59.000Z

406

V-058: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets  

Broader source: Energy.gov (indexed) [DOE]

8: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw 8: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code V-058: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code December 31, 2012 - 6:58am Addthis PROBLEM: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Version(s): 6, 7, 8 ABSTRACT: A vulnerability was reported in Microsoft Internet Explorer. A remote user can cause arbitrary code to be executed on the target user's system. REFERENCE LINKS: SecurityTracker Alert ID: 1027930 Secunia Advisory SA51695 CVE-2012-4792 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary

407

User_RunReports  

Broader source: Energy.gov (indexed) [DOE]

Running Standard Reports Running Standard Reports © 2011 SuccessFactors, Inc. - 1 - SuccessFactors Learning Confidential. All rights reserved. Job Aid: Running Standard Reports Purpose The purpose of this job aid is to guide users through the step-by-step process of running standard reports in SuccessFactors Learning. Task A. Run Standard Report From the Home page, click the Reports easy link. In the Report Name table, locate the report you want to generate. Click the expand icon ( ) to expand the report group. Click the title link. For this example, select the User Curriculum Status Group by Item Details report. Note: Click Help ( ) for additional information on reports. 1 1 2 2 3 3 Run Standard Report 13 Steps Task A SuccessFactors Learning v 6.4 User Job Aid

408

General User Proposal Scores  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

General User Proposal Scores General User Proposal Scores General User Proposal Scores Print Tuesday, 01 June 2010 10:34 Scoring Proposals are scored on a scale of 1 to 5, with 1 being the best score and 5 the worst. Reviewers are requested to use the following ranking schema: Must do High Priority Medium Priority Low priority Don't do Beam time is assigned based on each proposal's score in relation to all other proposals for a given beamline. For beamlines where beamtime requests exceed available beamtime, a cutoff score is assigned after which no beam time is allocated. proposal scores Beam Time Cutoff Scores for the Current Cycle The table below lists the percent of beam time shifts allocated/requested for each beamline, and the cutoff scores, below which no beam time was assigned.

409

User Electrical Inspection Criteria  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

User Electronic and Electrical Equipment Inspection Criteria User Electronic and Electrical Equipment Inspection Criteria Any electrical or electronic equipment users bring to the APS will have to be inspected. In some cases, this inspection will be quite simple, e.g., if the equipment has already been inspected by a Nationally Recognized Testing Laboratory (NRTL) and is used for its designed purpose. Other equipment will require a more thorough inspection (this may include NRTL inspected equipment if it is assembled into an apparatus with other components). The inspection is based on an eight-part list of criteria. Paraphrased, those criteria are: The equipment must be suitable for its intended use (and if appropriate, installation). For example, a heater controller intended to control a 1000W heater cannot be used to control a 2000W heater. The

410

Science Accelerator : User Login  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Login Login The Science Accelerator ALERTS feature will automatically update you regarding newly available information in your specific area(s) of interest. Simply register for the service, then create a search strategy which will be run against information added to . Select a schedule (weekly, monthly, etc.) for receiving the email Alerts. If you are a new patron, Register to learn how to set up Alerts to meet your needs. If you are an existing patron, enter your user name and password in the boxes to login. Once logged in, you may review or modify your search, add a new search and see recent Alerts results. User Name: Password: Remember Me Remember me on this computer. Login Don't have a user name? Register! Forgot your password? Reset your password Alerts The Alerts function allows you to monitor a topic and receive timely

411

Fermilab Users' Meeting, 2007  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

6-7, 2007 6-7, 2007 The annual gathering of the Fermilab Users Organization will be held on June 6-7, 2007. This meeting is an opportunity for discussion of new physics results from the laboratory's experimental program, future initiatives at the lab, and thoughtful presentations from leaders of the scientific policy community. Topics to be covered at the Users Meeting include: Collider Physics Astro-particle Physics Neutrino Physics Future Plans This year, both an Outreach Workshop and a Grad Students' Meeting / Career Night (sponsored by the GSA) will be held in association with the Users Meeting on June 5. Watch this page for links to more information on those associated meetings as they become available. Registration Reserve Tickets (for the public lecture by Dr. George Smoot)

412

User Science Images  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

User Science Images User Science Images User Science Images Sort by: Default | Name | Date (low-high) | Date (high-low) | Category NIMROD-1.png FES: NIMROD Simulation February 18, 2010 | Author(s): Dr. Charlson C. Kim (University of Washington) | Category: Fusion Energy | URL: https://nimrodteam.org/ Download Image: NIMROD-1.png | png | 1.5 MB Trajectory of an energetic ion in a Field Reverse Configuration (FRC) magnetic field. Magnetic separatrix denoted by green surface. Spheres are colored by azimuthal velocity. Image courtesy of Charlson Kim, University of Washington; NERSC repos m487, mp21, m1552 Scheibe.png BER: Pore-Scale Fluid Flow for Subsurface Reactive Transport January 1, 2008 | Author(s): Timothy D. Scheibe, PNNL | Category: Environmental Science | URL: http://http://subsurface.pnl.gov/

413

SOAJ Search : User Login  

Office of Scientific and Technical Information (OSTI)

Login Login The SOAJ Search ALERTS feature will automatically update you regarding newly available information in your specific area(s) of interest. Simply register for the service, then create a search strategy which will be run against information added to . Select a schedule (weekly, monthly, etc.) for receiving the email Alerts. If you are a new patron, Register to learn how to set up Alerts to meet your needs. If you are an existing patron, enter your user name and password in the boxes to login. Once logged in, you may review or modify your search, add a new search and see recent Alerts results. User Name: Password: Remember Me Remember me on this computer. Login Don't have a user name? Register! Forgot your password? Reset your password Alerts The Alerts function allows you to monitor a topic and receive timely

414

T-613: Microsoft Excel Axis Properties Remote Code Execution...  

Broader source: Energy.gov (indexed) [DOE]

3: Microsoft Excel Axis Properties Remote Code Execution Vulnerability T-613: Microsoft Excel Axis Properties Remote Code Execution Vulnerability May 2, 2011 - 7:42am Addthis...

415

POLICY FLASH 2014-12 Executive Compensation Cap | Department...  

Energy Savers [EERE]

2 Executive Compensation Cap POLICY FLASH 2014-12 Executive Compensation Cap Questions concerning this policy flash should be directed to Carol Jenkins, of the Office of...

416

President Obama Announces Commitments and Executive Actions to...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Obama Announces Commitments and Executive Actions to Advance Solar Deployment and Energy Efficiency President Obama Announces Commitments and Executive Actions to Advance Solar...

417

A Review of the Department of Energy's Implementation of Executive...  

Broader source: Energy.gov (indexed) [DOE]

of Executive Order 12898 and Recommendations for a Second Five-Year Strategic Plan A Review of the Department of Energy's Implementation of Executive Order 12898 and...

418

Executive Order -- Preparing the United States for the Impacts...  

Broader source: Energy.gov (indexed) [DOE]

Executive Order -- Preparing the United States for the Impacts of Climate Change Executive Order -- Preparing the United States for the Impacts of Climate Change...

419

President Issues Executive Order Aimed at Preparing for the Impacts...  

Broader source: Energy.gov (indexed) [DOE]

President Issues Executive Order Aimed at Preparing for the Impacts of Climate Change; Tribal Leaders to Serve on Task Force President Issues Executive Order Aimed at Preparing for...

420

Renewable Energy Requirement Guidance for EPAct 2005 and Executive...  

