Powered by Deep Web Technologies
Note: This page contains sample records for the topic "wireshark multiple bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

V-160: Wireshark Multiple Bugs Let Remote Users Deny Service | Department  

Broader source: Energy.gov (indexed) [DOE]

60: Wireshark Multiple Bugs Let Remote Users Deny Service 60: Wireshark Multiple Bugs Let Remote Users Deny Service V-160: Wireshark Multiple Bugs Let Remote Users Deny Service May 21, 2013 - 12:09am Addthis PROBLEM: Wireshark Multiple Bugs Let Remote Users Deny Service PLATFORM: Versions 1.8.0 to 1.8.6 ABSTRACT: Multiple vulnerabilities have been reported in Wireshark REFERENCE LINKS: Wireshark Docid: wnpa-sec-2013-23 Secunia Advisory SA53425 SecurityTracker Alert ID: 1028582 CVE-2013-2486 CVE-2013-2487 IMPACT ASSESSMENT: Medium DISCUSSION: Multiple vulnerabilities have been reported in Wireshark, which can be exploited by malicious people to cause a DoS (Denial of Service). 1) An error in the RELOAD dissector (dissectors/packet-reload.c) can be exploited to trigger infinite loops and consume CPU resources via specially

2

V-037: Wireshark Multiple Bugs Let Remote Users Deny Service | Department  

Broader source: Energy.gov (indexed) [DOE]

7: Wireshark Multiple Bugs Let Remote Users Deny Service 7: Wireshark Multiple Bugs Let Remote Users Deny Service V-037: Wireshark Multiple Bugs Let Remote Users Deny Service November 30, 2012 - 3:30am Addthis PROBLEM: Wireshark Multiple Bugs Let Remote Users Deny Service PLATFORM: Version(s): prior to 1.6.12, 1.8.4 ABSTRACT: Several vulnerabilities were reported in Wireshark. REFERENCE LINKS: Wireshark Security Advisories Secunia Advisory SA51422 Seclists SecurityTracker Alert ID: 1027822 CVE-2012-5592 CVE-2012-5593 CVE-2012-5594 CVE-2012-5595 CVE-2012-5596 CVE-2012-5597 CVE-2012-5598 CVE-2012-5599 CVE-2012-5600 CVE-2012-5601 CVE-2012-5602 IMPACT ASSESSMENT: Medium DISCUSSION: Several vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions. A user can obtain potentially sensitive information.

3

U-176: Wireshark Multiple Bugs Let Remote Users Deny Service | Department  

Broader source: Energy.gov (indexed) [DOE]

U-176: Wireshark Multiple Bugs Let Remote Users Deny Service U-176: Wireshark Multiple Bugs Let Remote Users Deny Service U-176: Wireshark Multiple Bugs Let Remote Users Deny Service May 24, 2012 - 7:00am Addthis PROBLEM: Wireshark Multiple Bugs Let Remote Users Deny Service PLATFORM: 1.4.0 to 1.4.12, 1.6.0 to 1.6.7 ABSTRACT: Several vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions. Reference Links: SecurityTracker Alert ID: 1027094 CVE-2012-2392 CVE-2012-2393 CVE-2012-2394 IMPACT ASSESSMENT: Medium Discussion: A remote user can send specially crafted ANSI MAP, ASF, BACapp, Bluetooth HCI, IEEE 802.11, IEEE 802.3, LTP, and R3 data to cause Wireshark to hang or enter an infinite loop. A remote user can cause the DIAMETER dissector to crash. A remote user can trigger a memory error on SPARC or Itanium processors and

4

T-714:Wireshark OpenSafety and CSN.1 Dissector Bugs | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

714:Wireshark OpenSafety and CSN.1 Dissector Bugs 714:Wireshark OpenSafety and CSN.1 Dissector Bugs T-714:Wireshark OpenSafety and CSN.1 Dissector Bugs September 12, 2011 - 9:00am Addthis PROBLEM: Several vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions. PLATFORM: Version(s): 1.4.0 to 1.4.8, 1.6.0 to 1.6.1 ABSTRACT: Wireshark OpenSafety and CSN.1 Dissector Bugs Lets Remote Users Deny Service. reference LINKS: Wireshark 1.6.2 Release Notes Wireshark 1.4.9 Release Notes Docid: wnpa-sec-2011-12 Docid: wnpa-sec-2011-14 Docid: wnpa-sec-2011-15 Docid: wnpa-sec-2011-16 SecurityTracker Alert ID: 1026030 IMPACT ASSESSMENT: High Discussion: A remote user can cause arbitrary scripting code to be executed on the target user's system. A large loop in the OpenSafety dissector could cause a crash. A remote user

5

V-081: Wireshark Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

1: Wireshark Multiple Vulnerabilities 1: Wireshark Multiple Vulnerabilities V-081: Wireshark Multiple Vulnerabilities January 31, 2013 - 12:21am Addthis PROBLEM: Wireshark Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in versions prior to 1.8.5 and 1.6.13. ABSTRACT: Multiple vulnerabilities have been reported in Wireshark REFERENCE LINKS: Wireshark 1.8.5 Release Notes Secunia Advisory SA51968 IMPACT ASSESSMENT: High DISCUSSION: 1) Errors in the Bluetooth HCI, CSN.1, DCP-ETSI DOCSIS CM-STAUS, IEEE 802.3 Slow Protocols, MPLS, R3, RTPS, SDP, and SIP dissectors can be exploited to trigger infinite loops and consume CPU resources via specially crafted packets. 2) An error in the CLNP dissector when processing certain packets can be exploited to cause a crash via a specially crafted packet.

6

V-081: Wireshark Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

1: Wireshark Multiple Vulnerabilities 1: Wireshark Multiple Vulnerabilities V-081: Wireshark Multiple Vulnerabilities January 31, 2013 - 12:21am Addthis PROBLEM: Wireshark Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in versions prior to 1.8.5 and 1.6.13. ABSTRACT: Multiple vulnerabilities have been reported in Wireshark REFERENCE LINKS: Wireshark 1.8.5 Release Notes Secunia Advisory SA51968 IMPACT ASSESSMENT: High DISCUSSION: 1) Errors in the Bluetooth HCI, CSN.1, DCP-ETSI DOCSIS CM-STAUS, IEEE 802.3 Slow Protocols, MPLS, R3, RTPS, SDP, and SIP dissectors can be exploited to trigger infinite loops and consume CPU resources via specially crafted packets. 2) An error in the CLNP dissector when processing certain packets can be exploited to cause a crash via a specially crafted packet.

7

V-107: Wireshark Multiple Denial of Service Vulnerabilities | Department of  

Broader source: Energy.gov (indexed) [DOE]

7: Wireshark Multiple Denial of Service Vulnerabilities 7: Wireshark Multiple Denial of Service Vulnerabilities V-107: Wireshark Multiple Denial of Service Vulnerabilities March 8, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Wireshark PLATFORM: Wireshark 1.6.x and 1.8.x ABSTRACT: Multiple vulnerabilities have been reported in Wireshark, which can be exploited by malicious people to cause a DoS (Denial of Service). REFERENCE LINKS: Secunia Advisory SA52471 Wireshark Release Notes 1.8.6 Wireshark Release Notes 1.6.1.4 CVE-2013-2475 CVE-2013-2476 CVE-2013-2477 CVE-2013-2478 CVE-2013-2479 CVE-2013-2480 CVE-2013-2481 CVE-2013-2482 CVE-2013-2483 CVE-2013-2484 CVE-2013-2485 CVE-2013-2486 CVE-2013-2487 CVE-2013-2488 IMPACT ASSESSMENT: Medium DISCUSSION: 1) An error in the TCP dissector when processing certain packets can be

8

V-107: Wireshark Multiple Denial of Service Vulnerabilities | Department of  

Broader source: Energy.gov (indexed) [DOE]

7: Wireshark Multiple Denial of Service Vulnerabilities 7: Wireshark Multiple Denial of Service Vulnerabilities V-107: Wireshark Multiple Denial of Service Vulnerabilities March 8, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Wireshark PLATFORM: Wireshark 1.6.x and 1.8.x ABSTRACT: Multiple vulnerabilities have been reported in Wireshark, which can be exploited by malicious people to cause a DoS (Denial of Service). REFERENCE LINKS: Secunia Advisory SA52471 Wireshark Release Notes 1.8.6 Wireshark Release Notes 1.6.1.4 CVE-2013-2475 CVE-2013-2476 CVE-2013-2477 CVE-2013-2478 CVE-2013-2479 CVE-2013-2480 CVE-2013-2481 CVE-2013-2482 CVE-2013-2483 CVE-2013-2484 CVE-2013-2485 CVE-2013-2486 CVE-2013-2487 CVE-2013-2488 IMPACT ASSESSMENT: Medium DISCUSSION: 1) An error in the TCP dissector when processing certain packets can be

9

T-543: Wireshark 0.8.20 through 1.2.8 Multiple Vulnerabilities | Department  

Broader source: Energy.gov (indexed) [DOE]

3: Wireshark 0.8.20 through 1.2.8 Multiple Vulnerabilities 3: Wireshark 0.8.20 through 1.2.8 Multiple Vulnerabilities T-543: Wireshark 0.8.20 through 1.2.8 Multiple Vulnerabilities January 26, 2011 - 7:35am Addthis PROBLEM: Wireshark is prone to multiple denial-of-service and buffer-overflow vulnerabilities. PLATFORM: Wireshark 0.8.20 through 1.2.8. ABSTRACT: Wireshark is prone to multiple denial-of-service and buffer-overflow vulnerabilities. Exploiting these issues may allow attackers to crash the application and deny service to legitimate users. Attackers may also execute arbitrary code in the context of vulnerable users running the application. reference LINKS: Securityfocus IMPACT ASSESSMENT: Medium Discussion: Wireshark is prone to multiple denial-of-service and buffer-overflow vulnerabilities.Exploiting these issues may allow attackers to crash the

10

T-636: Wireshark Multiple Flaws Let Remote Users Deny Service | Department  

Broader source: Energy.gov (indexed) [DOE]

T-636: Wireshark Multiple Flaws Let Remote Users Deny Service T-636: Wireshark Multiple Flaws Let Remote Users Deny Service T-636: Wireshark Multiple Flaws Let Remote Users Deny Service June 3, 2011 - 3:35pm Addthis PROBLEM: Wireshark Multiple Flaws Let Remote Users Deny Service PLATFORM: Wireshark Version(s): 1.2.0 to 1.2.16, 1.4.0 to 1.4.6 ABSTRACT: Multiple vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions. reference LINKS: wnpa-sec-2011-07 SecurityTracker Alert ID: 1025597 wnpa-sec-2011-08 IMPACT ASSESSMENT: High Discussion: A remote user can send specially crafted DICOM data, Visual Networks file, compressed capture data, snoop file, or Diameter dictionary file to cause the target service to crash or enter an infinite loop. Versions affected: 1.2.0 to 1.2.16 and 1.4.0 to 1.4.6.

11

U-250: Wireshark DRDA Dissector Flaw Lets Remote Users Deny Service...  

Broader source: Energy.gov (indexed) [DOE]

Wireshark Bug Database - Bug 7666 SecurityTracker Alert ID: 1027464 Bugtraq ID: 55284 Red Hat Bugzilla - Bug 849926 CVE-2012-3548 IMPACT ASSESSMENT: Medium Discussion: An...

12

T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain...  

Broader source: Energy.gov (indexed) [DOE]

Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct...

13

V-135: Cisco ASA Multiple Bugs Let Remote Users Deny Service | Department  

Broader source: Energy.gov (indexed) [DOE]

5: Cisco ASA Multiple Bugs Let Remote Users Deny Service 5: Cisco ASA Multiple Bugs Let Remote Users Deny Service V-135: Cisco ASA Multiple Bugs Let Remote Users Deny Service April 16, 2013 - 12:21am Addthis PROBLEM: Cisco ASA Multiple Bugs Let Remote Users Deny Service PLATFORM: Cisco ASA Software for Cisco ASA 5500 Series Adaptive Security Appliances, Cisco ASA Services Module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers, and Cisco ASA 1000V Cloud Firewall are affected by multiple vulnerabilities. Affected versions of Cisco ASA Software will vary depending on the specific vulnerability. ABSTRACT: Several vulnerabilities were reported in Cisco ASA. REFERENCE LINKS: Cisco Security Advisory Secunia Advisory SA52989 SecurityTracker Alert ID: 1028415 CVE-2013-1149 CVE-2013-1150 CVE-2013-1151 CVE-2013-1152

14

U-079: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute  

Broader source: Energy.gov (indexed) [DOE]

79: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute 79: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code U-079: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code January 11, 2012 - 8:00am Addthis PROBLEM: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code. PLATFORM: Adobe Acrobat/Reader Version(s): 9.x prior to 9.5, 10.x prior to 10.1.2 ABSTRACT: A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026496 Adobe Security Bulletin APSB12-01 CVE-2011-2462, CVE-2011-4369, CVE-2011-4370, CVE-2011-4371, CVE-2011-4372, CVE-2011-4373. IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in Adobe Acrobat/Reader. A remote

15

T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information,  

Broader source: Energy.gov (indexed) [DOE]

3:Adobe Flash Player Multiple Bugs Let Remote Users Obtain 3:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code September 22, 2011 - 8:00am Addthis PROBLEM: Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code. PLATFORM: Adobe Flash Player 10.3.183.7 and earlier versions for Windows, Macintosh, Linux and Solaris. Adobe Flash Player 10.3.186.6 and earlier versions for Android. ABSTRACT: An attacker can exploit this issue by enticing an unsuspecting victim into visiting a malicious website. reference LINKS: Adobe Security Bulletin

16

V-203: HP LoadRunner Multiple Bugs Let Remote Users Deny Service and  

Broader source: Energy.gov (indexed) [DOE]

3: HP LoadRunner Multiple Bugs Let Remote Users Deny Service 3: HP LoadRunner Multiple Bugs Let Remote Users Deny Service and Execute Arbitrary Code V-203: HP LoadRunner Multiple Bugs Let Remote Users Deny Service and Execute Arbitrary Code July 26, 2013 - 3:31am Addthis PROBLEM: A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions. PLATFORM: HP LoadRunner prior to 11.52 ABSTRACT: Multiple vulnerabilities were reported in HP LoadRunner. REFERENCE LINKS: Security Tracker Alert ID: 1028833 CVE-2013-2368 CVE-2013-2369 CVE-2013-2370 CVE-2013-4797 CVE-2013-4798 CVE-2013-4799 CVE-2013-4800 CVE-2013-4801 IMPACT ASSESSMENT: Medium DISCUSSION: Potential security vulnerabilities have been identified with HP LoadRunner. The vulnerabilities could be remotely exploited to allow execution of code

17

U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary  

Broader source: Energy.gov (indexed) [DOE]

U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code June 6, 2012 - 7:00am Addthis PROBLEM: Multiple vulnerabilities were reported in Mozilla Firefox. PLATFORM: Version(s): prior to 13.0 ABSTRACT: A remote user can cause arbitrary code to be executed on the target user's system. A remote user can conduct cross-site scripting attacks. A remote user can obtain potentially sensitive information. Reference Links: Security Tracker ID 1027120 CVE-2012-0441,CVE-2012-1937 Vendor URL IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system [CVE-2012-1937 , CVE-2012-1938, CVE-2012-1939 ].

18

T-654: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary |  

Broader source: Energy.gov (indexed) [DOE]

4: Apple QuickTime Multiple Bugs Let Remote Users Execute 4: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary T-654: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary June 24, 2011 - 4:39am Addthis PROBLEM: A vulnerability was reported in QuickTime. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Version(s): prior to QuickTime 7.6.8 ABSTRACT: A remote user can create a specially crafted file that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. reference LINKS: SecurityTracker Alert ID: 1025705 Apple Security Article: HT4339 Apple Security Article: HT4723 Apple Security Article: HT1222 CVE-2011-0213 Secunia Advisory: SA45054 IMPACT ASSESSMENT High Discussion:

19

V-029: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary  

Broader source: Energy.gov (indexed) [DOE]

29: Mozilla Firefox Multiple Bugs Let Remote Users Execute 29: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks V-029: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks November 21, 2012 - 2:00am Addthis PROBLEM: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks PLATFORM: Version(s): prior to 17.0 ABSTRACT: Multiple vulnerabilities were reported in Mozilla Firefox REFERENCE LINKS: Mozilla Foundation Security Advisories Bugtraq ID: 55260 SecurityTracker Alert ID: 1027791 CVE-2012-4201, CVE-2012-4202, CVE-2012-4203, CVE-2012-4204, CVE-2012-4205, CVE-2012-4206, CVE-2012-4207,CVE-2012-4208, CVE-2012-4209, CVE-2012-4210, CVE-2012-4212, CVE-2012-4213, CVE-2012-4214, CVE-2012-4215, CVE-2012-4216,

20

T-718:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary  

Broader source: Energy.gov (indexed) [DOE]

8:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute 8:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code T-718:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code September 15, 2011 - 8:45am Addthis PROBLEM: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code. PLATFORM: Adobe Reader X (10.1) and earlier 10.x versions for Windows and Macintosh Adobe Reader 9.4.5 and earlier 9.x versions for Windows, Macintosh and UNIX Adobe Reader 8.3 and earlier 8.x versions for Windows and Macintosh Adobe Acrobat X (10.1) and earlier 10.x versions for Windows and Macintosh Adobe Acrobat 9.4.5 and earlier 9.x versions for Windows and Macintosh Adobe Acrobat 8.3 and earlier 8.x versions for Windows and Macintosh ABSTRACT: A remote user can create a file that, when loaded by the target user, will

Note: This page contains sample records for the topic "wireshark multiple bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

V-203: HP LoadRunner Multiple Bugs Let Remote Users Deny Service...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

system. SOLUTION: The vendor has issued a fix(11.52) Addthis Related Articles V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code V-171: Apple Safari Bugs Let...

22

T-527: OpenSC Smart Card Serial Number Multiple Buffer Overflow...  

Broader source: Energy.gov (indexed) [DOE]

Pidgin 'mxitshowmessage()' Function Stack-Based Buffer Overflow Vulnerability U-202: Apple QuickTime Multiple Stack Overflow Vulnerabilities T-543: Wireshark 0.8.20 through...

23

Water Bugs  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Bugs Bugs Nature Bulletin No. 221-A March 12, 1966 Forest Preserve District of Cook County Seymour Simon, President Roland F. Eisenbeis, Supt. of Conservation WATER BUGS It is fascinating to lie in a boat or on a log at the edge of the water and watch the drama that unfolds among the small water animals. Among the star performers in small streams and ponds are the Water Bugs. These are aquatic members of that large group of insects called the "true bugs", most of which live on land. Moreover, unlike many other types of water insects, they do not have gills but get their oxygen directly from the air. Those that do go beneath the surface usually carry an oxygen supply with them in the form of a shiny glistening sheath of air imprisoned among a covering of fine waterproof hairs. The common water insect known to small boys at the "Whirligig Bug" is not a water bug but a beetle.

24

Method-level bug prediction  

Science Journals Connector (OSTI)

Researchers proposed a wide range of approaches to build effective bug prediction models that take into account multiple aspects of the software development process. Such models achieved good prediction performance, guiding developers towards those parts ... Keywords: code metrics, fine-grained source code changes, method-level bug prediction

Emanuel Giger; Marco D'Ambros; Martin Pinzger; Harald C. Gall

2012-09-01T23:59:59.000Z

25

A bug's leaf | EMSL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

A bug's leaf A bug's leaf Leaf-cutter ant fungus gardens give bioenergy-relevant information Leafcutter ants cultivate gardens of fungi and bacteria. Photo courtesy of Alejandro...

26

Massive June Bug Emergence  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Massive June Bug Emergence Massive June Bug Emergence Name: Cordell Location: N/A Country: N/A Date: N/A Question: We are infested with june bugs next to the street light near the end of my driveway. They have burrowed into the ground and underneath my driveway. Yesterday we shoveled 2/3 of a 33-gallon trash bag of just bugs. What can we spray or do to kill these june bugs? Replies: Not knowing which part of the country you are from and I could be wrong because of this fact buy this does not sound like June Bugs. This has to be a Circadia outbreak which are relatives to the June Bug. They run in 13, 17 or other year cycles and this depends upon the part of the country you are from. Ask a local garden center or naturalist and you'll probably see that this won't happen again for a number of years to come.

27

bug | OpenEI Community  

Open Energy Info (EERE)

bug bug Home Rmckeel's picture Submitted by Rmckeel(297) Contributor 20 July, 2012 - 07:55 Image upload with broken thumbnail image bug images wiki OpenEI users can upload images to the wiki by typing a new file name http://en.openei.org/wiki/File:My_new_file.jpg However, due to a caching timing issue, right after upload, the 120px-wide thumbnail has not yet been created by the time the fetier cache goes after it. Thus, the thumbnail appears broken. Is anyone up for debugging? For users uploading images, this can be fixed by forcing a reload of the page: Rmckeel's picture Submitted by Rmckeel(297) Contributor 19 June, 2012 - 08:04 "Ghost" entries bug utility rate There is an issue that Illinois State University has come across. From Nick B: Syndicate content 429 Throttled (bot load)

28

Chinch Bugs in St. Augustine Lawns  

E-Print Network [OSTI]

Chinch bugs can be extremely damaging to home lawns. Their feeding causes small yellow or brown areas in lawns. Chinch bugs can usually be seen on careful inspection of the soil surface. Insecticides provide effective control....

Merchant, Michael E.; Mott, Dale

2006-10-17T23:59:59.000Z

29

Team Bug Bag Biogas For Nicaragua  

E-Print Network [OSTI]

Team Bug Bag Biogas For Nicaragua Project Recap The task for Team Bug Bag was to create for under $100 (USD), and be able to produce biogas that could boil water for a thirty minute time period

Demirel, Melik C.

30

Summary of Bugs Database Jeremy Kepner  

E-Print Network [OSTI]

written to create the current version of the bugs database. 1.2 Brief Project History Development1 Summary of Bugs Database Jeremy Kepner September, 1993 1. Introduction 1.1 Document Purpose of the Bugs database began in May of 1992. Initially, a very simple database model was used. By July

Kepner, Jeremy

31

Page not found | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

401 - 15410 of 28,905 results. 401 - 15410 of 28,905 results. Download REQUEST FOR RECORDS DISPOSITION AUTHORITY http://energy.gov/cio/downloads/request-records-disposition-authority-23 Article T-581: Novell Access Manager Java Double Literal Denial of Service Vulnerability Novell Access Manager Java Double Literal Denial of Service Vulnerability. http://energy.gov/cio/articles/t-581-novell-access-manager-java-double-literal-denial-service-vulnerability Article V-160: Wireshark Multiple Bugs Let Remote Users Deny Service Multiple vulnerabilities have been reported in Wireshark http://energy.gov/cio/articles/v-160-wireshark-multiple-bugs-let-remote-users-deny-service Download Before the House Science and Technology Subcommittee on Energy and Environment Subject: Marine and Hydrokinetic Energy Technology: Finding the Path to

32

U-008: Symantec Data Loss Prevention Bugs in KeyView Filter Lets Remote  

Broader source: Energy.gov (indexed) [DOE]

08: Symantec Data Loss Prevention Bugs in KeyView Filter Lets 08: Symantec Data Loss Prevention Bugs in KeyView Filter Lets Remote Users Deny Service U-008: Symantec Data Loss Prevention Bugs in KeyView Filter Lets Remote Users Deny Service October 11, 2011 - 8:00am Addthis PROBLEM: Symantec Data Loss Prevention Bugs in KeyView Filter Lets Remote Users Deny Service PLATFORM: Symantec Data Loss Prevention Enforce/Detection Servers for Windows 10.x, 11.x ABSTRACT: A remote user can create a file that, when processed by the target filter, will cause partial denial of service conditions. reference LINKS: Symantec Security Advisory SYM11-013 SecurityTracker Alert ID: 1026157 IMPACT ASSESSMENT: Medium Discussion: Multiple vulnerabilities were reported in Symantec Data Loss Prevention. A remote user can cause denial of service conditions on the target system.A

33

U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct  

Broader source: Energy.gov (indexed) [DOE]

21: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, 21: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information March 9, 2012 - 7:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information PLATFORM: Apple iOS Version(s): prior to 5.1 ABSTRACT: Multiple vulnerabilities were reported in Apple iOS. reference LINKS: SecurityTracker Alert ID: 1026774 Apple Security Updates About the security content of iOS 5.1 Software Update CVE-2012-0641, CVE-2012-0642, CVE-2012-0643, CVE-2011-3453, CVE-2012-0644,

34

T-563: Red Hat Directory Server Bugs Let Local Users Gain Elevated  

Broader source: Energy.gov (indexed) [DOE]

3: Red Hat Directory Server Bugs Let Local Users Gain Elevated 3: Red Hat Directory Server Bugs Let Local Users Gain Elevated Privileges and Remote and Local Users Deny Service T-563: Red Hat Directory Server Bugs Let Local Users Gain Elevated Privileges and Remote and Local Users Deny Service February 23, 2011 - 7:00am Addthis PROBLEM: Red Hat Directory Server Bugs Let Local Users Gain Elevated Privileges and Remote and Local Users Deny Service. PLATFORM: Red Hat Directory Server v8 EL4, Red Hat Directory Server v8 EL5 ABSTRACT: Several vulnerabilities were reported in Red Hat Directory Server. A local user can obtain elevated privileges on the target system. A remote user can cause denial of service conditions. A local user can cause denial of service conditions. A remote user can send multiple simple paged search requests to cause the

35

U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the  

Broader source: Energy.gov (indexed) [DOE]

2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, 2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information July 27, 2012 - 7:00am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information PLATFORM: Version(s):Apple Safari prior to 6.0 ABSTRACT: Multiple vulnerabilities were reported in Apple Safari. reference LINKS: The Vendor's Advisory Bugtraq ID: 54683 SecurityTracker Alert ID: 1027307 IMPACT ASSESSMENT:

36

U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the  

Broader source: Energy.gov (indexed) [DOE]

2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, 2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information July 27, 2012 - 7:00am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information PLATFORM: Version(s):Apple Safari prior to 6.0 ABSTRACT: Multiple vulnerabilities were reported in Apple Safari. reference LINKS: The Vendor's Advisory Bugtraq ID: 54683 SecurityTracker Alert ID: 1027307 IMPACT ASSESSMENT:

37

Page not found | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

61 - 11070 of 28,905 results. 61 - 11070 of 28,905 results. Download DOE Guidance-Category Rating This memorandum is to establish the Department of Energy's (DOE's) policy for the use of Category Rating. http://energy.gov/hc/downloads/doe-guidance-category-rating Article V-037: Wireshark Multiple Bugs Let Remote Users Deny Service Several vulnerabilities were reported in Wireshark. http://energy.gov/cio/articles/v-037-wireshark-multiple-bugs-let-remote-users-deny-service Article Celebrating The Next Generation of Energy Entrepreneurs Recognizing innovative, bold-thinking student entrepreneurs who are working to advance clean energy technologies. http://energy.gov/articles/celebrating-next-generation-energy-entrepreneurs Article Join Us: 2013 National Clean Energy Business Plan Competition

38

JC3 Bulletin Archive | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

March 8, 2013 V-107: Wireshark Multiple Denial of Service Vulnerabilities Multiple vulnerabilities have been reported in Wireshark, which can be exploited by malicious people to...

39

V-202: Cisco Video Surveillance Manager Bugs Let Remote Users...  

Broader source: Energy.gov (indexed) [DOE]

2: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain Potentially Sensitive Information V-202: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain Potentially...

40

U-047: Siemens Automation License Manager Bugs Let Remote Users...  

Broader source: Energy.gov (indexed) [DOE]

7: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or...

Note: This page contains sample records for the topic "wireshark multiple bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

U-012: BlackBerry Enterprise Server Collaboration Service Bug...  

Broader source: Energy.gov (indexed) [DOE]

12: BlackBerry Enterprise Server Collaboration Service Bug Lets Remote Users Impersonate Intra-organization Messages U-012: BlackBerry Enterprise Server Collaboration Service Bug...

42

Scale Insects and Mealy Bugs  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Scale Insects and Mealy Bugs Scale Insects and Mealy Bugs Nature Bulletin No. 404-A January 30, 1971 Forest Preserve District of Cook County George W. Dunne, President Roland F. Eisenbeis, Supt. of Conservation SCALE INSECTS AND MEALY BUGS The insect world contains an enormous number and variety of species but, of them all, the Scale Insects and Mealy Bugs come nearest to being vegetables. Most insects are active animals that fly, hop, scamper, crawl or burrow, but these queer creatures spend most of their lives merely sitting in one spot, sucking plant juices from a branch, twig, leaf, or fruit. Some of our most destructive pests are included among the several hundred kinds of these highly specialized insects. They are so small that the average person seldom realizes that they are responsible for the sickly or dying condition of a tree or shrub. Adult scale insects are extremely variable in shape, and range in size from that of a pinhead up to forms which are a quarter of an inch long. Each hides under a hard protective shell, or scale, of wax secreted by pores on its body, and are frequently so numerous that they form a dense crust. The females molt a few times, and usually discard their legs and wings, before they mature. She lays eggs under the scale and then dies. These hatch into young (called "crawlers") which move around for a period varying from a few hours to a day or two before they settle down and build scales. Unlike the female, the male -always the smaller of the two -- goes through a cocoon stage from which he emerges with a pair of wings but with no means of taking food. He merely mates and dies. Males are scarce In most kinds and in many species have never been seen.

43

T-652: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and Execute  

Broader source: Energy.gov (indexed) [DOE]

2: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and 2: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and Execute Arbitrary Code T-652: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and Execute Arbitrary Code June 22, 2011 - 2:55pm Addthis PROBLEM: Multiple vulnerabilities were reported in Mozilla Thunderbird. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can obtain cookies from another domain in certain cases. A remote user can create specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system [CVE-2011-2364, CVE-2011-2374, CVE-2011-2375, CVE-2011-2376]. The code will run with the privileges of the target user. PLATFORM: Mozilla Thunderbird prior to 3.1.11

44

Dynamically fighting bugs : prevention, detection and elimination  

E-Print Network [OSTI]

This dissertation presents three test-generation techniques that are used to improve software quality. Each of our techniques targets bugs that are found by different stake-holders: developers, testers, and maintainers. ...

Artzi, Shay

2009-01-01T23:59:59.000Z

45

Bed Bugs: Clinical Relevance and Control Options  

Science Journals Connector (OSTI)

...most do not come with quality efficacy data; an industry standard can review these...Anonymous. 2010. Bedbug bites becoming bigger battle. CMAJ 182 : 1606. 19. Anonymous...bug (Hemiptera: Cimicidae) by static electricity and air currents. J. Entomol. Sci...

Stephen L. Doggett; Dominic E. Dwyer; Pablo F. Peñas; Richard C. Russell

2012-01-01T23:59:59.000Z

46

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Medium Impact Medium Impact Assessment Bulletins JC3 Medium Impact Assessment Bulletins RSS December 4, 2012 V-039: Samsung and Dell printers Firmware Backdoor Unauthorized Access Vulnerability Samsung has issued a security advisory and an optional firmware update for all current Samsung networked laser printers and multifunction devices to enhance Simple Network Management Protocol (SNMP) security. November 30, 2012 V-037: Wireshark Multiple Bugs Let Remote Users Deny Service Several vulnerabilities were reported in Wireshark. November 29, 2012 V-036: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability Two vulnerabilities were reported in EMC Smarts Network Configuration Manager. November 27, 2012 V-034: RSA Adaptive Authentication (On-Premise) Input Validation Flaws

47

U-153: EMC Data Protection Advisor Server and Collector Bugs...  

Broader source: Energy.gov (indexed) [DOE]

53: EMC Data Protection Advisor Server and Collector Bugs Let Remote Users Deny Service U-153: EMC Data Protection Advisor Server and Collector Bugs Let Remote Users Deny Service...

48

Bed Bugs: Clinical Relevance and Control Options  

Science Journals Connector (OSTI)

...assist those who cannot pay the high price of control, bed bugs are set to...antigen and bronchial asthma in Egypt. J. Egypt. Soc. Parasitol. 21 : 735-746...Doggett, SL . 2009. Identification natural history, p 13-22. InSL Doggett...

Stephen L. Doggett; Dominic E. Dwyer; Pablo F. Peñas; Richard C. Russell

2012-01-01T23:59:59.000Z

49

V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot...  

Broader source: Energy.gov (indexed) [DOE]

Bug Lets Local Users Deny Service V-098: Linux Kernel Extended Verification Module Bug Lets Local Users Deny Service U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...

50

JC3 Bulletin Archive | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

14, 2011 14, 2011 T-717: Microsoft Security Bulletin Summary for September 2011 Microsoft Security Bulletin Summary for September 2011. September 14, 2011 T-716: Google SketchUp v8.x - '.DAE' File Memory Corruption Vulnerability Google SketchUp v8.x - '.DAE' File Memory Corruption Vulnerability September 13, 2011 T-715: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting Attacks Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting Attacks. September 12, 2011 T-714:Wireshark OpenSafety and CSN.1 Dissector Bugs Wireshark OpenSafety and CSN.1 Dissector Bugs Lets Remote Users Deny Service. September 9, 2011 T-713: Blue Coat Reporter Directory Traversal Flaw Blue Coat Reporter Directory Traversal Flaw Lets Remote Users Gain Full Control. September 8, 2011

51

U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain...  

Broader source: Energy.gov (indexed) [DOE]

9: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass...

52

U-163: PHP Command Parameter Bug Lets Remote Users Obtain Potentially...  

Broader source: Energy.gov (indexed) [DOE]

63: PHP Command Parameter Bug Lets Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code U-163: PHP Command Parameter Bug Lets Remote Users Obtain...