Energy Savers [EERE]

Renewable Energy Requirement Guidance for EPAct 2005 and Executive Order 13423 Renewable Energy Requirement Guidance for EPAct 2005 and Executive Order 13423 Guidance specifies...

Note: This page contains sample records for the topic "users execute arbitrary" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

OVERVIEW OF EXECUTIVE ORDER 13XXX Federal Leadership in Environmental...  

Office of Environmental Management (EM)

OVERVIEW OF EXECUTIVE ORDER 13XXX Federal Leadership in Environmental, Energy and Economic Performance OVERVIEW OF EXECUTIVE ORDER 13XXX Federal Leadership in Environmental, Energy...

422

SPACE UTILIZATION STUDY -EXECUTIVE SUMMARY SCHOOL OF MEDICINE & HEALTH SCIENCES  

E-Print Network [OSTI]

SPACE UTILIZATION STUDY - EXECUTIVE SUMMARY SCHOOL OF MEDICINE & HEALTH SCIENCES UNIVERSITY School of Medicine & Health Sciences - Space Utilization Study Grand Forks, ND EXECUTIVE SUMMARY SUITAb utilities. · Lackofnaturallight

Delene, David J.

423

Richard Lazarus Named as Executive Director of National Commission...  

Energy Savers [EERE]

Lazarus Named as Executive Director of National Commission on the BP Deepwater Horizon Oil Spill and Offshore Drilling Richard Lazarus Named as Executive Director of National...

424

Department of Energy and Commercial Real Estate Executives Launch...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Commercial Real Estate Executives Launch Alliance to Reduce Energy Consumption of Buildings Department of Energy and Commercial Real Estate Executives Launch Alliance to Reduce...

425

APS User News, Issue 73  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

3, September 15, 2011 3, September 15, 2011 CONTENTS DIRECTOR'S CORNER USER MATTERS -- Tweet Time! APS Beamlines Now Tweet Operational Status Info -- Changes to User Electrical Safety Training Requirements -- Groundbreaking for the New Advanced Protein Crystallization Facility -- Meg Vigliocco-Hagen, APS General User Program Administrator, Retires! -- Meet Beverly Knott, New APS Beam Time Access Administrator -- Safety Snippets: Practice Good Housekeeping BRIEFLY NOTED -- 4th Annual Postdoctoral Research Symposium: Registration Deadline September 21 -- 2011 Advanced Light Source Users' Meeting, October 3-5, 2011 -- 2011 SSRL/LCLS Annual Users' Meeting & Workshops, October 22-26, 2011 -- General Users Proposals Now Being Accepted -- Changes to User Training Course Requirements

426

2002 NERSC User Survey Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

2 User Survey Results 2 User Survey Results Show All | 1 2 3 4 5 ... 11 | Next » 2002 User Survey Results Table of Contents Response Summary User Information Overall Satisfaction and Importance All Satisfaction Questions and Changes from Previous Years Visualization and Grid Computing Web, NIM, and Communications Hardware Resources Software Training User Services Comments about NERSC Response Summary Many thanks to the 300 users who responded to this year's User Survey -- this represents the highest response level in the five years we have conducted the survey. The respondents represent all five DOE Science Offices and a variety of home institutions: see User Information. You can see the FY 2002 User Survey text, in which users rated us on a 7-point satisfaction scale. Some areas were also rated on a 3-point

427

Intrusion Recovery Using Selective Re-execution  

E-Print Network [OSTI]

RETRO repairs a desktop or server after an adversary compromises it, by undoing the adversary's changes while preserving legitimate user actions, with minimal user involvement. During normal operation, RETRO records an ...

Kim, Taesoo

428

Account Executive Account Manager of Sales  

E-Print Network [OSTI]

Aerospace Engineer Air Quality Engineer Analyst Analyst/Consultant Applications Engineer ASIC VerificationAccount Executive Account Manager of Sales Administrative Assistant Advanced Systems Engineer Engineer Assistant Administrator Assistant Analyst Assistant Development Engineer Assistant Director

429

Project Execution Plan Review Module (RM)  

Broader source: Energy.gov [DOE]

The Project Execution Plan (PEP) Review Module (RM) is a tool that assists DOE federal project review teams in evaluating the adequacy of the PEP development and maintenance for projects of any...

430

Stateless and stateful implementations of faithful execution  

DOE Patents [OSTI]

A faithful execution system includes system memory, a target processor, and protection engine. The system memory stores a ciphertext including value fields and integrity fields. The value fields each include an encrypted executable instruction and the integrity fields each include an encrypted integrity value for determining whether a corresponding one of the value fields has been modified. The target processor executes plaintext instructions decoded from the ciphertext while the protection engine is coupled between the system memory and the target processor. The protection engine includes logic to retrieve the ciphertext from the system memory, decrypt the value fields into the plaintext instructions, perform an integrity check based on the integrity fields to determine whether any of the corresponding value fields have been modified, and provide the plaintext instructions to the target processor for execution.

Pierson, Lyndon G; Witzke, Edward L; Tarman, Thomas D; Robertson, Perry J; Eldridge, John M; Campbell, Philip L

2014-12-16T23:59:59.000Z

431

The Ethics of Hedging by Executives  

Science Journals Connector (OSTI)

These studies include: Bolster et al. (1996...), who discuss the use of equity swaps; Bettis et al. (2001) provide empirical evidence of the use of equity collars by executives; OBrian (1997...) outlines the use...

Lee M. Dunham; Ken Washer

2012-12-01T23:59:59.000Z

432

Senior Executive Fellows | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Overview: The Senior Executive Fellows program is designed for upper-level Overview: The Senior Executive Fellows program is designed for upper-level managers. The curriculum incorporates the executive core qualifications (ECQs) for SES and it is the program of choice for participants in SES Candidate Development Programs and other professionals looking to strengthen skills in problem solving, strategic analysis, persuasion and negotiation. Target Audience: The program focuses on skills associated with the Office of Personnel Management's (OPM) executive core qualifications (ECQs) and is designed for federal government employees at the GS-14/GS-15 levels. Program Cost: Is $19,800 and includes tuition, housing, curricular materials, and most meals. Program Session(s) and Application Deadline(s): Session Date: February 9, 2014 - March 7, 2014, Application

433

Analytically solvable geometric network growth model with arbitrary degree distribution  

E-Print Network [OSTI]

We construct a class of network growth models capable of producing arbitrary degree distributions. The conditions necessary for generating the desired degree distribution can be derived analytically. In this model, a network is generated as a result of local interactions among agents residing on a metric space. Specifically, we study the case of random-walking agents who form bonds when they meet at designated locations we refer to as "rendezvous points." The spatial distribution of the rendezvous points determines key characteristics of the network such as the degree distribution. For any arbitrary (monotonic) degree distribution, we are able to analytically solve for the required rendezvous point distribution. Certain features of the model including high clustering coefficients suggest that it may be a suitable candidate for modeling biological and urban networks.

Dianati, Navid

2015-01-01T23:59:59.000Z

434

Arbitrary mass Majorana neutrinos in neutrinoless double beta decay  

Science Journals Connector (OSTI)

We revisit the mechanism of neutrinoless double beta (0???) decay mediated by the exchange with the heavy Majorana neutrino N of arbitrary mass mN, slightly mixed ?UeN with the electron neutrino ?e. By assuming the dominance of this mechanism, we update the well-known 0???-decay exclusion plot in the mN?UeN plane taking into account recent progress in the calculation of nuclear matrix elements within quasiparticle random phase approximation and improved experimental bounds on the 0???-decay half-life of Ge76 and Xe136. We also consider the known formula approximating the mN dependence of the 0???-decay nuclear matrix element in a simple explicit form. We analyze its accuracy and specify the corresponding parameters, allowing one to easily calculate the 0???-decay half-life for arbitrary mN for all the experimentally interesting isotopes without resorting to real nuclear structure calculations.