53

V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting...  

Energy Savers [EERE]

V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions V-026: RSA Data Protection Manager Bugs Permit...

54

Microsoft Word - Final BUGS article final.docx  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

of a good peak resource (Figure 1). Characteristics of a Good Peak Resource Demand Response Program Central- Station Peaker BUGS for Peaks Close to the Load ...

55

U-052: HP Protect Tools Device Access Manager Unspecified Bug...  

Broader source: Energy.gov (indexed) [DOE]

Flaw Lets Remote Users Update Firmware with Arbitrary Code U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code U-049:...

56

V-025: Bugzilla Multiple Cross Site Scripting and Information...  

Broader source: Energy.gov (indexed) [DOE]

to version 3.6.12, 4.0.9, or 4.2.4 or apply patches. Addthis Related Articles V-080: Apple iOS Multiple Vulnerabilities T-568: Mozilla Firefox Bugs Let Remote Users Conduct...

57

JC3 High Impact Assessment Bulletins | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

31, 2013 31, 2013 V-081: Wireshark Multiple Vulnerabilities Multiple vulnerabilities have been reported in Wireshark January 30, 2013 V-080: Apple iOS Multiple Vulnerabilities Apple iOS Multiple Vulnerabilities January 25, 2013 V-077: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication A remote user can gain administrative access to the target system. January 18, 2013 V-072: Red Hat update for java-1.7.0-openjdk Red Hat has issued an update for java-1.7.0-openjdk. January 15, 2013 V-069: BlackBerry Tablet OS Adobe Flash Player and Samba Multiple Vulnerabilities Multiple vulnerabilities have been reported in BlackBerry Tablet OS January 11, 2013 V-067: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code Oracle Java Flaw Lets Remote Users Execute Arbitrary Code

58

V-029: Mozilla Firefox Multiple Bugs Let Remote Users Execute...  

Broader source: Energy.gov (indexed) [DOE]

that, when loaded by the target user, will trigger a buffer overflow, use-after-free memory error, or memory corruption error and execute arbitrary code on the target system. The...

59

History's Worst Software Bugs By Simson Garfinkel Story location: http://www.wired.com/news/technology/bugs/0,2924,69355,00.html  

E-Print Network [OSTI]

they lurk within our cell phones and our pacemakers, our power plants and medical equipment. And now, in our working for the U.S. Central Intelligence Agency allegedly (.pdf) plant a bug in a Canadian computer: "first actual case of a bug being found." Sixty years later, computer bugs are still with us, and show

Overstreet, C. Michael

60

U-141: Sourcefire Defense Center Bugs | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

1: Sourcefire Defense Center Bugs 1: Sourcefire Defense Center Bugs U-141: Sourcefire Defense Center Bugs April 5, 2012 - 8:30am Addthis PROBLEM: Sourcefire Defense Center Bugs Let Remote Users Traverse the Directory, Access the Database, and Conduct Cross-Site Scripting Attacks PLATFORM: Version(s): prior to 4.10.2.3 ABSTRACT: Several vulnerabilities were reported in Sourcefire Defense Center. A remote user can conduct cross-site scripting attacks. A remote user can access the database. A remote user can view files on the target system reference LINKS: Original Advisory Security Tracker ID 1026890 Secunia Advisory 48667 IMPACT ASSESSMENT: Medium Discussion: A remote user can cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the Sourcefire Defense

Note: This page contains sample records for the topic "wireshark multiple bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

U-141: Sourcefire Defense Center Bugs | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

1: Sourcefire Defense Center Bugs 1: Sourcefire Defense Center Bugs U-141: Sourcefire Defense Center Bugs April 5, 2012 - 8:30am Addthis PROBLEM: Sourcefire Defense Center Bugs Let Remote Users Traverse the Directory, Access the Database, and Conduct Cross-Site Scripting Attacks PLATFORM: Version(s): prior to 4.10.2.3 ABSTRACT: Several vulnerabilities were reported in Sourcefire Defense Center. A remote user can conduct cross-site scripting attacks. A remote user can access the database. A remote user can view files on the target system reference LINKS: Original Advisory Security Tracker ID 1026890 Secunia Advisory 48667 IMPACT ASSESSMENT: Medium Discussion: A remote user can cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the Sourcefire Defense

62

V-098: Linux Kernel Extended Verification Module Bug Lets Local...  

Broader source: Energy.gov (indexed) [DOE]

reported in the Linux Kernel. REFERENCE LINKS: The Linux Kernel Archives Linux Kernel Red Hat Bugzilla - Bug 913266 SecurityTracker Alert ID: 1028196 CVE-2013-0313 IMPACT...

63

V-149: Microsoft Internet Explorer Object Access Bug Lets Remote...  

Broader source: Energy.gov (indexed) [DOE]

CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code...

64

V-128: Xen Event Channel Tracking Pointer Bug Local Privilege...  

Broader source: Energy.gov (indexed) [DOE]

privileges on the target host system. SOLUTION: The vendor has issued a fix (xsa47-4.1.patch, xsa47-4.2-unstable.patch). Addthis Related Articles U-232: Xen p2mteardown() Bug...

65

T-633: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets...  

Broader source: Energy.gov (indexed) [DOE]

33: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets Remote Users Deny Service T-633: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets Remote Users Deny Service May 31,...

66

T-579: BlackBerry Device Software Bug in WebKit Lets Remote Users...  

Broader source: Energy.gov (indexed) [DOE]

79: BlackBerry Device Software Bug in WebKit Lets Remote Users Execute Code T-579: BlackBerry Device Software Bug in WebKit Lets Remote Users Execute Code March 15, 2011 - 5:05pm...

67

T-563: Red Hat Directory Server Bugs Let Local Users Gain Elevated...  

Office of Environmental Management (EM)

T-563: Red Hat Directory Server Bugs Let Local Users Gain Elevated Privileges and Remote and Local Users Deny Service T-563: Red Hat Directory Server Bugs Let Local Users Gain...

68

U-201: HP System Management Homepage Bugs Let Remote Users Deny...  

Broader source: Energy.gov (indexed) [DOE]

01: HP System Management Homepage Bugs Let Remote Users Deny Service U-201: HP System Management Homepage Bugs Let Remote Users Deny Service June 28, 2012 - 7:00am Addthis PROBLEM:...

69

U-053: Linux kexec Bugs Let Local and Remote Users Obtain Potentially...  

Energy Savers [EERE]

and enhancement update U-068:Linux Kernel SGIO ioctl Bug Lets Local Users Gain Elevated Privileges T-712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update...

70

V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets...  

Office of Environmental Management (EM)

71: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service...

71

V-015: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...  

Broader source: Energy.gov (indexed) [DOE]

5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information V-015: Apple iOS Bugs Let Remote...

72

U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...  

Broader source: Energy.gov (indexed) [DOE]

21: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-121: Apple iOS Bugs Let Remote...

73

JC3 Bulletin Archive | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

24, 2012 24, 2012 U-176: Wireshark Multiple Bugs Let Remote Users Deny Service Several vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions. May 23, 2012 U-175: Linux Kernel KVM Memory Slot Management Flaw A vulnerability was reported in the Linux Kernel. A local user on the guest operating system can cause denial of service conditions on the host operating system. May 22, 2012 U-174: Serendipity Unspecified SQL Injection Vulnerability A vulnerability was reported in Serendipity. A remote user can inject SQL commands. May 21, 2012 U-173: Symantec Web Gateway Multiple Vulnerabilities Several vulnerabilities were reported in Symantec Web Gateway. A remote user can include and execute arbitrary code on the target system. A remote

74

Microsoft Word - Final BUGS article final.docx  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

October 18, 2010 DOE/NETL-2010/1435 BUGS: The Next Smart Grid Peak Resource? BUGS: The Next Smart Grid Peak Resource? 2 Prepared by: Booz Allen Hamilton (BAH) Steve Pullins Horizon Energy Group DOE Contract number: DE-FE000400 BUGS: The Next Smart Grid Peak Resource? 3 Acknowledgements This report was prepared by Booz Allen Hamilton, Inc. (BAH) for the United States Department of Energy's National Energy Technology Laboratory. This work was completed under DOE NETL Contract Number DE-FE000400, and performed under BAH Task 430.04. The authors wish to acknowledge the excellent guidance, contributions, and cooperation of the NETL staff, particularly: Steven Bossart, Integrated Electric Power Systems Division Director Keith Dodrill, Integrated Electric Power Systems Division NETL Technical Monitor

75

Lockout: Efficient Testing for Deadlock Bugs Ali Kheradmand  

E-Print Network [OSTI]

Lockout: Efficient Testing for Deadlock Bugs Ali Kheradmand School of Computer and Communication introduce Lockout, a technique and a tool that increases the proba- bility of deadlock manifestation and the testing infrastructure. Lockout produces binaries that are more prone to deadlock compared to native

Candea, George

76

Foiling the Flu Bug Global Partnerships for Nuclear Energy  

E-Print Network [OSTI]

1 1663 Foiling the Flu Bug Global Partnerships for Nuclear Energy Dark Universe Mysteries WILL NOT NEED TESTING Expanding Nuclear Energy the Right Way GLOBAL PARTNERSHIPS AND AN ADVANCED FUEL CYCLE sense.The Laboratory is operated by Los Alamos National Security, LLC, for the Department of Energy

77

U-061: RSA Adaptive Authentication Bugs Let Remote Users Bypass...  

Broader source: Energy.gov (indexed) [DOE]

Bugs Let Remote Users Bypass Certain Security Controls. PLATFORM: 6.0.2.1 SP1 Patch 2 and SP1 Patch 3 6.0.2.1 SP2 and SP2 Patch 1 6.0.2.1 SP3 ABSTRACT: A remote user may...

78

T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request  

Broader source: Energy.gov (indexed) [DOE]

68: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site 68: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request Forgery Attacks and Execute Arbitrary Code T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request Forgery Attacks and Execute Arbitrary Code March 2, 2011 - 3:05pm Addthis PROBLEM: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request Forgery Attacks and Execute Arbitrary Code. PLATFORM: Firefox, Thunderbird, SeaMonkey ABSTRACT: Mozilla developers identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and Mozilla presume that with enough effort at least some of these could be exploited to run arbitrary code. reference LINKS:

79

U-049: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users...  

Energy Savers [EERE]

Netcool Reporter Support and Downloads . Addthis Related Articles U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code U-048:...

80

U-045: Windows Win32k.sys Keyboard Layout Bug Lets Local Users...  

Broader source: Energy.gov (indexed) [DOE]

Restrict access to trusted users only. Addthis Related Articles U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code U-046:...

Note: This page contains sample records for the topic "wireshark multiple bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

OpenEI/URDB Bug? | OpenEI Community  

Open Energy Info (EERE)

OpenEI/URDB Bug? OpenEI/URDB Bug? Home > Groups > Utility Rate Clarknd's picture Submitted by Clarknd(20) Member 26 November, 2012 - 07:39 I ran into a problem today on the Utility Rate Database (URDB). Every time I select the "Assume net metering (buy = sell)" box and go to save the page for some reason it doesn't save that change and reverts back to "No" rather than "Yes". Groups: Utility Rate Login to post comments Latest discussions Rmckeel New page curation tool Posted: 7 May 2013 - 08:16 by Rmckeel Rmckeel Considering removing "Show Preview" button on utility rate form edit Posted: 22 Apr 2013 - 13:55 by Rmckeel 5 comment(s) 1 of 10 ›› Groups Menu You must login in order to post into this group. Latest discussion comments NickL

82

Entrapment of bed bugs by leaf trichomes inspires microfabrication of biomimetic surfaces  

Science Journals Connector (OSTI)

...18 h; the total area impacted by 60 bug feet with eight locomotory cycles per minute...generally occurred on the underside of the foot. The same legs that appeared irreversibly...potential to harness the bed bug-entrapping power of natural leaf surfaces using purely physical...

2013-01-01T23:59:59.000Z

83

Using Combinatorial Benchmark Construction to Improve the Assessment of Concurrency Bug Detection Tools  

E-Print Network [OSTI]

of performance measures. The inclusion of performance measures ensure that we can assess the fitnessUsing Combinatorial Benchmark Construction to Improve the Assessment of Concurrency Bug Detection, it is difficult to assess the fitness of a particular con- currency bug detection method and to compare

Bradbury, Jeremy S.

84

U-027: RSA Key Manager Appliance Session Logout Bug Fails to Terminate  

Broader source: Energy.gov (indexed) [DOE]

7: RSA Key Manager Appliance Session Logout Bug Fails to 7: RSA Key Manager Appliance Session Logout Bug Fails to Terminate Sessions U-027: RSA Key Manager Appliance Session Logout Bug Fails to Terminate Sessions November 4, 2011 - 8:00am Addthis PROBLEM: RSA Key Manager Appliance Session Logout Bug Fails to Terminate Sessions. PLATFORM: RSA Key Manager Appliance 2.7 Service Pack 1 ABSTRACT: A remote authenticated user session may not terminate properly. reference LINKS: SecurityTracker Alert ID: 1026276 SecurityFocus Bug Traq Seclists: ESA-2011-035 CVE-2011-2740 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in RSA Key Manager Appliance. A remote authenticated user session may not terminate properly. When using Firefox 4 and 5, an authenticated user session is not terminated properly when logging out.

85

V-098: Linux Kernel Extended Verification Module Bug Lets Local Users Deny  

Broader source: Energy.gov (indexed) [DOE]

8: Linux Kernel Extended Verification Module Bug Lets Local 8: Linux Kernel Extended Verification Module Bug Lets Local Users Deny Service V-098: Linux Kernel Extended Verification Module Bug Lets Local Users Deny Service February 25, 2013 - 12:12am Addthis PROBLEM: Linux Kernel Extended Verification Module Bug Lets Local Users Deny Service PLATFORM: The Linux Kernel prior to 3.7.5 ABSTRACT: A vulnerability was reported in the Linux Kernel. REFERENCE LINKS: The Linux Kernel Archives Linux Kernel Red Hat Bugzilla - Bug 913266 SecurityTracker Alert ID: 1028196 CVE-2013-0313 IMPACT ASSESSMENT: Medium DISCUSSION: A local user can exploit a null pointer dereference in the evm_update_evmxattr() function in 'security/integrity/evm/evm_crypto.c' to cause the target system to crash. IMPACT: A local user can cause denial of service conditions.

86

U-068:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated  

Broader source: Energy.gov (indexed) [DOE]

8:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated 8:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated Privileges U-068:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated Privileges December 23, 2011 - 8:45am Addthis PROBLEM: Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated Privileges PLATFORM: Red Hat Enterprise Linux Desktop (v. 6) Red Hat Enterprise Linux HPC Node (v. 6) Red Hat Enterprise Linux Server (v. 6) Red Hat Enterprise Linux Server AUS (v. 6.2) Red Hat Enterprise Linux Server EUS (v. 6.2.z) Red Hat Enterprise Linux Workstation (v. 6) ABSTRACT: A local privileged user on the guest operating system can obtain elevated privileges on the target system. reference LINKS: Red Hat kernel security and bug fix update SecurityTracker Alert ID: 1026453 SecurityTracker Alert ID: 1026454

87

T-700:Red Hat: kernel security, bug fix, and enhancement update |  

Broader source: Energy.gov (indexed) [DOE]

700:Red Hat: kernel security, bug fix, and enhancement update 700:Red Hat: kernel security, bug fix, and enhancement update T-700:Red Hat: kernel security, bug fix, and enhancement update August 24, 2011 - 3:45pm Addthis PROBLEM: Updated kernel packages that fix several security issues, various bugs, and add two enhancements are now available for Red Hat Enterprise Linux 6. PLATFORM: Red Hat Enterprise Linux Desktop (v. 6) Red Hat Enterprise Linux HPC Node (v. 6) Red Hat Enterprise Linux Server (v. 6) Red Hat Enterprise Linux Server EUS (v. 6.1.z) Red Hat Enterprise Linux Workstation (v. 6) ABSTRACT: Red Hat: kernel security, bug fix, and enhancement update. reference LINKS: RHSA-2011: 1189-1 Secunia Advisory: SA45746 Red Hat Download CVE-2011-1182 , CVE-2011-1576 CVE-2011-1593 , CVE-2011-1776 CVE-2011-1898 , CVE-2011-2183

88

V-040: Apache Tomcat Bug Lets Remote Users Bypass Security Constraints |  

Broader source: Energy.gov (indexed) [DOE]

0: Apache Tomcat Bug Lets Remote Users Bypass Security 0: Apache Tomcat Bug Lets Remote Users Bypass Security Constraints V-040: Apache Tomcat Bug Lets Remote Users Bypass Security Constraints December 5, 2012 - 1:00am Addthis PROBLEM: Apache Tomcat Bug Lets Remote Users Bypass Security Constraints PLATFORM: Version(s): 6.0.0 - 6.0.35, 7.0.0 - 7.0.29 ABSTRACT: A vulnerability was reported in Apache Tomcat. REFERENCE LINKS: Apache Tomcat Red Hat Bugzilla - Bug 883634 SecurityTracker Alert ID: 1027833 CVE-2012-3546 IMPACT ASSESSMENT: High DISCUSSION: When using FORM authentication it was possible to bypass the security constraint checks in the FORM authenticator by appending /j_security_check to the end of the URL if some other component (such as the Single-Sign-On valve) had called request.setUserPrincipal() before the call to

89

U-210: Linux Kernel epoll_ctl() Bug Lets Local Users Deny Service |  

Broader source: Energy.gov (indexed) [DOE]

10: Linux Kernel epoll_ctl() Bug Lets Local Users Deny Service 10: Linux Kernel epoll_ctl() Bug Lets Local Users Deny Service U-210: Linux Kernel epoll_ctl() Bug Lets Local Users Deny Service July 11, 2012 - 7:00am Addthis PROBLEM: Linux Kernel epoll_ctl() Bug Lets Local Users Deny Service PLATFORM: Version(s): 2.6.x ABSTRACT: A vulnerability was reported in the Linux Kernel. A local user can cause denial of service conditions. reference LINKS: The Vendor's Advisory SecurityTracker Alert ID: 1027237 SecurityTracker Alert ID: 1027240 Red Hat advisory CVE-2012-3375 IMPACT ASSESSMENT: Medium Discussion: The Linux kernel's Event Poll (epoll) subsystem does not properly handle resource clean up when an ELOOP error code is returned. A local user can exploit this to cause the target system to crash. Impact: A local user can cause the target system to crash.

90

U-217: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site  

Broader source: Energy.gov (indexed) [DOE]

7: Red Hat Certificate System Bugs Let Remote Users Conduct 7: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site Scripting and Denial of Service Attacks U-217: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site Scripting and Denial of Service Attacks July 20, 2012 - 7:00am Addthis PROBLEM: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site Scripting and Denial of Service Attacks PLATFORM: Red Hat Certificate System v8 ABSTRACT: Two vulnerabilities were reported in Red Hat Certificate System. A remote user can conduct cross-site scripting attacks. A remote authenticated user can revoke the CA certificate. reference LINKS: Advisory: RHSA-2012:1103-1 SecurityTracker Alert ID: 1027284 CVE-2012-2662 CVE-2012-3367 IMPACT ASSESSMENT: Medium Discussion: The Agent and End Entity pages do not properly filter HTML code from

91

U-168: EMC Documentum Information Rights Management Server Bugs Let Remote  

Broader source: Energy.gov (indexed) [DOE]

168: EMC Documentum Information Rights Management Server Bugs Let 168: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service U-168: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service May 14, 2012 - 7:00am Addthis PROBLEM: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service PLATFORM: Information Rights Management Server 4.x, 5.x ABSTRACT: Two vulnerabilities were reported in EMC Documentum Information Rights Management Server. A remote authenticated user can cause denial of service conditions. Reference links: SecurityTracker Alert ID: 1027058 CVE-2012-2276 CVE-2012-2277 IMPACT ASSESSMENT: High Discussion: A remote authenticated user can send specially crafted data to trigger a NULL pointer dereference and cause the target service to crash. A remote

92

U-130: JBoss Operations Network LDAP Authentication Bug Lets Remote Users  

Broader source: Energy.gov (indexed) [DOE]

0: JBoss Operations Network LDAP Authentication Bug Lets Remote 0: JBoss Operations Network LDAP Authentication Bug Lets Remote Users Bypass Authentication U-130: JBoss Operations Network LDAP Authentication Bug Lets Remote Users Bypass Authentication March 21, 2012 - 7:00am Addthis PROBLEM: JBoss Operations Network LDAP Authentication Bug Lets Remote Users Bypass Authentication PLATFORM: JBoss Operations Network 2.x ABSTRACT: A vulnerability was reported in JBoss Operations Network. A remote user can login with an arbitrary password in certain cases. reference LINKS: SecurityTracker Alert ID: 1026826 Secunia Advisory SA48471 CVE-2012-1100 IMPACT ASSESSMENT: Medium Discussion: The vulnerability is caused due to an error within the Lightweight Directory Access Protocol (LDAP) authentication when handling invalid bind account credentials, which can be exploited to log-in to LDAP-based

93

V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |  

Broader source: Energy.gov (indexed) [DOE]

10: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 10: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code March 13, 2013 - 12:04am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): 1.6.602.171 and prior for Windows/Mac; other versions on other platforms ABSTRACT: Several vulnerabilities were reported in Adobe Flash Player. REFERENCE LINKS: Adobe Vulnerability identifier: APSB13-09 SecurityTracker Alert ID: 1028277 CVE-2013-0646 CVE-2013-0650 CVE-2013-1371 CVE-2013-1375 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user.

94

U-074: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands,  

Broader source: Energy.gov (indexed) [DOE]

4: Microsoft .NET Bugs Let Remote Users Execute Arbitrary 4: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users U-074: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users January 4, 2012 - 8:00am Addthis PROBLEM: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users . PLATFORM: Windows XP Service Pack 3 Windows XP Professional x64 Edition Service Pack 2 Windows Server 2003 Service Pack 2 Windows Server 2003 x64 Edition Service Pack 2 Windows Server 2003 with SP2 for Itanium-based Systems Windows Vista Service Pack 2 Windows Vista x64 Edition Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 Windows Server 2008 for x64-based Systems Service Pack 2

95

U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users  

Broader source: Energy.gov (indexed) [DOE]

9: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain 9: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication May 1, 2012 - 7:00am Addthis PROBLEM: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication PLATFORM: Red Hat Enterprise MRG v2 for Red Hat Enterprise Linux (version 6) ABSTRACT: A vulnerability was reported in Red Hat Enterprise MRG Messaging. A remote user can access cluster messages and view the internal configuration. reference LINKS: SecurityTracker Alert ID: 1026990 CVE-2011-3620 Red Hat advisory IMPACT ASSESSMENT: High Discussion: Qpid may accept arbitrary passwords and SASL mechanims. A remote user on the local private interconnect network with knowledge of a valid cluster

96

V-016: HP Performance Insight Bugs with Sybase Database Let Remote Users  

Broader source: Energy.gov (indexed) [DOE]

6: HP Performance Insight Bugs with Sybase Database Let Remote 6: HP Performance Insight Bugs with Sybase Database Let Remote Users Deny Service and Take Full Control of the Target System V-016: HP Performance Insight Bugs with Sybase Database Let Remote Users Deny Service and Take Full Control of the Target System November 5, 2012 - 6:00am Addthis PROBLEM: HP Performance Insight Bugs with Sybase Database Let Remote Users Deny Service and Take Full Control of the Target System PLATFORM: HP Performance Insight v5.31, v5.40 and v5.41 running on HP-UX, Solaris, Linux, and Windows and using Sybase as the database ABSTRACT: Two vulnerabilities were reported in HP Performance Insight. REFERENCE LINKS: HP Support Document ID: c03555488 SecurityTracker Alert ID: 1027719 CVE-2012-3269 CVE-2012-3270 IMPACT ASSESSMENT: High DISCUSSION:

97

U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service |  

Broader source: Energy.gov (indexed) [DOE]

57: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny 57: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service September 12, 2012 - 6:00am Addthis PROBLEM: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service PLATFORM: ColdFusion 10, 9.0.2, 9.0.1, 9.0, 8.0.1, and 8.0 for Windows, Macintosh and UNIX ABSTRACT: Adobe ColdFusion is prone to a remote denial-of-service vulnerability. reference LINKS: Adobe Security bulletins and advisories Adobe Vulnerability identifier: APSB12-21 SecurityTracker Alert ID: 1027516 Bugtraq ID: 55499 CVE-2012-2048 IMPACT ASSESSMENT: Medium Discussion: Adobe has released a security hotfix for ColdFusion 10 and earlier versions for Windows, Macintosh and UNIX. This update resolves a vulnerability which

98

V-146: HP Service Manager Bugs Permit Cross-Site Scripting and Information  

Broader source: Energy.gov (indexed) [DOE]

6: HP Service Manager Bugs Permit Cross-Site Scripting and 6: HP Service Manager Bugs Permit Cross-Site Scripting and Information Disclosure Attacks V-146: HP Service Manager Bugs Permit Cross-Site Scripting and Information Disclosure Attacks May 1, 2013 - 12:43am Addthis PROBLEM: HP Service Manager Bugs Permit Cross-Site Scripting and Information Disclosure Attacks PLATFORM: Service Manager v9.31 Web Tier ABSTRACT: Two vulnerabilities were reported in HP Service Manager REFERENCE LINKS: HP Document ID: c03748875 SecurityTracker Alert ID: 1028496 CVE-2012-5222 CVE-2013-2321 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can obtain potentially sensitive information [CVE-2012-5222]. Service Manager Web Tier does not properly filter HTML code from user-supplied input before displaying the input [CVE-2013-2321]. A remote

99

U-233: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote  

Broader source: Energy.gov (indexed) [DOE]

3: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote 3: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote Authenticated Users Gain Elevated Privileges U-233: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote Authenticated Users Gain Elevated Privileges August 13, 2012 - 7:00am Addthis PROBLEM: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote Authenticated Users Gain Elevated Privileges PLATFORM: Oracle Database Server versions 10.2.0.3, 10.2.0.4, 10.2.0.5, 11.1.0.7, 11.2.0.2, 11.2.0.3 ABSTRACT: A remote authenticated user with 'Create Table' privileges can gain 'SYS' privileges on the target system. Reference LINKS: Oracle Security Alert Oracle Security Alert - CVE-2012-3132 Risk Matrices SecurityTracker Alert ID: 1027367 CVE-2012-3132 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Oracle Database. This vulnerability is not

100

U-026: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject  

Broader source: Energy.gov (indexed) [DOE]

6: Cisco Small Business SRP500 Series Bug Lets Remote Users 6: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject Commands U-026: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject Commands November 3, 2011 - 8:15am Addthis PROBLEM: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject Commands. PLATFORM: The following models are affected when running firmware prior to version 1.1.24: Cisco SRP521W Cisco SRP526W Cisco SRP527W The following models are affected when running firmware prior to version 1.2.1: Cisco SRP541W Cisco SRP546W Cisco SRP547W ABSTRACT: A remote user can create a URL that, when loaded by the target authenticated administrative user, will execute arbitrary commands on the target system. reference LINKS: Advisory ID: cisco-sa-20111102-srp500 SecurityTracker Alert ID: 1026266

Note: This page contains sample records for the topic "wireshark multiple bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

U-155: WebCalendar Access Control and File Inclusion Bugs Let Remote Users  

Broader source: Energy.gov (indexed) [DOE]

5: WebCalendar Access Control and File Inclusion Bugs Let 5: WebCalendar Access Control and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code U-155: WebCalendar Access Control and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code April 25, 2012 - 7:00am Addthis PROBLEM: WebCalendar Access Control and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code PLATFORM: 1.2.4 and prior versions ABSTRACT: Two vulnerabilities were reported in WebCalendar. A remote user may be able to execute arbitrary PHP code on the target system. reference links: SecurityTracker Alert ID: 1026966 CVE-2012-1495 CVE-2012-1496 IMPACT ASSESSMENT: Medium Discussion: A remote user can access '/install/index.php' to potentially modify '/includes/settings/' with arbitrary values or PHP code. A remote

102

U-163: PHP Command Parameter Bug Lets Remote Users Obtain Potentially  

Broader source: Energy.gov (indexed) [DOE]

3: PHP Command Parameter Bug Lets Remote Users Obtain 3: PHP Command Parameter Bug Lets Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code U-163: PHP Command Parameter Bug Lets Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code May 7, 2012 - 7:00am Addthis PROBLEM: PHP Command Parameter Bug Lets Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code PLATFORM: Prior to 5.3.12 and 5.4.2 ABSTRACT: A vulnerability was reported in PHP. A remote user can obtain potentially sensitive information. A remote user can execute arbitrary code on the target system. reference LINKS: SecurityTracker Alert ID: 1027022 CVE-2012-1823 CVE-2012-2311 IMPACT ASSESSMENT: High Discussion: A remote user can submit a specially crafted request containing a command

103

V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and  

Broader source: Energy.gov (indexed) [DOE]

1: Apple Safari Bugs Let Remote Users Execute Arbitrary Code 1: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks June 5, 2013 - 1:05am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks PLATFORM: Apple Safari prior to 6.0.5 ABSTRACT: Several vulnerabilities were reported in Apple Safari. REFERENCE LINKS: Apple Article: HT5785 SecurityTracker Alert ID: 1028627 CVE-2013-0926 CVE-2013-1009 CVE-2013-1012 CVE-2013-1013 CVE-2013-1023 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary

104

U-076: OpenSSL Bugs Let Remote Users Deny Service, Obtain Information, and  

Broader source: Energy.gov (indexed) [DOE]

76: OpenSSL Bugs Let Remote Users Deny Service, Obtain 76: OpenSSL Bugs Let Remote Users Deny Service, Obtain Information, and Potentially Execute Arbitrary Code U-076: OpenSSL Bugs Let Remote Users Deny Service, Obtain Information, and Potentially Execute Arbitrary Code January 6, 2012 - 8:15am Addthis PROBLEM: OpenSSL Bugs Let Remote Users Deny Service, Obtain Information, and Potentially Execute Arbitrary Code PLATFORM: OpenSSL prior to 0.9.8s; 1.x prior to 1.0.0f ABSTRACT: A remote user may be able to execute arbitrary code on the target system. reference LINKS: SecurityTracker Alert ID: 1026485 OpenSSL Security Advisory IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in OpenSSL. A remote user can cause denial of service conditions. A remote user can obtain sensitive information. A remote user may be able to execute arbitrary code on the

105

V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting  

Broader source: Energy.gov (indexed) [DOE]

0: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site 0: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information April 23, 2013 - 12:26am Addthis PROBLEM: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information PLATFORM: Apache ActiveMQ versions prior to 5.8.0 ABSTRACT: Several vulnerabilities were reported in Apache ActiveMQ. REFERENCE LINKS: Apache ActiveMQ SecurityTracker Alert ID: 1028457 CVE-2012-6092 CVE-2012-6551 CVE-2013-3060 IMPACT ASSESSMENT: High DISCUSSION: Several web demos do not properly filter HTML code from user-supplied input

106

T-589: Citrix XenApp and Citrix Presentation Server Bug | Department of  

Broader source: Energy.gov (indexed) [DOE]

9: Citrix XenApp and Citrix Presentation Server Bug 9: Citrix XenApp and Citrix Presentation Server Bug T-589: Citrix XenApp and Citrix Presentation Server Bug March 28, 2011 - 3:05pm Addthis PROBLEM: Citrix XenApp and Citrix Presentation Server Bug in ActiveSync Lets Remote Users Execute Arbitrary Code. PLATFORM: Citrix XenApp Presentation versions 4.5, 5 ABSTRACT: A vulnerability was reported in Citrix XenApp (Presentation Server). A remote user can execute arbitrary code on the target system. -------------------------------------------------------------------------------- LINKS: DOE-CIRC BULLETIN: http://www.doecirc.energy.gov/bulletins/t-589.shtml OTHER LINKS: Citrix Document: CTX128366 SecurityTracker Alert ID: 1025254 Citrix Support Technical Support Downloads --------------------------------------------------------------------------------

107

U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service |  

Broader source: Energy.gov (indexed) [DOE]

7: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny 7: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service September 12, 2012 - 6:00am Addthis PROBLEM: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service PLATFORM: ColdFusion 10, 9.0.2, 9.0.1, 9.0, 8.0.1, and 8.0 for Windows, Macintosh and UNIX ABSTRACT: Adobe ColdFusion is prone to a remote denial-of-service vulnerability. reference LINKS: Adobe Security bulletins and advisories Adobe Vulnerability identifier: APSB12-21 SecurityTracker Alert ID: 1027516 Bugtraq ID: 55499 CVE-2012-2048 IMPACT ASSESSMENT: Medium Discussion: Adobe has released a security hotfix for ColdFusion 10 and earlier versions for Windows, Macintosh and UNIX. This update resolves a vulnerability which

108

V-046: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |  

Broader source: Energy.gov (indexed) [DOE]

46: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 46: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code V-046: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code December 13, 2012 - 3:30am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): 11.5.502.110 and prior for Windows/Mac; 11.2.202.251 and prior for Linux ABSTRACT: Several vulnerabilities were reported in Adobe Flash Player. REFERENCE LINKS: Adobe Vulnerability identifier: APSB12-27 SecurityTracker Alert ID: 1027854 Secunia Advisory SA51560 RHSA-2012:1569-1 CVE-2012-5676 CVE-2012-5677 CVE-2012-5678 IMPACT ASSESSMENT: High DISCUSSION: A buffer overflow can trigger code execution [CVE-2012-5676]. An integer overflow can trigger code execution [CVE-2012-5677]. A memory corruption flaw can trigger code execution [CVE-2012-5678].