Amand Faessler; Marcela Gonzlez; Sergey Kovalenko; Fedor imkovic

2014-11-21T23:59:59.000Z

435

Arbitrary mass Majorana neutrinos in neutrinoless double beta decay  

E-Print Network [OSTI]

We revisit the mechanism of neutrinoless double beta (NLDBD) decay mediated by the exchange with the heavy Majorana neutrino N of arbitrary mass mN, slightly mixed with the electron neutrino. By assuming the dominance of this mechanism, we update the well-known NLDBD-decay exclusion plot in the mass-mixing angle plane taking into account recent progress in the calculation of nuclear matrix elements within quasiparticle random phase approximation and improved experimental bounds on the NLDBD-decay half-life of Ge-76 and Xe-136. We also consider the known formula approximating the mN dependence of the NLDBD-decay nuclear matrix element in a simple explicit form. We analyze its accuracy and specify the corresponding parameters, allowing one to easily calculate the NLDBD-decay half-life for arbitrary mN for all the experimentally interesting isotopes without resorting to real nuclear structure calculations.

Amand Faessler; Marcela Gonzalez; Sergey Kovalenko; Fedor Simkovic

2014-08-26T23:59:59.000Z

436

U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users  

Broader source: Energy.gov (indexed) [DOE]

9: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain 9: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication May 1, 2012 - 7:00am Addthis PROBLEM: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication PLATFORM: Red Hat Enterprise MRG v2 for Red Hat Enterprise Linux (version 6) ABSTRACT: A vulnerability was reported in Red Hat Enterprise MRG Messaging. A remote user can access cluster messages and view the internal configuration. reference LINKS: SecurityTracker Alert ID: 1026990 CVE-2011-3620 Red Hat advisory IMPACT ASSESSMENT: High Discussion: Qpid may accept arbitrary passwords and SASL mechanims. A remote user on the local private interconnect network with knowledge of a valid cluster

437

ON THE ONE-DIMENSIONAL ISING MODEL WITH ARBITRARY SPIN (*)  

E-Print Network [OSTI]

ON THE ONE-DIMENSIONAL ISING MODEL WITH ARBITRARY SPIN (*) R. L. BOWDEN and D. M. KAPLAN Department classique de spin développé dans un autre article, une nouvelle méthode pour résoudre un modèle d'Ising de corréla- tion de paires et la susceptibilité pour champ nul pour le modèle d'Ising unidimensionnel

Boyer, Edmond

438

Security of quantum key distribution with arbitrary individual imperfections  

SciTech Connect (OSTI)

We consider the security of the Bennett-Brassard 1984 protocol for quantum key distribution, with arbitrary individual imperfections simultaneously in the source and detectors. We provide the secure key generation rate and show that three parameters must be bounded to ensure security; the basis dependence of the source, a detector-blinding parameter, and a detector leakage parameter. The system may otherwise be completely uncharacterized and contain large losses.

Maroey, Oystein; Lydersen, Lars; Skaar, Johannes [Department of Electronics and Telecommunications, Norwegian University of Science and Technology, NO-7491 Trondheim, Norway and University Graduate Center, NO-2027 Kjeller (Norway)

2010-09-15T23:59:59.000Z

439

Dynamical density functional theory for colloidal particles with arbitrary shape  

E-Print Network [OSTI]

Starting from the many-particle Smoluchowski equation, we derive dynamical density functional theory for Brownian particles with an arbitrary shape. Both passive and active (self-propelled) particles are considered. The resulting theory constitutes a microscopic framework to explore the collective dynamical behavior of biaxial particles in nonequilibrium. For spherical and uniaxial particles, earlier derived dynamical density functional theories are recovered as special cases. Our study is motivated by recent experimental progress in preparing colloidal particles with many different biaxial shapes.

Raphael Wittkowski; Hartmut Lwen

2011-06-12T23:59:59.000Z

440

A compact, multichannel, and low noise arbitrary waveform generator  

SciTech Connect (OSTI)

A new type of high functionality, fast, compact, and easy programmable arbitrary waveform generator for low noise physical measurements is presented. The generator provides 7 fast differential waveform channels with a maximum bandwidth up to 200 MHz frequency. There are 6 fast pulse generators on the generator board with 78 ps time resolution in both duration and delay, 3 of them with amplitude control. The arbitrary waveform generator is additionally equipped with two auxiliary slow 16 bit analog-to-digital converters and four 16 bit digital-to-analog converters for low frequency applications. Electromagnetic shields are introduced to the power supply, digital, and analog compartments and with a proper filter design perform more than 110 dB digital noise isolation to the output signals. All the output channels of the board have 50 ? SubMiniature version A termination. The generator board is suitable for use as a part of a high sensitive physical equipment, e.g., fast read out and manipulation of nuclear magnetic resonance or superconducting quantum systems and any other application, which requires electromagnetic interference free fast pulse and arbitrary waveform generation.

Govorkov, S. [Sema Systems, 302-5553 16th ave., Delta, British Columbia V4M 2H7 (Canada)] [Sema Systems, 302-5553 16th ave., Delta, British Columbia V4M 2H7 (Canada); Ivanov, B. I. [Leibniz-Institute of Photonic Technology, PO Box 100239, D-07702 Jena (Germany) [Leibniz-Institute of Photonic Technology, PO Box 100239, D-07702 Jena (Germany); Novosibirsk State Technical University, K.Marx-Ave. 20, Novosibirsk 630092 (Russian Federation); Il'ichev, E.; Meyer, H.-G. [Leibniz-Institute of Photonic Technology, PO Box 100239, D-07702 Jena (Germany)] [Leibniz-Institute of Photonic Technology, PO Box 100239, D-07702 Jena (Germany)

2014-05-15T23:59:59.000Z

Note: This page contains sample records for the topic "users execute arbitrary" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Small Business Customized Excerpts from the Users Guide  

Office of Energy Efficiency and Renewable Energy (EERE)

Small Business Customized Excerpts from the Users Guide, to assist in the process for applying to the Small Business Innovation Research (SBIR) program of the U.S. Department of Energy.

442

NERSC User Group Meeting  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

NERSC User Group Meeting NERSC User Group Meeting Oct 18, 2010 Outline * About OpenMP * Parallel Regions * Worksharing Constructs * Synchronization * Data Scope * Tasks * Using OpenMP at NERSC 2 3 Common Architectures * Shared Memory Architecture - Multiple CPUs share global memory, could have local cache - Uniform Memory Access (UMA) - Typical Shared Memory Programming Model: OpenMP, Pthreads, ... * Distributed Memory Architecture - Each CPU has own memory - Non-Uniform Memory Access (NUMA) - Typical Message Passing Programming Model: MPI, ... * Hybrid Architecture - UMA within one SMP node - NUMA across nodes - Typical Hybrid Programming Model: mixed MPI/OpenMP, ... What is OpenMP * OpenMP is an industry standard API of C/C++ and Fortran for shared memory parallel programming.