109

V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

71: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets 71: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service January 17, 2013 - 12:00am Addthis PROBLEM: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service PLATFORM: The vulnerability is reported in versions 8.7.1 and 8.7.1.1. ABSTRACT: A vulnerability has been reported in Cisco ASA 1000V Cloud Firewall REFERENCE LINKS: Cisco Advisory ID: cisco-sa-20130116-asa1000v SecurityTracker Alert ID: 1028005 Secunia Advisory SA51897 CVE-2012-5419 IMPACT ASSESSMENT: Medium DISCUSSION: A vulnerability has been reported in Cisco ASA 1000V Cloud Firewall, which can be exploited by malicious people to cause a DoS (Denial of Service).

110

T-708:Pidgin Bugs Let Remote Users Deny Service and Potentially Execute  

Broader source: Energy.gov (indexed) [DOE]

T-708:Pidgin Bugs Let Remote Users Deny Service and Potentially T-708:Pidgin Bugs Let Remote Users Deny Service and Potentially Execute Arbitrary Code T-708:Pidgin Bugs Let Remote Users Deny Service and Potentially Execute Arbitrary Code September 1, 2011 - 12:00pm Addthis PROBLEM: gtkutils.c in Pidgin before 2.10.0 on Windows allows user-assisted remote attackers to execute arbitrary programs via a file: URL in a message. PLATFORM: Pidgin before 2.10.0 on Windows ABSTRACT: Pidgin bugs let remote users deny service and potentially execute arbitrary code. reference LINKS: CVE-2011-3185 CVE-2011-2943 CVE-2011-3184 SecurityTracker Alert ID: 1025961 Pidgin Security Advisories IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in Pidgin. A remote user can cause denial of service conditions. A remote user can cause arbitrary code to be

111

U-047: Siemens Automation License Manager Bugs Let Remote Users Deny  

Broader source: Energy.gov (indexed) [DOE]

7: Siemens Automation License Manager Bugs Let Remote Users 7: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code November 29, 2011 - 9:00am Addthis PROBLEM: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code. PLATFORM: Siemens Automation License Manager 500.0.122.1 ABSTRACT: Several vulnerabilities were reported in Siemens Automation License Manager. reference LINKS: SecurityTracker Alert ID: 1026354 Bugtraq Siemens Advisory Services IMPACT ASSESSMENT: Medium Discussion: A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions. A remote user can send specially crafted *_licensekey commands to trigger a

112

T-667: Red Hat Enterprise Linux kernel security and bug fix update |  

Broader source: Energy.gov (indexed) [DOE]

7: Red Hat Enterprise Linux kernel security and bug fix update 7: Red Hat Enterprise Linux kernel security and bug fix update T-667: Red Hat Enterprise Linux kernel security and bug fix update July 13, 2011 - 7:24am Addthis PROBLEM: Red Hat Enterprise Linux kernel security and bug fix update PLATFORM: Vulnerable Linux Kernels; Red Hat Enterprise Linux Desktop (v. 6), Red Hat Enterprise Linux HPC Node (v. 6), Red Hat Enterprise Linux Server (v. 6), Red Hat Enterprise Linux Server EUS (v. 6.1.z), Red Hat Enterprise Linux Workstation (v. 6) ABSTRACT: It was found that the receive hook in the ipip_init() function in the ipip module, and in the ipgre_init() function in the ip_gre module, could be called before network namespaces setup is complete. If packets were received at the time the ipip or ip_gre module was still being loaded into

113

U-075: Apache Struts Bug Lets Remote Users Overwrite Files and Execute  

Broader source: Energy.gov (indexed) [DOE]

075: Apache Struts Bug Lets Remote Users Overwrite Files and 075: Apache Struts Bug Lets Remote Users Overwrite Files and Execute Arbitrary Code U-075: Apache Struts Bug Lets Remote Users Overwrite Files and Execute Arbitrary Code January 5, 2012 - 8:15am Addthis PROBLEM: Apache Struts Bug Lets Remote Users Overwrite Files and Execute Arbitrary Code PLATFORM: Version(s): 2.1.0 - 2.3.1 ABSTRACT: A remote user can execute arbitrary Java code on the target system. reference LINKS: SecurityTracker Alert ID: 1026484 Secunia Advisory SA47393 Bugtraq ID: 51257 Apache Struts 2 Documentation S2-008 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Apache Struts. A remote user can execute arbitrary Java code on the target system. A remote user can overwrite arbitrary files on the target system. A remote user can send specially

114

V-030: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service |  

Broader source: Energy.gov (indexed) [DOE]

30: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny 30: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service V-030: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service November 21, 2012 - 3:00am Addthis PROBLEM: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service PLATFORM: ColdFusion 10 Update 1 and above for Windows ABSTRACT: Adobe ColdFusion Denial of Service Vulnerability REFERENCE LINKS: Adobe Vulnerability identifier: APSB12-25 SecurityTracker Alert ID: 1027787 Secunia Advisory SA51335 CVE-2012-5674 IMPACT ASSESSMENT: High DISCUSSION: A vulnerability was reported in Adobe ColdFusion. A remote user can cause denial of service conditions. A remote user can send specially crafted data to cause unspecified denial of service conditions on the target ColdFusion service on Windows Internet

115

V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting  

Broader source: Energy.gov (indexed) [DOE]

2: Mozilla Firefox 'window.location' Bugs Permit Cross-Site 2: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code October 29, 2012 - 6:00am Addthis PROBLEM: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code PLATFORM: Firefox, Thunderbird, SeaMonkey ABSTRACT: Three vulnerabilities were reported in Mozilla Firefox. REFERENCE LINKS: Mozilla Foundation Security Advisory 2012-90 SecurityTracker Alert ID: 1027701 SecurityTracker Alert ID: 1027702 Advisory: RHSA-2012:1407-1 CVE-2012-4194 CVE-2012-4195 CVE-2012-4196 IMPACT ASSESSMENT: High DISCUSSION: A remote user can exploit the valueOf() method of window.location to, in

116

U-045: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny Service  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

5: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny 5: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny Service U-045: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny Service November 25, 2011 - 9:00am Addthis PROBLEM: A vulnerability was reported in the Windows Kernel. A local user can cause denial of service conditions. PLATFORM: Windows Win32k.sys ABSTRACT: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny reference LINKS: SecurityTracker Alert ID: 1026347 Secunia ID: SA46919 IMPACT ASSESSMENT: Low Discussion: A vulnerability has been discovered in Microsoft Windows, which can be exploited by malicious, local users to cause a DoS (Denial of Service). The vulnerability is caused due to an indexing error in the win32k.sys driver when loading a keyboard layout file. This can be exploited to access

117

V-091: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary Code |  

Broader source: Energy.gov (indexed) [DOE]

1: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary 1: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary Code V-091: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary Code February 14, 2013 - 12:22am Addthis PROBLEM: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary Code PLATFORM: Adobe Reader XI (11.0.01 and earlier) for Windows and Macintosh Adobe Reader X (10.1.5 and earlier) for Windows and Macintosh Adobe Reader 9.5.3 and earlier 9.x versions for Windows and Macintosh Adobe Acrobat XI (11.0.01 and earlier) for Windows and Macintosh Adobe Acrobat X (10.1.5 and earlier) for Windows and Macintosh Adobe Acrobat 9.5.3 and earlier 9.x versions for Windows and Macintosh ABSTRACT: Adobe has identified critical vulnerabilities in Adobe Reader and Acrobat REFERENCE LINKS: Adobe Reader and Acrobat Vulnerability Report

118

V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code |  

Broader source: Energy.gov (indexed) [DOE]

3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code 3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code March 18, 2013 - 1:53am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 6.0.3 ABSTRACT: Two vulnerabilities were reported in Apple Safari. REFERENCE LINKS: Apple security update, Article: HT1222 SecurityTracker Alert ID: 1028292 CVE-2013-0960 CVE-2013-0961 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. IMPACT: A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

119

U-053: Linux kexec Bugs Let Local and Remote Users Obtain Potentially  

Broader source: Energy.gov (indexed) [DOE]

53: Linux kexec Bugs Let Local and Remote Users Obtain 53: Linux kexec Bugs Let Local and Remote Users Obtain Potentially Sensitive Information U-053: Linux kexec Bugs Let Local and Remote Users Obtain Potentially Sensitive Information December 7, 2011 - 7:30am Addthis PROBLEM: Linux kexec Bugs Let Local and Remote Users Obtain Potentially Sensitive Information . PLATFORM: Red Hat Enterprise Linux Desktop (v. 6) Red Hat Enterprise Linux HPC Node (v. 6) Red Hat Enterprise Linux Server (v. 6) Red Hat Enterprise Linux Workstation (v. 6) ABSTRACT: Several vulnerabilities were reported in Linux kexec. A remote or local user can obtain potentially sensitive information. reference LINKS: Red Hat Security Advisory: RHSA-2011:1532-3 SecurityTracker Alert ID: 1026375 IMPACT ASSESSMENT: Medium Discussion: Kdump uses the SSH "StrictHostKeyChecking=no" option when dumping to SSH

120

U-208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code |  

Broader source: Energy.gov (indexed) [DOE]

208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary 208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code U-208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code July 10, 2012 - 7:00am Addthis PROBLEM: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code PLATFORM: HP Operations Agent for AIX, HP-UX, Linux, Solaris, and Windows prior to v11.03.12. ABSTRACT: Two vulnerabilities were reported in HP Operations Agent. A remote user can execute arbitrary code on the target system reference LINKS: The Vendor's Advisory SecurityTracker Alert ID: 1027225 CVE-2012-2019 CVE-2012-2020 IMPACT ASSESSMENT: High Discussion: Potential security vulnerabilities have been identified with HP Operations Agent for AIX, HP-UX, Linux, Solaris, and Windows. The vulnerabilities could be remotely exploited resulting in the execution of arbitrary code.

Note: This page contains sample records for the topic "wireshark multiple bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks  

Broader source: Energy.gov (indexed) [DOE]

6: RSA Data Protection Manager Bugs Permit Cross-Site Scripting 6: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions November 16, 2012 - 6:00am Addthis PROBLEM: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions. PLATFORM: RSA Data Protection Manager Appliance versions 2.7.x and 3.x ABSTRACT: Two vulnerabilities were reported in RSA Data Protection Manager. REFERENCE LINKS: SecurityTracker Alert ID: 1027781 EMC Identifier: ESA-2012-055 RSA Worldwide Customer Support CVE-2012-4612 CVE-2012-4613 IMPACT ASSESSMENT: Medium DISCUSSION: Two vulnerabilities were reported in RSA Data Protection Manager. A remote

122

U-072:Apache Tomcat Hash Table Collision Bug Lets Remote Users Deny Service  

Broader source: Energy.gov (indexed) [DOE]

72:Apache Tomcat Hash Table Collision Bug Lets Remote Users Deny 72:Apache Tomcat Hash Table Collision Bug Lets Remote Users Deny Service U-072:Apache Tomcat Hash Table Collision Bug Lets Remote Users Deny Service December 30, 2011 - 9:15am Addthis PROBLEM: Apache Tomcat Hash Table Collision Bug Lets Remote Users Deny Service PLATFORM: apache Tomcat 5.5.34, 6.0.34, 7.0.22; and prior versions aBSTRACT: A remote user can cause performance to degrade on the target server. reference LINKS: Apache Tomcat Security Alert SecurityTracker Alert ID: 1026477 nruns Advisory SA-2011.004 Secunia Advisory SA47411 CVE-2011-4084 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Apache Tomcat. A remote user can cause denial of service conditions. A remote user can send specially crafted POST request values to trigger hash collisions and cause significant performance

123

T-538: HP OpenView Storage Data Protector Bug Lets Remote Users Execute  

Broader source: Energy.gov (indexed) [DOE]

T-538: HP OpenView Storage Data Protector Bug Lets Remote Users T-538: HP OpenView Storage Data Protector Bug Lets Remote Users Execute Arbitrary Code T-538: HP OpenView Storage Data Protector Bug Lets Remote Users Execute Arbitrary Code January 20, 2011 - 6:39am Addthis PROBLEM: HP OpenView Storage Data Protector Bug Lets Remote Users Execute Arbitrary Code. PLATFORM: HP OpenView Storage Data Protector v6.11 ABSTRACT: A vulnerability was reported in HP OpenView Storage Data Protector. A remote user can execute arbitrary code on the target system. reference LINKS: HP Security Bulletin SecurityTracker Alert ID: 1024983 CVE-2011-0273 IMPACT ASSESSMENT: High Discussion: A potential security vulnerability has been identified with HP OpenView Storage Data Protector. The vulnerability could be remotely exploited to execute arbitrary code.

124

U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute  

Broader source: Energy.gov (indexed) [DOE]

9: Cisco Firewall Services Module Bugs Let Remote Users Execute 9: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service October 11, 2012 - 6:00am Addthis PROBLEM: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service PLATFORM: Version(s): prior to 4.1(9) ABSTRACT: Several vulnerabilities were reported in Cisco Firewall Services Module. reference LINKS: Cisco Advisory ID: cisco-sa-20121010-fwsm SecurityTracker Alert ID: 1027640 CVE-2012-4661 CVE-2012-4662 CVE-2012-4663 IMPACT ASSESSMENT: High Discussion: A remote user can send specially crafted DCERPC data through the target device to trigger a stack overflow in the DCERPC inspection engine and execute arbitrary code on the target device or cause the target device to

125

U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain  

Broader source: Energy.gov (indexed) [DOE]

42: HP Onboard Administrator Bugs Let Remote Users Gain Access, 42: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks April 6, 2012 - 7:00am Addthis PROBLEM: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks PLATFORM: HP Onboard Administrator (OA) up to and including v3.32 ABSTRACT: A remote user can obtain potentially sensitive information. reference LINKS: HP Support Document ID: c03263573 SecurityTracker Alert ID: 1026889 CVE-2012-0128, CVE-2012-0129, CVE-2012-0130 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in HP Onboard Administrator. A remote

126

V-189: Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users Deny  

Broader source: Energy.gov (indexed) [DOE]

9: Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users 9: Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users Deny Service on the Target Host V-189: Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users Deny Service on the Target Host July 1, 2013 - 12:48am Addthis PROBLEM: Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users Deny Service on the Target Host PLATFORM: VirtualBox 4.2.12 ABSTRACT: A vulnerability was reported in Oracle VirtualBox. REFERENCE LINKS: VirtualBox ticket: 11863 SecurityTracker Alert ID: 1028712 IMPACT ASSESSMENT: Medium DISCUSSION: A local user on the guest operating system can issue a 'tracepath' command to cause the network on the target host system to become unavailable. IMPACT: A local user on a guest operating system can cause denial of service conditions on the target host system.

127

U-137: HP Performance Manager Unspecified Bug Lets Remote Users Execute  

Broader source: Energy.gov (indexed) [DOE]

7: HP Performance Manager Unspecified Bug Lets Remote Users 7: HP Performance Manager Unspecified Bug Lets Remote Users Execute Arbitrary Codes U-137: HP Performance Manager Unspecified Bug Lets Remote Users Execute Arbitrary Codes March 30, 2012 - 9:15am Addthis PROBLEM: HP Performance Manager Unspecified Bug Lets Remote Users Execute Arbitrary Codes PLATFORM: HP-UX B.11.31 HP-UX B.11.23 ABSTRACT: A remote user can execute arbitrary code on the target system. REFERENCE LINKS: HP Support Document ID: c03255321 SecurityTracker Alert ID: 1026869 CVE-2012-0127 IMPACT ASSESSMENT: High Discussion: A potential security vulnerability has been identified with HP Performance Manager running on HP-UX, Linux, Solaris, and Windows. The vulnerability could be exploited remotely to execute arbitrary code and to create a Denial of Service (DoS).

128

V-063: Adobe ColdFusion Bugs Let Remote Users Gain Access and Obtain  

Broader source: Energy.gov (indexed) [DOE]

3: Adobe ColdFusion Bugs Let Remote Users Gain Access and 3: Adobe ColdFusion Bugs Let Remote Users Gain Access and Obtain Information V-063: Adobe ColdFusion Bugs Let Remote Users Gain Access and Obtain Information January 7, 2013 - 1:00am Addthis PROBLEM: Adobe ColdFusion Bugs Let Remote Users Gain Access and Obtain Information PLATFORM: ColdFusion 10, 9.0.2, 9.0.1 and 9.0 for Windows, Macintosh and UNIX ABSTRACT: Adobe has identified three vulnerabilities affecting ColdFusion for Windows, Macintosh and UNIX REFERENCE LINKS: Adobe Security Bulletin APSA13-01 SecurityTracker Alert ID: 1027938 CVE-2013-0625 CVE-2013-0629 CVE-2013-0631 IMPACT ASSESSMENT: High DISCUSSION: A remote user can bypass authentication and take control of the target system [CVE-2013-0625]. Systems with password protection disabled or with no password set are affected.

129

U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain  

Broader source: Energy.gov (indexed) [DOE]

2: HP Onboard Administrator Bugs Let Remote Users Gain Access, 2: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks April 6, 2012 - 7:00am Addthis PROBLEM: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks PLATFORM: HP Onboard Administrator (OA) up to and including v3.32 ABSTRACT: A remote user can obtain potentially sensitive information. reference LINKS: HP Support Document ID: c03263573 SecurityTracker Alert ID: 1026889 CVE-2012-0128, CVE-2012-0129, CVE-2012-0130 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in HP Onboard Administrator. A remote

130

U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and  

Broader source: Energy.gov (indexed) [DOE]

9: RSA enVision Bugs Permit Cross-Site Scripting, SQL 9: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks March 20, 2012 - 7:00am Addthis PROBLEM: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks PLATFORM: 4.x, prior to 4.1 Patch 4 ABSTRACT: Several vulnerabilities were reported in RSA enVision. A remote user can access the system. A remote authenticated user can conduct cross-site scripting attacks. A remote authenticated user can inject SQL commands. A remote authenticated user can view files on the target system. Reference LINKS: SecurityTracker Alert ID: 1026819 CVE-2012-0403 IMPACT ASSESSMENT: High Discussion: The system does not properly filter HTML code from user-supplied input

131

U-052: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote  

Broader source: Energy.gov (indexed) [DOE]

2: HP Protect Tools Device Access Manager Unspecified Bug Lets 2: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code U-052: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code December 6, 2011 - 7:00am Addthis PROBLEM: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code. PLATFORM: HP Protect Tools Device Access Manager for Windows earlier than v.6.1.0.1 running on the following HP PCs: HP EliteBook 2560p Notebook PC HP EliteBook 2760p Notebook PC HP EliteBook 8460p Notebook PC HP EliteBook 8460w Mobile Workstation HP EliteBook 8560p Notebook PC HP EliteBook 8560w Mobile Workstation HP EliteBook 8760w Mobile Workstation HP ProBook 4230s Notebook PC

132

U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote  

Broader source: Energy.gov (indexed) [DOE]

9: Cisco IOS Intrusion Prevention System DNS Processing Bug 9: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service September 27, 2012 - 4:07am Addthis PROBLEM: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service PLATFORM: Devices configured with Cisco IOS IPS are affected ABSTRACT: A vulnerability was reported in Cisco IOS. reference LINKS: SecurityTracker Alert ID: 1027580 Cisco Security Advisory CVE-2012-3950 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Cisco IOS. A remote user can cause denial of service conditions. A remote user can send specially crafted (but legitimate) DNS packets through the target device to cause the device to

133

U-203: HP Photosmart Bug Lets Remote Users Deny Service | Department of  

Broader source: Energy.gov (indexed) [DOE]

03: HP Photosmart Bug Lets Remote Users Deny Service 03: HP Photosmart Bug Lets Remote Users Deny Service U-203: HP Photosmart Bug Lets Remote Users Deny Service July 2, 2012 - 8:00am Addthis PROBLEM: HP Photosmart Bug Lets Remote Users Deny Service PLATFORM: HP Photosmart Wireless e-All-in-One Printer series - B110 HP Photosmart e-All-in-One Printer series - D110 HP Photosmart Plus e-All-in-One Printer series - B210 HP Photosmart eStation All-in-One Printer series - C510 HP Photosmart Ink Advantage e-All-in-One Printer series - K510 HP Photosmart Premium Fax e-All-in-One Printer series - C410 ABSTRACT: A vulnerability was reported in HP Photosmart. A remote user can cause denial of service conditions. Reference LINKS: The Vendor's Advisory SecurityTracker Alert ID: 1027213 CVE-2012-2017 IMPACT ASSESSMENT: High Discussion:

134

U-231: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service |  

Broader source: Energy.gov (indexed) [DOE]

31: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service 31: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service U-231: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service August 9, 2012 - 7:00am Addthis PROBLEM: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service PLATFORM: Version(s): ASA 5500 Series; 8.2 - 8.4 ABSTRACT: Two vulnerabilities were reported in Cisco ASA. A remote or remote authenticated user can cause denial of service conditions. reference LINKS: Release Notes for the Cisco ASA 5500 Series, 8.4(x) SecurityTracker Alert ID: 1027355 CVE-2012-2472 CVE-2012-2474 IMPACT ASSESSMENT: Medium Discussion: Two vulnerabilities were reported in Cisco ASA. 1. On systems with SIP inspection enabled, a remote user can send specially crafted SIP traffic to cause the target device to create many identical

135

V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting  

Broader source: Energy.gov (indexed) [DOE]

0: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site 0: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information April 23, 2013 - 12:26am Addthis PROBLEM: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information PLATFORM: Apache ActiveMQ versions prior to 5.8.0 ABSTRACT: Several vulnerabilities were reported in Apache ActiveMQ. REFERENCE LINKS: Apache ActiveMQ SecurityTracker Alert ID: 1028457 CVE-2012-6092 CVE-2012-6551 CVE-2013-3060 IMPACT ASSESSMENT: High DISCUSSION: Several web demos do not properly filter HTML code from user-supplied input

136

U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and  

Broader source: Energy.gov (indexed) [DOE]

41: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 41: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information August 22, 2012 - 7:00am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information PLATFORM: Adobe Flash Player 11.3.300.271 and earlier versions for Windows, Macintosh and Linux operating systems Adobe Flash Player 11.1.115.11 and earlier versions for Android 4.x Adobe Flash Player 11.1.111.10 and earlier versions for Android 3.x and 2.x Adobe AIR 3.3.0.3670 and earlier versions for Windows and Macintosh Adobe AIR 3.3.0.3690 SDK (includes AIR for iOS) and earlier versions Adobe AIR 3.3.0.3650 and earlier versions for Android ABSTRACT:

137

T-712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and 712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update T-712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update September 8, 2011 - 10:30am Addthis PROBLEM: A flaw was discovered in Cumin where it would log broker authentication credentials to the Cumin log file. A vulnerability was reported in Red Hat Enterprise MRG Grid. A local user can access the broker password. PLATFORM: Red Hat Enterprise MRG v2 for Red Hat Enterprise Linux (version 5) ABSTRACT: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update. reference LINKS: RHSA-2011:1249-1 SecurityTracker Alert ID: 1026021 CVE-2011-2925 IMPACT ASSESSMENT: Medium Discussion: A local user exploiting this flaw could connect to the broker outside of Cumin's control and perform certain operations such as scheduling jobs,

138

T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass  

Broader source: Energy.gov (indexed) [DOE]

7: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users 7: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass Authentication or Obtain Information T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass Authentication or Obtain Information August 31, 2011 - 12:00pm Addthis PROBLEM: A vulnerability was reported in Apache Tomcat. A remote user can bypass authentication or obtain potentially sensitive information. PLATFORM: Apache Tomcat 5.5.0 to 5.5.33, 6.0.0 to 6.0.33, 7.0.0 to 7.0.20 ABSTRACT: Apache Tomcat AJP protocol processing bug lets remote users bypass authentication or obtain information. reference LINKS: SecurityTracker Alert ID: 1025993 CVE-2011-3190 (under review) Apache Tomcat Security Updates IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Apache Tomcat. A remote user can bypass

139

T-589: Citrix XenApp and Citrix Presentation Server Bug | Department of  

Broader source: Energy.gov (indexed) [DOE]

89: Citrix XenApp and Citrix Presentation Server Bug 89: Citrix XenApp and Citrix Presentation Server Bug T-589: Citrix XenApp and Citrix Presentation Server Bug March 28, 2011 - 3:05pm Addthis PROBLEM: Citrix XenApp and Citrix Presentation Server Bug in ActiveSync Lets Remote Users Execute Arbitrary Code. PLATFORM: Citrix XenApp Presentation versions 4.5, 5 ABSTRACT: A vulnerability was reported in Citrix XenApp (Presentation Server). A remote user can execute arbitrary code on the target system. -------------------------------------------------------------------------------- LINKS: DOE-CIRC BULLETIN: http://www.doecirc.energy.gov/bulletins/t-589.shtml OTHER LINKS: Citrix Document: CTX128366 SecurityTracker Alert ID: 1025254 Citrix Support Technical Support Downloads --------------------------------------------------------------------------------

140

U-055: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |  

Broader source: Energy.gov (indexed) [DOE]

5: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 5: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code U-055: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code December 8, 2011 - 8:30am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code . PLATFORM: Adobe Flash Player 11.1.102.55 on Windows and Mac OS X and prior versions ABSTRACT: Two vulnerabilities exploited by the Intevydis vd_adobe_fp module in VulnDisco Step Ahead were reported in Adobe Flash Player. reference LINKS: Secunia Advisory: SA47161 SecurityTracker Alert ID: 1026392 CVE-2011-4693 CVE-2011-4694 IMPACT ASSESSMENT: High Discussion: A remote or local user can obtain potentially sensitive information. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a specially crafted SWF file that, when

Note: This page contains sample records for the topic "wireshark multiple bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

U-025: HP OpenView Network Node Manager Bugs Let Remote Users Execute  

Broader source: Energy.gov (indexed) [DOE]

U-025: HP OpenView Network Node Manager Bugs Let Remote Users U-025: HP OpenView Network Node Manager Bugs Let Remote Users Execute Arbitrary Code U-025: HP OpenView Network Node Manager Bugs Let Remote Users Execute Arbitrary Code November 2, 2011 - 8:00am Addthis PROBLEM: HP OpenView Network Node Manager Bugs Let Remote Users Execute Arbitrary Code. PLATFORM: HP OpenView Network Node Manager (OV NNM) v7.51, v7.53 running on HP-UX, Linux, Solaris, and Windows ABSTRACT: A remote user can execute arbitrary code on the target system. reference LINKS: HP Support Center Document ID: c03054052 SecurityTracker Alert ID: 1026260 CVE-2011-1365 CVE-2011-1366 CVE-2011-1367 IMPACT ASSESSMENT: Medium Discussion: Several vulnerabilities were reported in HP OpenView Network Node Manager. A remote user can execute arbitrary code on the target system.

142

U-052: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote  

Broader source: Energy.gov (indexed) [DOE]

2: HP Protect Tools Device Access Manager Unspecified Bug Lets 2: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code U-052: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code December 6, 2011 - 7:00am Addthis PROBLEM: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code. PLATFORM: HP Protect Tools Device Access Manager for Windows earlier than v.6.1.0.1 running on the following HP PCs: HP EliteBook 2560p Notebook PC HP EliteBook 2760p Notebook PC HP EliteBook 8460p Notebook PC HP EliteBook 8460w Mobile Workstation HP EliteBook 8560p Notebook PC HP EliteBook 8560w Mobile Workstation HP EliteBook 8760w Mobile Workstation HP ProBook 4230s Notebook PC

143

U-071:HP Database Archiving Software Bugs Let Remote Users Execute  

Broader source: Energy.gov (indexed) [DOE]

1:HP Database Archiving Software Bugs Let Remote Users Execute 1:HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code U-071:HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code December 29, 2011 - 8:15am Addthis PROBLEM: HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code PLATFORM: HP Database Archiving Software v6.31 ABSTRACT: A remote user can execute arbitrary code on the target system. reference LINKS: HP Database Document ID: c03128302 SecurityTracker Alert ID: 1026467 CVE-2011-4163 CVE-2011-4164 CVE-2011-4165 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in HP Database Archiving Software. A remote user can execute arbitrary code on the target system. Impact: A remote user can execute arbitrary code on the target system. Solution:

144

V-015: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users  

Broader source: Energy.gov (indexed) [DOE]

5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, 5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information V-015: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information November 2, 2012 - 6:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information PLATFORM: Apple iOS prior to 6.0.1 ABSTRACT: Three vulnerabilities were reported in Apple iOS. REFERENCE LINKS: Apple Article: HT5567 SecurityTracker Alert ID: 1027716 Bugtraq ID: 56363 CVE-2012-3748 CVE-2012-3749 CVE-2012-3750 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the

145

U-061: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain  

Broader source: Energy.gov (indexed) [DOE]

1: RSA Adaptive Authentication Bugs Let Remote Users Bypass 1: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain Security Controls U-061: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain Security Controls December 14, 2011 - 8:17am Addthis PROBLEM: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain Security Controls. PLATFORM: 6.0.2.1 SP1 Patch 2 and SP1 Patch 3 6.0.2.1 SP2 and SP2 Patch 1 6.0.2.1 SP3 ABSTRACT: A remote user may be able to bypass certain security controls. reference LINKS: SecurityTracker Alert ID: 1026420 Security Focus: ESA-2011-036 IMPACT ASSESSMENT: Medium Discussion: Two vulnerabilities were reported in RSA Adaptive Authentication (On-Premise). A remote user may be able to bypass certain security controls. A remote user can send specially crafted data elements to affect the Device

146

U-118: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and  

Broader source: Energy.gov (indexed) [DOE]

18: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 18: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information U-118: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information March 6, 2012 - 7:00am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information PLATFORM: Adobe Flash Player 10.x, Adobe Flash Player 11.x ABSTRACT: Two vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can obtain potentially information. reference LINKS: Secunia Advisory SA48281 CVE-2012-0769 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will trigger a memory corruption error in Matrix3D and execute

147

V-078: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks  

Broader source: Energy.gov (indexed) [DOE]

8: WordPress Bugs Permit Cross-Site Scripting and Port Scanning 8: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks V-078: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks January 28, 2013 - 12:32am Addthis PROBLEM: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks PLATFORM: WordPress all versions are affected prior to 3.5.1 ABSTRACT: WordPress 3.5.1 Maintenance and Security Release REFERENCE LINKS: WordPress News SecurityTracker Alert ID: 1028045 Secunia Advisory SA51967 IMPACT ASSESSMENT: Medium DISCUSSION: Several scripts do not properly filter HTML code from user-supplied input before displaying the input. A remote user can cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the site running the WordPress software and will run in the security

148

T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site...  

Broader source: Energy.gov (indexed) [DOE]

Let Remote Users Conduct Cross-Site Request Forgery Attacks and Execute Arbitrary Code T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request Forgery Attacks...

149

U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Users Deny Service and Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users...

150

U-265: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote...  

Broader source: Energy.gov (indexed) [DOE]

information. Solution: The vendor has issued a fix. Addthis Related Articles U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting...

151

V-146: HP Service Manager Bugs Permit Cross-Site Scripting and...  

Broader source: Energy.gov (indexed) [DOE]

the update from The HP Software Support Online (SSO). Addthis Related Articles V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting...

152

V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site...  

Broader source: Energy.gov (indexed) [DOE]

U-255: Apache Wicket Input Validation Flaw Permits Cross-Site Scripting Attacks U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting...

153

V-149: Microsoft Internet Explorer Object Access Bug Lets Remote Users  

Broader source: Energy.gov (indexed) [DOE]

9: Microsoft Internet Explorer Object Access Bug Lets Remote 9: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code V-149: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code May 6, 2013 - 12:07am Addthis PROBLEM: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code PLATFORM: Internet Explorer 8 ABSTRACT: A vulnerability was reported in Microsoft Internet Explorer. REFERENCE LINKS: SecurityTracker Alert ID: 1028514 Microsoft Security Advisory (2847140) CVE-2013-1347 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will access and object that has been deleted or not properly allocated and execute arbitrary code on the target system. The code will run with the privileges of the target user.

154

U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote  

Broader source: Energy.gov (indexed) [DOE]

9: Cisco IOS Intrusion Prevention System DNS Processing Bug 9: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service September 27, 2012 - 4:07am Addthis PROBLEM: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service PLATFORM: Devices configured with Cisco IOS IPS are affected ABSTRACT: A vulnerability was reported in Cisco IOS. reference LINKS: SecurityTracker Alert ID: 1027580 Cisco Security Advisory CVE-2012-3950 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Cisco IOS. A remote user can cause denial of service conditions. A remote user can send specially crafted (but legitimate) DNS packets through the target device to cause the device to

155

V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code |  

Broader source: Energy.gov (indexed) [DOE]

3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code 3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code March 18, 2013 - 1:53am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 6.0.3 ABSTRACT: Two vulnerabilities were reported in Apple Safari. REFERENCE LINKS: Apple security update, Article: HT1222 SecurityTracker Alert ID: 1028292 CVE-2013-0960 CVE-2013-0961 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. IMPACT: A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

156

U-005: Apache mod_proxy Pattern Matching Bug Lets Remote Users Access  

Broader source: Energy.gov (indexed) [DOE]

5: Apache mod_proxy Pattern Matching Bug Lets Remote Users 5: Apache mod_proxy Pattern Matching Bug Lets Remote Users Access Internal Servers U-005: Apache mod_proxy Pattern Matching Bug Lets Remote Users Access Internal Servers October 6, 2011 - 9:30am Addthis PROBLEM: Apache mod_proxy Pattern Matching Bug Lets Remote Users Access Internal Servers. PLATFORM: Apache HTTP Server 1.3.x, 2.2.21 and prior versions ABSTRACT: A remote user can access internal servers. reference LINKS: The Apache HTTP Server Project SecurityTracker Alert ID: 1026144 CVE-2011-3368 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Apache mod_proxy. A remote user can access internal servers. When this system is configured in reverse proxy mode and uses the RewriteRule or ProxyPassMatch directives with a pattern match, a remote user can send a specially crafted request to access internal

157

V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting  

Broader source: Energy.gov (indexed) [DOE]

2: Mozilla Firefox 'window.location' Bugs Permit Cross-Site 2: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code October 29, 2012 - 6:00am Addthis PROBLEM: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code PLATFORM: Firefox, Thunderbird, SeaMonkey ABSTRACT: Three vulnerabilities were reported in Mozilla Firefox. REFERENCE LINKS: Mozilla Foundation Security Advisory 2012-90 SecurityTracker Alert ID: 1027701 SecurityTracker Alert ID: 1027702 Advisory: RHSA-2012:1407-1 CVE-2012-4194 CVE-2012-4195 CVE-2012-4196 IMPACT ASSESSMENT: High DISCUSSION: A remote user can exploit the valueOf() method of window.location to, in

158

V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |  

Broader source: Energy.gov (indexed) [DOE]

0: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 0: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code March 13, 2013 - 12:04am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): 1.6.602.171 and prior for Windows/Mac; other versions on other platforms ABSTRACT: Several vulnerabilities were reported in Adobe Flash Player. REFERENCE LINKS: Adobe Vulnerability identifier: APSB13-09 SecurityTracker Alert ID: 1028277 CVE-2013-0646 CVE-2013-0650 CVE-2013-1371 CVE-2013-1375 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user.