443

User_Sup_Registration  

Broader source: Energy.gov (indexed) [DOE]

Registration (Supervisor) Registration (Supervisor) © 2011 SuccessFactors, Inc. - 1 - SuccessFactors Learning Confidential. All rights reserved. Job Aid: Registration (Supervisor) Purpose The purpose of this job aid is to guide supervisor users through the step-by-step process of managing the registration of employees into scheduled offerings within SuccessFactors Learning. Task A. Register Employees in a Scheduled Offering From the Home page, click the My Employees tab. Click the Register/Withdraw Employees Supervisor Link. View Employee's Registrations 3 Steps Task C Withdraw Employees from a Scheduled Offering - 14 Steps Task B Register Employees in a Scheduled Offering - 17 Steps Task A 1 1 2 2 SuccessFactors Learning v 6.4 User Job Aid Registration (Supervisor)

444

NERSC User Environment  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Environment Environment NERSC User Environment Home Directories, Shells and Startup Files All NERSC systems (except PDSF) use global home directories, which are are pre-populated with startup files (also known as dot files) for all available shells. NERSC fully supports bash, csh, and tcsh as login shells. Other shells (ksh, sh, and zsh) are also available. The default shell at NERSC is csh. Changing Your Default Login Shell Use the NERSC Information management (NIM) portal if you want to to change your default login shell. To do this, select Change Shell from the NIM Actions pull-down menu. Managing Your Startup Files The "standard" dot-files are symbolic links to read-only files that NERSC controls. For each standard dot-file, there is a user-writable ".ext" file.

445

User Facility Science Highlights  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

user-facilities/highlights/ The Office of Science user-facilities/highlights/ The Office of Science is the single largest supporter of basic research in the physical sciences in the United States, providing more than 40 percent of total funding for this vital area of national importance. It oversees - and is the principal federal funding agency of - the Nation's research programs in high-energy physics, nuclear physics, and fusion energy sciences. en {611EDD39-818D-4CBA-BFD7-9568495C1566}http://science.energy.gov/bes/highlights/2013/bes-2013-09-a/ The Role of Stripes in Superconducting Behavior Using neutron diffraction, movement of charged atoms arranged as "stripes"

446

User_Sup_Overview  

Broader source: Energy.gov (indexed) [DOE]

Employees (Supervisors) Employees (Supervisors) © 2011 SuccessFactors, Inc. - 1 - SuccessFactors Learning Confidential. All rights reserved. Job Aid: Managing Employees (Supervisors) Purpose The purpose of this job aid is to guide supervisor users through the step-by-step process of managing employees within SuccessFactors Learning. Task A. Open and View a Employee's Record From the Home page, select the My Employees tab. 1 1 Run Reports 5 Steps Task C Approve or Deny Training Requests 9 Steps Task B Open and View an Employee's Record 5 Steps Task A SuccessFactors Learning v 6.4 User Job Aid Managing Employees (Supervisors) © 2011 SuccessFactors, Inc. - 2 - SuccessFactors Learning Confidential. All rights reserved. The My Employees section is designed to

447

User_LaunchSurvey  

Broader source: Energy.gov (indexed) [DOE]

and Completing Assigned Survey and Completing Assigned Survey © 2011 SuccessFactors, Inc. - 1 - SuccessFactors Learning Confidential. All rights reserved. Job Aid: Launching and Completing Assigned Survey Purpose The purpose of this job aid is to guide users through the step-by-step process of launching and completing assigned surveys. Task A. Launch and Complete Assigned Survey From the Home page, filter the To-Do List to show only Surveys. Hover over the course evaluation title. Click Open. 1 2 3 3 2 1 Launch and Complete Assigned Survey 6 Steps Task A SuccessFactors Learning v 6.4 User Job Aid Launching and Completing Assigned Survey © 2011 SuccessFactors, Inc. - 2 - SuccessFactors Learning Complete the survey by selecting the radio button for the appropriate rating

448

User_LaunchOnline  

Broader source: Energy.gov (indexed) [DOE]

Online Content Online Content © 2011 SuccessFactors, Inc. - 1 - SuccessFactors Learning Confidential. All rights reserved. Job Aid: Launching Online Content Purpose The purpose of this job aid is to guide users through the step-by-step process of identifying and launching online content. Task A. Identify Online Content From the Home page, filter the To-Do List to show Online Courses only. The online icon ( ) in the Type column indicates the content type. 2 1 Launch Online Content 5 Steps Task B Identify Online Content 2 Steps Task A 1 2 SuccessFactors Learning v 6.4 User Job Aid Launching Online Content Task B. Launch Online Content From the To-Do List, hover over the title of the item you wish to launch and then click Go to Content.

449

Executive Order 13423: Strengthening Federal Environmental, Energy, and Transportation Management  

Office of Energy Efficiency and Renewable Energy (EERE)

Full text of Executive Order 13423: Strengthening Federal Environmental, Energy, and Transportation Management.

450

ORPS User Registration Form  

Broader source: Energy.gov (indexed) [DOE]

DEPARTMENT OF ENERGY DEPARTMENT OF ENERGY OPERATIONAL EVENT INFORMATION SYSTEMS REGISTRATION FORM User Registration For: ORPS SUBMIT TO: U.S. DOE: PHONE: 800-473-4375 HSS InfoCenter, HS-1.22, 270CC FAX: 301-903-9823 1000 Independence Ave., SW Washington, DC 20585-0270 (Type or Print) 1. Name__________________________________________________________________________Birth date_______/_______ (Last) (First) (Middle Initial) (Month) (Day) 2.JobTitle_______________________________________________________________________________________________ 3. Company Name________________________________________________________________________________________ 4. Address________________________________________________ Mail Stop______________________________________

451

Biomass Feedstock National User Facility  

Broader source: Energy.gov [DOE]

Breakout Session 1BIntegration of Supply Chains I: Breaking Down Barriers Biomass Feedstock National User Facility Kevin L. Kenney, Director, Biomass Feedstock National User Facility, Idaho National Laboratory

452

MagLab - User Awards  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Users Hub Arrow User Awards Scientists who do research at the MagLab are often honored for their excellent work. Christopher Reddy 2014 C.C. Patterson Award (December 2013) Chris...

453

Meeting security and user behavior requirements in Grid scheduling  

Science Journals Connector (OSTI)

Most of current research in Grid computing is still focused on the improvement of the performance of Grid schedulers. However, unlike traditional scheduling, in Grid systems there are other important requirements to be taken into account. One such a requirement is the secure scheduling, namely achieving an efficient allocation of tasks to reasonable trustful resources. In this paper we formalize the Grid scheduling problem as a non-cooperative non-zero sum game of the Grid users in order to address the security requirements. The premise of this model is that in a large-scale Grid, the cooperation among all users in the system is unlikely to happen. The users cost of playing the game is interpreted as a total cost of the secure job execution in Grid. The game cost function is minimized, at global (Grid) and local (users) levels, by using four genetic-based hybrid meta-heuristics. We have evaluated the proposed model under the heterogeneity, the large-scale and dynamics conditions using a Grid simulator. The relative performance of four hybrid schedulers is measured by the makespan and flowtime metrics. The obtained results suggested that it is more resilient for the Grid users to pay some additional scheduling cost, due to verification of the security conditions, instead of taking the risk of assigning their tasks to unreliable resources.