159

U-012: BlackBerry Enterprise Server Collaboration Service Bug Lets Remote  

Broader source: Energy.gov (indexed) [DOE]

12: BlackBerry Enterprise Server Collaboration Service Bug Lets 12: BlackBerry Enterprise Server Collaboration Service Bug Lets Remote Users Impersonate Intra-organization Messages U-012: BlackBerry Enterprise Server Collaboration Service Bug Lets Remote Users Impersonate Intra-organization Messages October 17, 2011 - 9:45am Addthis PROBLEM: BlackBerry Enterprise Server Collaboration Service Bug Lets Remote Users Impersonate Intra-organization Messages. PLATFORM: Exchange and Domino 5.0.3 through 5.0.3 MR4 BlackBerry Client for use with Microsoft Office Communications Server 2007 R2 BlackBerry Client for use with Microsoft Lync Server 2010 ABSTRACT: A vulnerability was reported in BlackBerry Enterprise Server. A remote user can impersonate another messaging user within the same organization. reference LINKS: BlackBerry Security Advisory ID: KB28524

160

U-071:HP Database Archiving Software Bugs Let Remote Users Execute  

Broader source: Energy.gov (indexed) [DOE]

1:HP Database Archiving Software Bugs Let Remote Users Execute 1:HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code U-071:HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code December 29, 2011 - 8:15am Addthis PROBLEM: HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code PLATFORM: HP Database Archiving Software v6.31 ABSTRACT: A remote user can execute arbitrary code on the target system. reference LINKS: HP Database Document ID: c03128302 SecurityTracker Alert ID: 1026467 CVE-2011-4163 CVE-2011-4164 CVE-2011-4165 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in HP Database Archiving Software. A remote user can execute arbitrary code on the target system. Impact: A remote user can execute arbitrary code on the target system. Solution:

Note: This page contains sample records for the topic "wireshark multiple bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

JC3 Low Impact Assessment Bulletins  

Broader source: Energy.gov (indexed) [DOE]

low-impact-assessment-bulletins low-impact-assessment-bulletins Office of the Chief Information Officer 1000 Independence Ave., SW Washington, DC 202-586-0166 en V-207: Wireshark Multiple Denial of Service Vulnerabilities http://energy.gov/cio/articles/v-207-wireshark-multiple-denial-service-vulnerabilities wireshark-multiple-denial-service-vulnerabilities" class="title-link">V-207: Wireshark Multiple Denial of Service Vulnerabilities

162

Species composition and seasonal abundance of stink bugs in cotton in the Lower Texas Gulf Coast and the virulence of Euschistus species to cotton  

E-Print Network [OSTI]

with the drop cloth. ........................................................................................................... 26 2.2. Distribution of most common pest stink bugs by county, 2004. ........................ 31 2.3. Distribution... Page 2.1. Mean number of stink bug species collected per six row-feet, by date. Lower Texas Gulf Coast region, 2004.............................................................. 30 2.2. Mean number of stink bug species...

Hopkins, Bradley Wayne

2006-04-12T23:59:59.000Z

163

Backup Generators (BUGS): The Next Smart Grid Peak Resource? | Open Energy  

Open Energy Info (EERE)

Backup Generators (BUGS): The Next Smart Grid Peak Resource? Backup Generators (BUGS): The Next Smart Grid Peak Resource? Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Backup Generators (BUGS): The Next Smart Grid Peak Resource? Focus Area: Crosscutting Topics: Potentials & Scenarios Website: www.netl.doe.gov/smartgrid/referenceshelf/articles/10-18-2010_BUGS%20a Equivalent URI: cleanenergysolutions.org/content/backup-generators-bugs-next-smart-gri Language: English Policies: "Deployment Programs,Financial Incentives,Regulations" is not in the list of possible values (Deployment Programs, Financial Incentives, Regulations) for this property. DeploymentPrograms: Demonstration & Implementation Regulations: "Resource Integration Planning,Energy Standards" is not in the list of possible values (Agriculture Efficiency Requirements, Appliance & Equipment Standards and Required Labeling, Audit Requirements, Building Certification, Building Codes, Cost Recovery/Allocation, Emissions Mitigation Scheme, Emissions Standards, Enabling Legislation, Energy Standards, Feebates, Feed-in Tariffs, Fuel Efficiency Standards, Incandescent Phase-Out, Mandates/Targets, Net Metering & Interconnection, Resource Integration Planning, Safety Standards, Upgrade Requirements, Utility/Electricity Service Costs) for this property.

164

The Insect's Christmas Podcast Welcome to Bug Bytes, a bimonthly podcast from Texas A&M University's  

E-Print Network [OSTI]

Bug Bytes The Insect's Christmas Podcast **Music Up Welcome to Bug Bytes, a bimonthly podcast from didn't cooperate under the bright film lights. So when they died, Starevitch decided to make them. Starevitch has inspired contemporary greats like Tim Burton and Henry Selick of Nightmare before Christmas

Behmer, Spencer T.

165

Queen of the Sun Transcript Welcome to Bug Bytes, a bimonthly podcast from Texas A&M University's  

E-Print Network [OSTI]

Bug Bytes Queen of the Sun Transcript **Music Up Welcome to Bug Bytes, a bimonthly podcast from beekeepers of the world. Why? We recently screened a documentary called Queen of the Sun. The film explores in the face of almost certain impending disaster. We were prepared for this, as we thought Queen of the Sun

Behmer, Spencer T.

166

U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated  

Broader source: Energy.gov (indexed) [DOE]

2: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated 2: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated Privileges, Inject SQL Commands, and Spoof Certificates U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated Privileges, Inject SQL Commands, and Spoof Certificates February 28, 2012 - 8:45am Addthis PROBLEM: A vulnerability was reported in PostgreSQL. PLATFORM: Version(s): prior to 8.3.18, 8.4.11, 9.0.7, 9.1.3 ABSTRACT: A remote authenticated user can gain elevated privileges. A remote authenticated user can inject SQL commands. A remote user can spoof connections in certain cases. reference LINKS: Vendor Advisory Security Tracker ID 1026744 CVE-2012-0866 IMPACT ASSESSMENT: Medium Discussion: For trigger functions marked SECURITY DEFINER, a remote authenticated user can execute a trigger function and gain elevated privileges CVE-2012-0866.

167

U-092: Sudo Format String Bug Lets Local Users Gain Elevated Privileges |  

Broader source: Energy.gov (indexed) [DOE]

2: Sudo Format String Bug Lets Local Users Gain Elevated 2: Sudo Format String Bug Lets Local Users Gain Elevated Privileges U-092: Sudo Format String Bug Lets Local Users Gain Elevated Privileges January 31, 2012 - 5:45am Addthis PROBLEM: A vulnerability was reported in Sudo. A local user can obtain elevated privileges on the target system. PLATFORM: Linux (Any) Version(s): 1.8.0 - 1.8.3p1 ABSTRACT: A local user can supply a specially crafted command line argument to trigger a format string flaw and execute arbitrary commands on the target system with root privileges. reference LINKS: CVE-2012-0809 SecurityTracker Alert ID: 1026600 Vendor Site IMPACT ASSESSMENT: Medium Discussion: The vulnerability resides in the sudo_debug() function in 'src/sudo.c'. This can be exploited by local users, regardless of whether they are listed

168

V-128: Xen Event Channel Tracking Pointer Bug Local Privilege Escalation |  

Broader source: Energy.gov (indexed) [DOE]

8: Xen Event Channel Tracking Pointer Bug Local Privilege 8: Xen Event Channel Tracking Pointer Bug Local Privilege Escalation V-128: Xen Event Channel Tracking Pointer Bug Local Privilege Escalation April 8, 2013 - 12:28am Addthis PLATFORM: Version(s): 3.2 and later ABSTRACT: A vulnerability was reported in Xen. REFERENCE LINKS: SecurityTracker Alert ID: 1028388 CVE-2013-1920 IMPACT ASSESSMENT: Medium DISCUSSION: A local user with kernel level privileges on the guest operating system can exploit a memory pointer error when the hypervisor is under memory pressure and Xen Security Module (XSM) is enabled to execute arbitrary code on the target host system IMPACT: A local user on the guest operating system can obtain elevated privileges on the target host system. SOLUTION: The vendor has issued a fix (xsa47-4.1.patch, xsa47-4.2-unstable.patch).

169

U-110: Samba Bug Lets Remote Users Execute Arbitrary Code | Department of  

Broader source: Energy.gov (indexed) [DOE]

0: Samba Bug Lets Remote Users Execute Arbitrary Code 0: Samba Bug Lets Remote Users Execute Arbitrary Code U-110: Samba Bug Lets Remote Users Execute Arbitrary Code February 24, 2012 - 7:30am Addthis PROBLEM: A vulnerability was reported in Samba. PLATFORM: Version(s): prior to 3.4.0 ABSTRACT: A remote user can send specially crafted data to the smbd service to trigger a flaw in chain_reply() and construct_reply() and execute arbitrary code on the target system. reference LINKS: Vendor Advisory Security Tracker ID 1026739 CVE-2012-0870 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Samba. A remote user can execute arbitrary code on the target system. A remote user can send specially crafted data to the smbd service to trigger a flaw in chain_reply() and construct_reply() and execute arbitrary code on the target system. The code will run with the

170

V-127: Samba Bug Lets Remote Authenticated Users Modify Files | Department  

Broader source: Energy.gov (indexed) [DOE]

7: Samba Bug Lets Remote Authenticated Users Modify Files 7: Samba Bug Lets Remote Authenticated Users Modify Files V-127: Samba Bug Lets Remote Authenticated Users Modify Files April 5, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Samba. PLATFORM: The vulnerabilities are reported in version(s): 3.6.0 - 3.6.5 ABSTRACT: A remote authenticated user can modify files on the target share REFERENCE LINKS: SecurityTracker Alert ID: 1028389 Samba Security Announcement CVE-2013-0454 IMPACT ASSESSMENT: Medium DISCUSSION: A remote authenticated user can perform operations on the target CIFS export that are not permitted by the CIFS share access control settings. This may include writing to read-only shares. IMPACT: Modification of user information SOLUTION: Update to 3.6.6 and higher or apply the following patch Addthis

171

U-192 VMware Workstation/Player VM Remote Device Bug Lets Local or Remote  

Broader source: Energy.gov (indexed) [DOE]

VMware Workstation/Player VM Remote Device Bug Lets Local or VMware Workstation/Player VM Remote Device Bug Lets Local or Remote Users Deny Service U-192 VMware Workstation/Player VM Remote Device Bug Lets Local or Remote Users Deny Service June 15, 2012 - 7:00am Addthis PROBLEM: A vulnerability was reported in VMware Workstation/Player. PLATFORM: Version(s): Workstation 8.x, Player 4.x ABSTRACT: A local or remote user can cause denial of service conditions on the target virtual system. reference LINKS: Vendor Advisory Security Tracker ID 1027173 CVE-2012-3289 IMPACT ASSESSMENT: High Discussion: A user with the ability to modify communications data between a remote virtual device (e.g., CD-ROM, keyboard) located on a physically separate system and the target virtual machine can cause the target virtual machine to crash. Impact:

172

V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and  

Broader source: Energy.gov (indexed) [DOE]

6: Cisco Wireless LAN Controller Bugs Let Remote Users Deny 6: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code January 24, 2013 - 6:00am Addthis PROBLEM: Several vulnerabilities were reported in Cisco Wireless LAN Controller. PLATFORM: The vulnerabilities are reported in: Cisco 2000 Series WLC Cisco 2100 Series WLC Cisco 2500 Series WLC Cisco 4100 Series WLC Cisco 4400 Series WLC Cisco 5500 Series WLC Cisco 7500 Series WLC Cisco 8500 Series WLC Cisco 500 Series Wireless Express Mobility Controllers Cisco Wireless Services Module (Cisco WiSM) Cisco Wireless Services Module version 2 (Cisco WiSM version 2)

173

U-096: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny Service |  

Broader source: Energy.gov (indexed) [DOE]

6: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny 6: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny Service U-096: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny Service February 6, 2012 - 7:00am Addthis PROBLEM: Vulnerability in AIX TCP stack PLATFORM: Version(s): 5.3, 6.1, 7.1 ABSTRACT: A remote user can send a series of specially crafted TCP packets to trigger a kernel panic on the target system. reference LINKS: SecurityTracker Alert ID: 1026640 IBM Security Advisory CVE-2012-0194 IMPACT ASSESSMENT: Medium Discussion: AIX could allow a remote attacker to cause a denial of service, caused by an error when the TCP large send offload option is enabled on a network interface. By sending a specially-crafted sequence of packets, an attacker could exploit this vulnerability to cause a kernel panic.

174

V-077: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication |  

Broader source: Energy.gov (indexed) [DOE]

7: Barracuda SSL VPN Bug Lets Remote Users Bypass 7: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication V-077: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication January 25, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Barracuda SSL VPN. PLATFORM: The vulnerability has been verified to exist in Barracuda SSL VPN version 2.2.2.203 ABSTRACT: A remote user can gain administrative access to the target system. REFERENCE LINKS: SecurityTracker Alert ID: 1028039 Barracuda Networks Advisory IMPACT ASSESSMENT: High DISCUSSION: A remote user can set a specially crafted Java system property (via 'setSysProp.jsp') to bypass access restrictions and gain access to the API functionality. This can be exploited to download configuration files, download database dumps, shutdown the system, and set new administrative

175

V-202: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain  

Broader source: Energy.gov (indexed) [DOE]

2: Cisco Video Surveillance Manager Bugs Let Remote Users 2: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain Potentially Sensitive Information V-202: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain Potentially Sensitive Information July 25, 2013 - 2:52am Addthis PROBLEM: A remote user can obtain potentially sensitive information and modify some configuration settings. A remote user can exploit this to create, modify, and remove camera feeds, archives, logs, and users. PLATFORM: Cisco Video Surveillance Manager 7.1, 7.5 ABSTRACT: Two vulnerabilities were reported in Cisco Video Surveillance Manager REFERENCE LINKS: Security Tracker Alert ID: 1028827 CVE-2013-3429 CVE-2013-3430 CVE-2013-3431 IMPACT ASSESSMENT: Medium DISCUSSION: The vulnerability is due to an access control error that occurred. The

176

T-647: PHP File Upload Bug May Let Remote Users Overwrite Files on the  

Broader source: Energy.gov (indexed) [DOE]

7: PHP File Upload Bug May Let Remote Users Overwrite Files on 7: PHP File Upload Bug May Let Remote Users Overwrite Files on the Target System T-647: PHP File Upload Bug May Let Remote Users Overwrite Files on the Target System June 15, 2011 - 3:45pm Addthis PROBLEM: A vulnerability was reported in PHP. A remote user may be able to overwrite files on the target system. PLATFORM: PHP prior to 5.3.7 ABSTRACT: PHP is prone to a security-bypass vulnerability.Successful exploits will allow an attacker to delete files from the root directory, which may aid in further attacks. PHP 5.3.6 is vulnerable; other versions may also be affected. reference LINKS: PHP Security Notice PHP CVE-2011-2202 SecurityTracker Alert ID: 1025659 Secunia Advisory: SA44874 CVE-2011-2202 IMPACT ASSESSMENT: High Discussion: The vulnerability lies in the 'SAPI_POST_HANDLER_FUNC()' function in

177

U-192: VMware Workstation/Player VM Remote Device Bug Lets Local or Remote  

Broader source: Energy.gov (indexed) [DOE]

92: VMware Workstation/Player VM Remote Device Bug Lets Local or 92: VMware Workstation/Player VM Remote Device Bug Lets Local or Remote Users Deny Service U-192: VMware Workstation/Player VM Remote Device Bug Lets Local or Remote Users Deny Service June 15, 2012 - 7:00am Addthis PROBLEM: A vulnerability was reported in VMware Workstation/Player. PLATFORM: Version(s): Workstation 8.x, Player 4.x aBSTRACT: A local or remote user can cause denial of service conditions on the target virtual system. reference LINKS: Vendor Advisory Security Tracker ID 1027173 CVE-2012-3289 IMPACT ASSESSMENT: High Discussion: A user with the ability to modify communications data between a remote virtual device (e.g., CD-ROM, keyboard) located on a physically separate system and the target virtual machine can cause the target virtual machine to crash.