Joanna Ko?odziej; Fatos Xhafa

2011-01-01T23:59:59.000Z

454

Arbitrary Nesting of Spatial Computations Antoine Spicher, Olivier Michel, Jean-Louis Giavitto  

E-Print Network [OSTI]

Arbitrary Nesting of Spatial Computations Antoine Spicher, Olivier Michel, Jean-Louis Giavitto LACL-louis.giavitto@ircam.fr Abstract--Modern programming languages allow the definition and the use of arbitrary nested data structures but this is not generally considered in unconventional programming models. In this paper, we present arbitrary nesting

Paris-Sud XI, Université de

455

Executive Director, ATN The position of Executive Director, Australian Technology Network  

E-Print Network [OSTI]

to policy direction in the higher education sector, has superior public advocacy and media communication information,visit: www.atn.edu.au/ATN_ED_Position_Details Applications close on 8 September 2014. EnquiriesExecutive Director, ATN The position of Executive Director, Australian Technology Network presents

University of Technology, Sydney

456

A user interface management system  

Science Journals Connector (OSTI)

The design and construction of the user interface to interactive systems is receiving increased attention. This paper describes a user interface management system that allows a designer/developer to focus on the logical functionality of an application ... Keywords: User interface management

David J. Kasik

1982-07-01T23:59:59.000Z

457

Prism users guide.  

SciTech Connect (OSTI)

Prism is a ParaView plugin that simultaneously displays simulation data and material model data. This document describes its capabilities and how to use them. A demonstration of Prism is given in the first section. The second section contains more detailed notes on less obvious behavior. The third and fourth sections are specifically for Alegra and CTH users. They tell how to generate the simulation data and SESAME files and how to handle aspects of Prism use particular to each of these codes.

Weirs, V. Gregory

2012-03-01T23:59:59.000Z

458

Ising-like models on arbitrary graphs : the Hadamard way  

E-Print Network [OSTI]

We propose a generic framework to analyse classical Ising-like models defined on arbitrary graphs. The energy spectrum is shown to be the Hadamard transform of a suitably defined vector associated with the graph. This allows a quick computation of this spectrum owing to the existence of a fast Hadamard transform algorithm (used for instance in image ccompression processes). We than go further and apply this formalism to regular graphs, such as hypercubic graphs, for which a simple recurrence relation for the spectrum is given, which speeds up even more its determination. First attempts to analyse partition functions and transfer matrices are also discussed.

Mosseri, Rmy

2014-01-01T23:59:59.000Z

459

Quantum lithography with classical light: Generation of arbitrary patterns  

E-Print Network [OSTI]

Quantum lithography with classical light: Generation of arbitrary patterns Qingqing Sun,1,2 Philip R. Hemmer,3 and M. Suhail Zubairy1,2 1Department of Physics and Institute of Quantum Studies, Texas A&M University, College Station, Texas 77843..., Phys. Rev. Lett. 85, 2733 #1;2000#2;. #3;7#4; S. Kawata, H.-B. Sun, T. Tanaka, and K. Takada, Nature #1;Lon- don#2; 412, 697 #1;2001#2;. #3;8#4; M. D?Angelo, M. V. Chekhova, and Y. Shih, Phys. Rev. Lett. 87, 013602 #1;2001#2;. #3;9#4; A. Pe?er, B...

Sun, Qingqing; Hemmer, Philip R.; Zubairy, M. Suhail

2007-01-01T23:59:59.000Z

460

Quantum teleportation of an arbitrary superposition of atomic Dicke states  

E-Print Network [OSTI]

, USA 2Departments of Chemistry and Aerospace & Mechanical Engineering, Princeton University, New Jersey 08544, USA sReceived 20 December 2004; revised manuscript received 18 February 2005; published 9 June 2005d We propose a scheme for teleporting... insetd. States uccl and ubbl represent both atoms in the same state, and subcl+ ucbld /?2 is a state with one atom in state ubl and one in state ucl. The coeffi- cients C0 I , C1 I , and C2I are arbitrary and satisfy uC0I u2+ uC1I u2 + uC 2I u2...

Di, TG; Muthukrishnan, A.; Scully, Marlan O.; Zubairy, M. Suhail

2005-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "users execute arbitrary" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Numerical simulation of waveguides of arbitrary cross section.  

SciTech Connect (OSTI)

Finite difference equations are derived for the simulation of dielectric waveguides using an H{sub z}-E{sub z} formulation defined on a nonuniform triangular grid. The resulting equations may be solved as a banded eigenproblem for waveguide structures of arbitrary shape composed of regions of piecewise constant isotropic dielectric, and all transverse fields then computed from the solutions. Benchmark comparisons are presented for problems with analytic solutions, as well as a sample calculation of the propagation loss of a hollow Bragg fiber.

Hadley, G. Ronald

2003-09-01T23:59:59.000Z

462

Zero sound modes of dilute Fermi gases with arbitrary spin  

Science Journals Connector (OSTI)

Motivated by the recent success of optical trapping of alkali-metal bosons, we have studied the zero sound modes of dilute Fermi gases with arbitrary spin-f, which are spin-S excitations (0<~S<~2f). The dispersion of the mode (S) depends on a single Landau parameter F(S), which is related to the scattering lengths of the system through a simple formula. Measurement of (even a subset of) these modes in finite magnetic fields will enable one to determine all the interaction parameters of the system.

S.-K. Yip and Tin-Lun Ho

1999-06-01T23:59:59.000Z

463

V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute...  

Broader source: Energy.gov (indexed) [DOE]

"qtactivex" parameters within an HTML object. 4) A boundary error when handling the transform attribute of "text3GTrack" elements can be exploited to cause a buffer overflow via...

464

V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute...  

Broader source: Energy.gov (indexed) [DOE]

system. 1) An unspecified error when handling TeXML files can be exploited to cause memory corruption. 2) A boundary error when handling H.263 encoded movie files can be...

465

User_ApproveTrainingRequest  

Broader source: Energy.gov (indexed) [DOE]

Approving User Training Requests Approving User Training Requests © 2011 SuccessFactors, Inc. - 1 - SuccessFactors Learning Confidential. All rights reserved. Job Aid: Approving User Training Requests Purpose The purpose of this job aid is to guide users through the step-by-step process of approving a user training request. Task A. Approve a User Training Request From the Home Page, click the You have pending approval requests link in the Alerts box. The Pending Reviews and Approvals page displays and defaults open to the pending approval. Click the expand icon ( ) next to the user's name and/or click the Title link for additional information on the request. Select the Enter Reasons for Approvals or Denials checkbox to allow for comments. Select the Approve radio

466

2001 NERSC User Survey Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

1 User Survey Results 1 User Survey Results Show All | 1 2 3 4 5 ... 11 | Next » 2001 User Survey Results Table of Contents Response Summary User Information Overall Satisfaction and Importance All Satisfaction Questions and Changes from Previous Years NERSC Information Management (NIM) System Web and Communications Hardware Resources Software Training User Services Comments about NERSC Response Summary NERSC extends its thanks to the 237 users who participated in this year's survey; this compares with 134 respondents last year. The respondents represent all five DOE Science Offices and a variety of home institutions: see User Information. Your responses provide feedback about every aspect of NERSC's operation, help us judge the quality of our services, give DOE information on how well

467

2006 NERSC User Survey Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

6 User Survey Results 6 User Survey Results Show All | 1 2 3 4 5 ... 15 | Next » 2006 User Survey Results Table of Contents Survey Results Users are invited to provide overall comments about NERSC: Here are the survey results: Respondent Demographics Overall Satisfaction and Importance All Satisfaction, Importance and Usefulness Ratings All Usefulness Topics Hardware Resources Software Visualization and Data Analysis HPC Consulting Services and Communications Web Interfaces Training Comments about NERSC Survey Results Many thanks to the 256 users who responded to this year's User Survey. This represents a response rate of about 13 percent of the active NERSC users. The respondents represent all six DOE Science Offices and a variety of home institutions: see Respondent Demographics. The survey responses provide feedback about every aspect of NERSC's

468

DOE-LM Executable Plan Cover Page  

Broader source: Energy.gov (indexed) [DOE]

30.2B Executable Plan for LM 30.2B Executable Plan for LM (DOE FEMP Draft) Signature for Site Office Concurrence_______________________________ Digitally signed by Raymond M. Plieness DOE ORDER 430.2B EXECUTABLE PLAN TEAM GOAL SUMMARY Please mark the appropriate box below with an "X" Goal Elements Plan Meets Goal Plan Exceeds Goal Plan Falls Short of Goal Comments Energy Efficiency X LM currently falls short of the goal and shows an increase of energy usage per square foot; however, this is due to the removal of buildings, and plans are in place to ensure that the goal is met by 2015 (by reducing groundwater treatment). Renewable Energy X Water X Transportation/Fleet Management X High Performance and Sustainable Buildings X This page intentionally left blank Page i Contents 1.0

469

2009 Wind Technologies Market Report: Executive Summary  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

1 1 2009 Wind Technologies Market Report Executive Summary Primary authors Ryan Wiser, Lawrence Berkeley National Laboratory Mark Bolinger, Lawrence Berkeley National Laboratory With contributions from Galen Barbose, Naïm Darghouth, Ben Hoen, and Andrew Mills (Berkeley Lab) Kevin Porter and Sari Fink (Exeter Associates) Suzanne Tegen (National Renewable Energy Laboratory) This is the Executive Summary of the full report entitled 2009 Wind Technologies Market Report available at http://www.nrel.gov/docs/fy10osti/48666.pdf (PDF 3.1 MB) 2 2009 Wind Technologies Market Report Executive Summary Despite grim predictions at the close of 2008, the U.S. wind power industry experienced yet another record year in 2009, once again surpassing even optimistic growth projections from years past. At the

470

Senior Executive Fellows | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Senior Executive Fellows Senior Executive Fellows Senior Executive Fellows February 7, 2014 (All day) Application Deadline(s): February 7, 2014 and July 12, 2014 Application Process: Please forward your name, organizational name, and program interest date to the DOE Career Development Program Manager via email to; Johnny McChriston not later than February 7, 2014 for the April 13, 2014 program date, and July 12, 2014 for the October 12, 2014 program date. Please go to the link below to complete an application. In addition, please be advised that early submission of your application are encouraged because the program is often filled to capacity. SEF Application Completed application packages should be emailed to the DOE program coordinator, Johnny McChriston or packages can be sent via FedEx, or UPS

471

Photovoltaics information user study  

SciTech Connect (OSTI)

The results of a series of telephone interviews with groups of users of information on photovoltaics (PV) are described. These results, part of a larger study on many different solar technologies, identify types of information each group needed and the best ways to get information to each group. The report is 1 of 10 discussing study results. The overall study provides baseline data about information needs in the solar community. It covers these technological areas: photovoltaics, passive solar heating and cooling, active solar heating and cooling, biomass energy, solar thermal electric power, solar industrial and agricultural process heat, wind energy, ocean energy, and advanced energy storage. An earlier study identified the information user groups in the solar community and the priority (to accelerate solar energy commercialization) of getting information to each group. In the current study only high-priority groups were examined. Results from seven PV groups respondents are analyzed in this report: DOE-Funded Researchers, Non-DOE-Funded Researchers, Researchers Working for Manufacturers, Representatives of Other Manufacturers, Representatives of Utilities, Electric Power Engineers, and Educators.

Belew, W.W.; Wood, B.L.; Marie, T.L.; Reinhardt, C.L.

1980-10-01T23:59:59.000Z

472

How to Apply for Senior Executive positions | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

How to Apply for Senior Executive positions How to Apply for Senior Executive positions How to Apply for Senior Executive positions To apply vacancies for SENIOR EXECUTIVE SERVICE (SES) , SENIOR LEVEL (SL), SCIENTIFIC AND PROFESSIONAL (ST) positions within the Department of Energy please visit OPM's website: http://www.usajobs.gov. From this site, you may download announcements for vacancies of interest to you. SENIOR EXECUTIVE SERVICE (SES) The Guide to Senior Executive Service Qualifications provides detailed information about executive qualifications and tips for writing effective qualification statements. What Are Executive Core Qualifications (ECQs) The Executive Core Qualifications (ECQs) define the competencies needed to build a federal corporate culture that drives for results, serves customers, and builds successful teams and coalitions within and outside

473

Executive Leadership Program | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Leadership Program Leadership Program Executive Leadership Program Program Overview: This program is based on the U.S. Office of Personnel Management's Leadership Effectiveness Framework (LEF), a model for effective leadership/managerial performance. The program helps participants acquire or enhance the LEF competencies needed to become a successful government leader and manager. Participants will complete the following activities: individual needs assessment; leadership development plans; leadership development team activities; developmental work assignment; shadowing assignment; executive interviews; management readings; and four residential training sessions. In order to complete all the components of the program, participants will be away from their position of record for a

474

V-115: Apple iOS Bugs Let Local Users Gain Elevated Privileges | Department  

Broader source: Energy.gov (indexed) [DOE]

5: Apple iOS Bugs Let Local Users Gain Elevated Privileges 5: Apple iOS Bugs Let Local Users Gain Elevated Privileges V-115: Apple iOS Bugs Let Local Users Gain Elevated Privileges March 20, 2013 - 12:08am Addthis PROBLEM: Apple iOS Bugs Let Local Users Gain Elevated Privileges PLATFORM: Version(s): prior to 6.1.3 ABSTRACT: Several vulnerabilities were reported in Apple iOS REFERENCE LINKS: Apple security Article: HT1222 SecurityTracker Alert ID: 1028314 CVE-2013-0977 CVE-2013-0978 CVE-2013-0979 CVE-2013-0981 IMPACT ASSESSMENT: High DISCUSSION: A local user can exploit a flaw in the handling of Mach-O executable files with overlapping segments to execute unsigned code on the target system [CVE-2013-0977]. A local user can exploit a flaw in the ARM prefetch abort handling to determine the address of structures in the kernel [CVE-2013-0978].

475

U-130: JBoss Operations Network LDAP Authentication Bug Lets Remote Users  

Broader source: Energy.gov (indexed) [DOE]

0: JBoss Operations Network LDAP Authentication Bug Lets Remote 0: JBoss Operations Network LDAP Authentication Bug Lets Remote Users Bypass Authentication U-130: JBoss Operations Network LDAP Authentication Bug Lets Remote Users Bypass Authentication March 21, 2012 - 7:00am Addthis PROBLEM: JBoss Operations Network LDAP Authentication Bug Lets Remote Users Bypass Authentication PLATFORM: JBoss Operations Network 2.x ABSTRACT: A vulnerability was reported in JBoss Operations Network. A remote user can login with an arbitrary password in certain cases. reference LINKS: SecurityTracker Alert ID: 1026826 Secunia Advisory SA48471 CVE-2012-1100 IMPACT ASSESSMENT: Medium Discussion: The vulnerability is caused due to an error within the Lightweight Directory Access Protocol (LDAP) authentication when handling invalid bind account credentials, which can be exploited to log-in to LDAP-based

476

Automatic detection of users' skill levels using high-frequency user interface events  

Science Journals Connector (OSTI)

Computer users have different levels of system skills. Moreover, each user has different levels of skill across different applications and even in different portions of the same application. Additionally, users' skill levels change dynamically as users ... Keywords: Adaptive user interfaces, Expertise, GOMS, Graphical user interfaces, Intelligent user interfaces, Machine learning, Skill, User modeling

Arin Ghazarian; S. Majid Noorhosseini

2010-06-01T23:59:59.000Z

477

User' Software Manual  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

MM-Group Home MM-Group Home MMG Advisory Committees 4-ID-D Home Recent Publications Beamline Info Optics Instrumentation Software User Info FAQs 4-ID-D Beamline Software Manual Introduction Beamline 4-ID-D uses the EPICS platform for beamline control. This is a distributed client-server software where seperate server computers (IOCs) are used to control and monitor different portions of the beamline, and a separate client computer is used for data aquisition and display information. The client computer controls the other IOCs via the local ethernet network. The EPICS client "MEDM" is used for graphically displaying information about the beamline. The command line driven program SPEC is used for scanning adn other data acquisition fruncitons. More information on each of these is found below.

478

users-guide  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Contents Contents Contents Contents ARGONNE NATIONAL LABORATORY 9700 South Cass Avenue Argonne, IL 60439 in ANL/MCS-TM-234 Users Guide for ROMIO: A High-Performance, Portable MPI-IO Implementation by Rajeev Thakur, Robert Ross, Ewing Lusk, William Gropp, Robert Latham Mathematics and Computer Science Division Technical Memorandum No. 234 Revised May 2004, November 2007, April 2010 This work was supported by the Mathematical, Information, and Computational Sciences Division subprogram of the Office of Advanced Scientific Computing Research, U.S. Department of Energy, under Contract W-31-109-Eng-38; and by the Scalable I/O Initiative, a multiagency project funded by the Defense Advanced Research Projects Agency (Contract DABT63-94-C-0049), the Department of Energy, the National Aeronautics and Space Administration,

479

End User Perspective - Industrial  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Solid State Research Center Solid State Research Center DOE Fuel Cell Portable Power Workshop End User Perspective - Industrial Consumer Electronics Power (< 20-50W) Department of Energy Fuel Cell Portable Power Workshop Jerry Hallmark Manager Energy Technologies Lab Motorola Labs Solid State Research Center DOE Fuel Cell Portable Power Workshop Outline * Energy & Power of Portable Devices * Fuel Cell Applications & Cost * Key Requirements & Challenges * Fuels for Portable Fuel Cells * Fuel Transportation Regulations and Standards * Methanol Fuel Cells - Direct Methanol Fuel Cells - Reformed Methanol Fuel Cells * Technical Challenges 2 Solid State Research Center DOE Fuel Cell Portable Power Workshop Portable Electronics Yearly Energy Usage  :KU 1990 1980  :KU

480

User_Self_Register  

Broader source: Energy.gov (indexed) [DOE]

Registering in a Scheduled Offering Registering in a Scheduled Offering © 2011 SuccessFactors, Inc. - 1 - SuccessFactors Learning Confidential. All rights reserved. Job Aid: Self-Registering in a Scheduled Offering Purpose The purpose of this job aid is to guide users through the step-by-step process of locating scheduled offerings and self-registering from the To-Do List, Calendar of Offerings, and the catalog. Each task below demonstrates a different method of registration. Task A. Register from the To-Do List From the Home page, filter the To-Do List to show All Learning. 1 1 Register from the Advanced Catalog Search - 10 Steps Task C Register from To-Do List 6 Steps Task A Register from the Calendar of Offerings 8 Steps Confirm Registration 3 Steps

Note: This page contains sample records for the topic "users execute arbitrary" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Lujan Center User Guide  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

3 3 High-Pressure Preferred Orientation Neutron Diffractometer (HIPPO) HIPPO is the first third-generation neutron time- of-flight powder diffractometer constructed in the United States. It achieves very high neutron count rates by virtue of a short (9 m) initial flight path on a high-intensity water moderator and 1360 3 He detector tubes covering 4.8 m 2 of detector area from 10° - 150° in scattering angles. HIPPO was designed and manufactured as a joint effort between LANSCE and the University of California with the goal of doing world-class science by making neutron powder diffractometry an accessible tool to the national user community. D-spacing ranges from 0.12 - 4.80 Å (1.31 - 52.4 Å -1 ) to 1.2 - 47.5 Å (0.13 - 5.3 Å -1 ) are available to support studies of crystal orientation

482

JC3 Bulletin Archive | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

be exploited by malicious people to compromise a user's system. March 9, 2012 U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting...

483

User`s Guide for the NREL Teetering Rotor Analysis Program (STRAP)  

SciTech Connect (OSTI)

The following report gives the reader an overview of instructions on the proper use of the National Renewable Energy Laboratory (formerly the Solar Energy Research Institute, or SERI) teetering Rotor Analysis Program (STRAP version 2.20). STRAP is a derivative of the Force and Loads Analysis program (FLAP). It is intended as a tool for prediction of rotor and blade loads and response for only two-bladed teetering hub wind turbines. The effects of delta-3, undersling, hub mass, and wind turbulence are accounted for. The objectives of the report are to give an overview of the code and also show the methods of data input and correct code execution steps in order to model an example two-bladed teetering hub turbine. A large portion of the discussion (Sections 6.0, 7.0, and 8.0) is devoted to the subject of inputting and running the code for wind turbulence effects. The ability to include turbulent wind effects is perhaps the biggest change in the code since the release of FLAP version 2.01 in 1988. This report is intended to be a user`s guide. It does not contain a theoretical discussion on equations of motion, assumptions, underlying theory, etc. It is intended to be used in conjunction with Wright, Buhl, and Thresher (1988).

Wright, A.D.

1992-08-01T23:59:59.000Z

484

User`s Guide for the NREL Force and Loads Analysis Program. Version 2.2  

SciTech Connect (OSTI)

The following report gives the reader an overview of and instructions on the proper use of the National Renewable Energy Laboratory Force and Loads Analysis Program (FLAP, version 2.2). It is intended as a tool for prediction of rotor and blade loads and response for two- or three-bladed rigid hub wind turbines. The effects of turbulence are accounted for. The objectives of the report are to give an overview of the code and also show the methods of data input and correct code execution steps in order to model an example two-bladed rigid hub turbine. A large portion of the discussion (Sections 6.0, 7.0, and 8.0) is devoted to the subject of inputting and running the code for wind turbulence effects. The ability to include turbulent wind effects is perhaps the biggest change in the code since the release of FLAP version 2.01 in 1988. This report is intended to be a user`s guide. It does not contain a theoretical discussion on equations of motion, assumptions, underlying theory, etc. It is intended to be used in conjunction with Wright, Buhl, and Thresher (1988).

Wright, A.D.

1992-08-01T23:59:59.000Z

485

Darden Executive Education Management Development Program  

E-Print Network [OSTI]

, or will soon undergo, the transition from a functional to a general management role. They may alsoDarden Executive Education Management Development Program: Driving Vision, Action, and Results ... Change the Way You Think! #12;The Program Organizations globally need to prepare middle management

Acton, Scott

486

EXECUTIVE SUMMARY NEW STUDENT & OWL FAMILY PROGRAMS  

E-Print Network [OSTI]

, and implementation of the program. a. Multiple new programs were enhanced and added to make New Student OrientationEXECUTIVE SUMMARY NEW STUDENT & OWL FAMILY PROGRAMS 2012-2013 Overview The Office of New Student and Owl Family Programs plays an integral role within the University by offering a supportive, innovative

Fernandez, Eduardo

487

Executive Education Program Freight Transportation and  

E-Print Network [OSTI]

Executive Education Program Freight Transportation and Logistics: Delivering Results in a Volatile Environment September 9 ­11, 2013 Northwestern University Transportation Center NonprofitOrganization U.S.Postage PAID NorthwesternUniversity TransportationCenter RobertR.McCormickSchool of

Bustamante, Fabián E.

488

A Market Feasibility Study Executive Summary  

E-Print Network [OSTI]

popular areblack,green,andoolongteas.Lesswellknowntypesincludewhiteand Puer tea. There is a high levelA Market Feasibility Study Executive Summary Hawai`i-Grown Tea Pacific Asian Center for Entrepreneurship #12;Overview This report is a feasibility study for developing tea into a viable and sustainable

489

Hawaii energy strategy: Executive summary, October 1995  

SciTech Connect (OSTI)

This is an executive summary to a report on the Hawaii Energy Strategy Program. The topics of the report include the a description of the program including an overview, objectives, policy statement and purpose and objectives; energy strategy policy development; energy strategy projects; current energy situation; modeling Hawaii`s energy future; energy forecasts; reducing energy demand; scenario assessment, and recommendations.

NONE

1995-10-01T23:59:59.000Z

490

Carbon Management Plan 1. Executive summary 5  

E-Print Network [OSTI]

of energy intensive buildings have been constructed, whilst at the same time disposals have concentrated. Background and context 16 4. Carbon management strategy 18 5. Carbon emissions baseline and projections 22 6 Plan interventions 55 Appendix B: Possible future actions 76 #12;4 #12;5 1. EXECUTIVE SUMMARY Foreword

Haase, Markus

491

TABLE OF CONTENTS 3 Executive Summary  

E-Print Network [OSTI]

. JISAO's four major research themes, Fisheries Recruitment (Marine Ecosystems), Climate, Environmental Ecosystems 34 Climate 60 Environmental Chemistry 70 Coastal Oceanography 75 Appendices 75 Appendix 1 Senior;3 EXECUTIVE SUMMARY The Joint Institute for the Study of the Atmosphere and Ocean (JISAO) fosters

Rigor, Ignatius G.

492

National Academy of Sciences Executive Office  

E-Print Network [OSTI]

, and the Columbia River Inter-Tribal Fish Commission, the National Research Council's Board on Environmental Studies Board (ISAB) and Independent Scientific Review Panel (ISRP). Dr. David Policansky of the NRC's Board1 National Academy of Sciences Executive Office 2101 Constitution Avenue, NW Washington, DC 20418

493

National Library of Energy : User Account  

Office of Scientific and Technical Information (OSTI)

Reset your password Enter either your User Name or Email Address to reset your password. User Name: Email Address: Go...

494

POWGEN Users | ORNL Neutron Sciences  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

User Information User Information Announcement: POWGEN has started a new partnership with beam line 11A at the Advanced Photon Source where users can get x-ray data if they have an approved POWGEN proposal. Become a POWGEN User POWGEN Experiment Guide: A - Z POWGEN Mail In Program Guide Shipping Addresses for Samples For more detailed information, please visit the ORNL User Facilities Sample Handling and Shipping page. Non-activated samples coming to SNS: Attention: Special requirements (like refrigeration) To: Neutron Sciences User Sample IPTS # XXXX Oak Ridge National Laboratory / SNS Site Chestnut Ridge, Bldg 8920 Oak Ridge, TN 37830 Activated samples (these will also be brought to SNS but must go through check-in procedures at another on-site location): Attention: Special requirements (like refrigeration)

495

APS User News, Issue 76  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

6, February 21, 2012 6, February 21, 2012 CONTENTS DIRECTOR'S CORNER Special Announcement: George Srajer Appointed Project Director for the APS Upgrade and Deputy ALD USER MATTERS -- Registration Open for 2012 APS/CNM/EMC Users Meeting: Our User Science Shapes the Future! -- CALLING ALL VIDEO MAKERS! Submit Your Films for the "Usies Awards"! -- LCLS-II New Instruments Workshops March 19-22, 2012 -- NUFO Goes To Washington! -- Tax Presentation Available BRIEFLY NOTED -- Recognitions and Honors -- Users Meeting Satellite Workshop: "SAXS Software Packages Irena and Nika" -- New Web Page Offers Quick Help Links for Users -- New Mural Graces the Wall near Viewing Area -- General User Proposal Deadline for 2012-2 Run: March 9, 2012 =====================================================

496

1999 NERSC User Survey Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

9 User Survey Results 9 User Survey Results Show All | 1 2 3 4 5 ... 11 | Next » 1999 User Survey Results Table of Contents Respondent Summary Overall Satisfaction User Information Visualization Consulting and Account Support Information Technology and Communication Hardware Resources Software Training Comments about NERSC All Satisfaction Questions and FY 1998 to FY 1999 Changes Respondent Summary NERSC would like to thank all the users who participated in this year's survey. Your responses provide feedback about every aspect of NERSC's operation, help us judge the quality of our services, give DOE information on how well NERSC is doing, point us to areas we can improve, and show how we compare to similar facilities. This year 177 users responded to our survey, compared with 138 last year.

497

User Calendar | Advanced Photon Source  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

APS User Calendar Date Event November 19, 2013 Proposal Review Panel Meetings December 10, 2013 Beamtime Allocation Committee Meeting January 22, 2014 Joint APSUO Steering Committee and Partner User Council Meeting March 7, 2014 Proposal Deadline Run Cycle 2014-2 March 11-13, 2014 Scientific Advisory Committee Meeting May 12-15, 2014 APS/CNM/EMC Users Meeting May 13, 2014 Partner User Council Meeting May 14, 2014 APSUO Steering Committee Meeting July 9, 2014 Joint APSUO Steering Committee and Partner User Council Meeting July 11, 2014 Proposal Deadline Run Cycle 2014-3 September 17, 2014 Joint APSUO Steering Committee and Partner User Council Meeting November 4-6, 2014 Scientific Advisory Committee Meeting March 16-18, 2015 Scientific Advisory Committee Meeting

498

2000 NERSC User Survey Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

0 User Survey Results 0 User Survey Results Show All | 1 2 3 4 5 ... 10 | Next » 2000 User Survey Results Table of Contents Response Summary User Information Overall Satisfaction and Importance All Satisfaction Questions and FY 1999 to FY 2000 Changes Consulting and Account Support Web and Communications Hardware Resources Software Resources Training User Comments Response Summary NERSC extends its thanks to all the users who participated in this year's survey. Your responses provide feedback about every aspect of NERSC's operation, help us judge the quality of our services, give DOE information on how well NERSC is doing, and point us to areas we can improve. Every year we institute changes based on the survey; the FY 1999 survey resulted in the following changes: We created a long-running queue (12 hours maximum) for jobs using up

499

User_Sup_AssignDelegate  

Broader source: Energy.gov (indexed) [DOE]

Delegates (Supervisor) Delegates (Supervisor) © 2011 SuccessFactors, Inc. - 1 - SuccessFactors Learning Confidential. All rights reserved. Job Aid: Assigning Delegates (Supervisor) Purpose The purpose of this job aid is to guide you through the step-by-step process of using the delegate feature within SuccessFactors Learning. A delegate is another user who you identify to act on the work that you need to complete in the user interface. When you identify a user as a delegate through the Delegates area in your Options and Settings screen, the system adds that user's name to the Delegators list. Typically, you identify a user as a delegate when you want the user to perform some of your tasks. You can use the Delegates area to add or edit the permissions for a delegate, which you might want to do, for example, if you plan to take an