178

V-183: Cisco TelePresence TC and TE Bugs Let Remote Users Deny Service and  

Broader source: Energy.gov (indexed) [DOE]

3: Cisco TelePresence TC and TE Bugs Let Remote Users Deny 3: Cisco TelePresence TC and TE Bugs Let Remote Users Deny Service and Remote Adjacent Authenticated Users Gain Root Shell Access V-183: Cisco TelePresence TC and TE Bugs Let Remote Users Deny Service and Remote Adjacent Authenticated Users Gain Root Shell Access June 21, 2013 - 6:00am Addthis PROBLEM: Three vulnerabilities were reported in Cisco TelePresence TC and TE PLATFORM: The following product models are affected by the vulnerabilities: Cisco TelePresence MX Series Cisco TelePresence System EX Series Cisco TelePresence Integrator C Series Cisco TelePresence Profiles Series running Cisco TelePresence Quick Set Series Cisco IP Video Phone E20 ABSTRACT: Cisco TelePresence TC and TE Software contain two vulnerabilities in the implementation of the Session Initiation Protocol (SIP) that could allow an

179

U-201: HP System Management Homepage Bugs Let Remote Users Deny Service |  

Broader source: Energy.gov (indexed) [DOE]

1: HP System Management Homepage Bugs Let Remote Users Deny 1: HP System Management Homepage Bugs Let Remote Users Deny Service U-201: HP System Management Homepage Bugs Let Remote Users Deny Service June 28, 2012 - 7:00am Addthis PROBLEM: A vulnerability was reported in HP System Management Homepage. PLATFORM: Version(s): prior to 7.1.1 ABSTRACT: The vulnerabilities could be exploited remotely resulting in unauthorized access, disclosure of information, data modification, Denial of Service (DoS), and execution of arbitrary code. Reference links: Original Advisory Security Tracker ID 1027209 CVE-2012-2012, CVE-2012-2013, CVE-2012-2014 CVE-2012-2015, CVE-2012-2016 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in HP System Management Homepage. A remote authenticated user can gain elevated privileges. A remote authenticated

180

U-088: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary Code |  

Broader source: Energy.gov (indexed) [DOE]

8: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary 8: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary Code U-088: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary Code January 25, 2012 - 6:00am Addthis PROBLEM: A remote user can execute arbitrary code on the target system. PLATFORM: Version(s): 12.5 SP3; pcAnywhere Solutions 7.1 GA, SP 1, and SP 2 ABSTRACT: Two vulnerabilities were reported in Symantec pcAnywhere. A remote user can execute arbitrary code on the target system. A local user can obtain elevated privileges on the target system. reference LINKS: Symantec Advisory Secunia Advisory SecurityTracker Alert ID:102576 IMPACT ASSESSMENT: Medium Discussion: A remote user can send specially crafted data to TCP port 5631 to trigger a but in the validation of authentication data and execute arbitrary code.

Note: This page contains sample records for the topic "wireshark multiple bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

V-127: Samba Bug Lets Remote Authenticated Users Modify Files | Department  

Broader source: Energy.gov (indexed) [DOE]

7: Samba Bug Lets Remote Authenticated Users Modify Files 7: Samba Bug Lets Remote Authenticated Users Modify Files V-127: Samba Bug Lets Remote Authenticated Users Modify Files April 5, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Samba. PLATFORM: The vulnerabilities are reported in version(s): 3.6.0 - 3.6.5 ABSTRACT: A remote authenticated user can modify files on the target share REFERENCE LINKS: SecurityTracker Alert ID: 1028389 Samba Security Announcement CVE-2013-0454 IMPACT ASSESSMENT: Medium DISCUSSION: A remote authenticated user can perform operations on the target CIFS export that are not permitted by the CIFS share access control settings. This may include writing to read-only shares. IMPACT: Modification of user information SOLUTION: Update to 3.6.6 and higher or apply the following patch Addthis

182

V-115: Apple iOS Bugs Let Local Users Gain Elevated Privileges | Department  

Broader source: Energy.gov (indexed) [DOE]

5: Apple iOS Bugs Let Local Users Gain Elevated Privileges 5: Apple iOS Bugs Let Local Users Gain Elevated Privileges V-115: Apple iOS Bugs Let Local Users Gain Elevated Privileges March 20, 2013 - 12:08am Addthis PROBLEM: Apple iOS Bugs Let Local Users Gain Elevated Privileges PLATFORM: Version(s): prior to 6.1.3 ABSTRACT: Several vulnerabilities were reported in Apple iOS REFERENCE LINKS: Apple security Article: HT1222 SecurityTracker Alert ID: 1028314 CVE-2013-0977 CVE-2013-0978 CVE-2013-0979 CVE-2013-0981 IMPACT ASSESSMENT: High DISCUSSION: A local user can exploit a flaw in the handling of Mach-O executable files with overlapping segments to execute unsigned code on the target system [CVE-2013-0977]. A local user can exploit a flaw in the ARM prefetch abort handling to determine the address of structures in the kernel [CVE-2013-0978].

183

U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code | Department  

Broader source: Energy.gov (indexed) [DOE]

6: Apple iOS Bugs Let Remote Users Execute Arbitrary Code 6: Apple iOS Bugs Let Remote Users Execute Arbitrary Code U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code November 15, 2011 - 8:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Obtain Information and Let Local Users Bypass Authentication. PLATFORM: iOS 3.0 through 5.0 for iPhone 3GS iPhone 4 and iPhone 4S iOS 3.1 through 5.0 for iPod touch (3rd generation) and later iOS 3.2 through 5.0 for iPad, iOS 4.3 through 5.0 for iPad 2 ABSTRACT: A remote user can create content that, when loaded by the target user, will execute arbitrary code on or obtain potentially sensitive information from the target user's system. reference LINKS: Apple Security Article: HT5052 Apple Product Security SecurityTracker Alert ID: 1026311 IMPACT ASSESSMENT:

184

U-211: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated  

Broader source: Energy.gov (indexed) [DOE]

11: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote 11: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories U-211: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories July 12, 2012 - 7:00am Addthis PROBLEM: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories PLATFORM: EMC Celerra Network Server versions 6.0.36.4 through 6.0.60.2 EMC VNX versions 7.0.12.0 through 7.0.53.1 EMC VNXe 2.0 (including SP1, SP2, and SP3) EMC VNXe MR1 (including SP1, SP2, SP3, and SP3.1) EMC VNXe MR2 (including SP0.1) ABSTRACT: A vulnerability was reported in EMC Celerra/VNX/VNXe. A remote authenticated user can access files and directories on the target file system. reference LINKS: The Vendor's Advisory

185

V-031: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated  

Broader source: Energy.gov (indexed) [DOE]

1: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote 1: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated Users Gain Elevated Privileges and Remote Users Deny Service V-031: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated Users Gain Elevated Privileges and Remote Users Deny Service November 22, 2012 - 3:00am Addthis PROBLEM: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated Users Gain Elevated Privileges and Remote Users Deny Service PLATFORM: Version(s): XC10 2.0.0.0 - 2.0.0.3, 2.1.0.0 - 2.1.0.2 ABSTRACT: Several vulnerabilities were reported in IBM WebSphere DataPower. REFERENCE LINKS: IBM Security Bulletin SecurityTracker Alert ID: 1027798 CVE-2012-5758 CVE-2012-5759 CVE-2012-5756 IMPACT ASSESSMENT: High DISCUSSION: Several vulnerabilities were reported in IBM WebSphere DataPower. A remote

186

V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other  

Broader source: Energy.gov (indexed) [DOE]

1: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to 1: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems April 24, 2013 - 1:06am Addthis PROBLEM: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems PLATFORM: HP ElitePad 900 with BIOS version vF.00 ABSTRACT: A vulnerability was reported in HP ElitePad 900 REFERENCE LINKS: HP Document ID: c03727435 SecurityTracker Alert ID: 1028461 CVE-2012-5218 IMPACT ASSESSMENT: Medium DISCUSSION: The BIOS secure boot feature of the BIOS may not be enabled. A local user may be able to bypass the secure boot feature and boot an alternate operating system. IMPACT: A local user can may be able to boot to an alternate operating system. SOLUTION:

187

U-119: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute  

Broader source: Energy.gov (indexed) [DOE]

9: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users 9: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute Arbitrary Code U-119: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute Arbitrary Code March 7, 2012 - 7:00am Addthis PROBLEM: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute Arbitrary Code PLATFORM: BlackBerry 6, BlackBerry 7, BlackBerry 7.1, and BlackBerry PlayBook tablet software ABSTRACT: A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026769 BlackBerry Security Notice Article ID: KB30152 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Blackberry PlayBook. A remote user can cause arbitrary code to be executed on the target user's system. A remote

188

V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other  

Broader source: Energy.gov (indexed) [DOE]

1: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to 1: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems April 24, 2013 - 1:06am Addthis PROBLEM: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems PLATFORM: HP ElitePad 900 with BIOS version vF.00 ABSTRACT: A vulnerability was reported in HP ElitePad 900 REFERENCE LINKS: HP Document ID: c03727435 SecurityTracker Alert ID: 1028461 CVE-2012-5218 IMPACT ASSESSMENT: Medium DISCUSSION: The BIOS secure boot feature of the BIOS may not be enabled. A local user may be able to bypass the secure boot feature and boot an alternate operating system. IMPACT: A local user can may be able to boot to an alternate operating system. SOLUTION:

189

U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof  

Broader source: Energy.gov (indexed) [DOE]

5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and 5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs May 9, 2012 - 7:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs PLATFORM: prior to 5.1.1; iPhone 3GS, iPhone 4, iPhone 4S, iPod touch (3rd generation) and later, iPad, iPad 2 ABSTRACT: Two vulnerabilities were reported in Apple iOS. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can spoof the address bar URL. reference LINKS: SecurityTracker Alert ID: 1027028 CVE-2012-0672 CVE-2012-0674 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a specially crafted file that, when loaded by the

190

T-579: BlackBerry Device Software Bug in WebKit Lets Remote Users Execute  

Broader source: Energy.gov (indexed) [DOE]

9: BlackBerry Device Software Bug in WebKit Lets Remote Users 9: BlackBerry Device Software Bug in WebKit Lets Remote Users Execute Code T-579: BlackBerry Device Software Bug in WebKit Lets Remote Users Execute Code March 15, 2011 - 5:05pm Addthis PROBLEM: A vulnerability was reported in BlackBerry Device Software. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: BlackBerry Device Software version 6.0 and later. ABSTRACT: BlackBerry Device Software Bug in WebKit Lets Remote Users Execute Code. reference LINKS: BlackBerry Advisory: KB26132 CVE-2011-1290 BlackBerry Security Note BlackBerry Device Storage IMPACT ASSESSMENT: Moderate Discussion: A vulnerability exists in the open source WebKit browser engine provided in BlackBerry Device Software version 6.0 and later. The issue could result in

191

U-085: OpenSSL DTLS Bug Lets Remote Users Deny Service | Department of  

Broader source: Energy.gov (indexed) [DOE]

5: OpenSSL DTLS Bug Lets Remote Users Deny Service 5: OpenSSL DTLS Bug Lets Remote Users Deny Service U-085: OpenSSL DTLS Bug Lets Remote Users Deny Service January 20, 2012 - 9:15am Addthis PROBLEM: OpenSSL DTLS Bug Lets Remote Users Deny Service PLATFORM: Only DTLS applications using OpenSSL 1.0.0f and 0.9.8s are affected. ABSTRACT: A flaw in the fix to CVE-2011-4108 can be exploited in a denial of service attack. REFERNCE LINKS: CVE-2012-0050 SecurityTracker Alert ID: 1026548 OpenSSL Security Advisory [18 Jan 2011] OpenSSL News IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in OpenSSL. The fix to correct the Datagram Transport Layer Security (DTLS) vulnerability referenced by CVE-2011-4108 introduced a flaw. A remote user can send specially crafted data to cause denial of service conditions on the target system.

192

U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof  

Broader source: Energy.gov (indexed) [DOE]

5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and 5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs May 9, 2012 - 7:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs PLATFORM: prior to 5.1.1; iPhone 3GS, iPhone 4, iPhone 4S, iPod touch (3rd generation) and later, iPad, iPad 2 ABSTRACT: Two vulnerabilities were reported in Apple iOS. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can spoof the address bar URL. reference LINKS: SecurityTracker Alert ID: 1027028 CVE-2012-0672 CVE-2012-0674 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a specially crafted file that, when loaded by the

193

Control of the chinch bug, Blissus leucopterous (say) on corn and grain sorghum  

E-Print Network [OSTI]

) ~ Painter et ~a. (19$$) azui SnellinS, azzi ~ (ling'p), ore mn~ ztuymoekeC bg other meieOLes an@ strains oF oem. 'tests moro ccn8uctcS Surinam lg6$-3. 966 to evaluate the toxicity cf s~2. imscotici@cs to thc chinch bug. both in the laboratory exxon...

Todd, Larry Leland

2012-06-07T23:59:59.000Z

194

Static Detection of API Error-Handling Bugs via Mining Source Code  

E-Print Network [OSTI]

Static Detection of API Error-Handling Bugs via Mining Source Code Mithun Acharya and Tao Xie}@csc.ncsu.edu Abstract Incorrect handling of errors incurred after API invoca- tions (in short, API errors) can lead to security and robust- ness problems, two primary threats to software reliability. Correct handling of API

Young, R. Michael

195

JC3 Bulletin Archive | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

31, 2013 31, 2013 V-207: Wireshark Multiple Denial of Service Vulnerabilities Successful exploitation of this vulnerability may allow execution of arbitrary code. July 30, 2013 V-206: Apache HTTP Server mod_rewrite and "httpOnly" Cookie Disclosure Vulnerabilities Two vulnerabilities have been reported in Apache HTTP Server July 29, 2013 V-205: IBM Tivoli System Automation for Multiplatforms Java Multiple Vulnerabilities The weakness and the vulnerabilities are caused due to a bundled vulnerable version of Java. July 27, 2013 V-204: A specially crafted query can cause BIND to terminate abnormally A specially crafted query sent to a BIND nameserver can cause it to crash (terminate abnormally). July 26, 2013 V-203: HP LoadRunner Multiple Bugs Let Remote Users Deny Service and

196

Microsoft Word - BUGS_The Next Smart Grid Peak Resource Final 4_19.docx  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

April 15, 2010 April 15, 2010 DOE/NETL-2010/1406 Backup Generators (BUGS): The Next Smart Grid Peak Resource Backup Generators (BUGS): The Next Smart Grid Peak Resource v1.0 ii DISCLAIMER This report was prepared as an account of work sponsored by an agency of the United States Government. Neither the United States Government nor any agency thereof, nor any of their employees, makes any warranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would not infringe privately owned rights. Reference therein to any specific commercial product, process, or service by trade name, trademark, manufacturer, or

197

T-633: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets Remote Users  

Broader source: Energy.gov (indexed) [DOE]

3: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets 3: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets Remote Users Deny Service T-633: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets Remote Users Deny Service May 31, 2011 - 3:35pm Addthis PROBLEM: A vulnerability was reported in BIND. A remote user can cause denial of service conditions. PLATFORM: BIND Version(s): 9.4-ESV-R3 and later, 9.6-ESV-R2 and later, 9.6.3, 9.7.1 and later, 9.8.0 and later; prior to 9.4-ESV-R4-P1, 9.6-ESV-R4-P1, 9.7.3-P1, 9.8.0-P2 ABSTRACT: A remote DNS server can supply very large RRSIG RRsets in a negative response to trigger an off-by-one error in a buffer size check and cause the target requesting named process to crash. A remote user can cause named to crash. reference LINKS: SecurityTracker Alert ID: 1025575 SecurityTracker Alert ID: 1025572

198

V-210: HP LaserJet Pro Printer Bug Lets Remote Users Access Data |  

Broader source: Energy.gov (indexed) [DOE]

V-210: HP LaserJet Pro Printer Bug Lets Remote Users Access Data V-210: HP LaserJet Pro Printer Bug Lets Remote Users Access Data V-210: HP LaserJet Pro Printer Bug Lets Remote Users Access Data August 3, 2013 - 2:37am Addthis PROBLEM: A vulnerability was reported in HP Printers. A remote user can obtain potentially sensitive information. PLATFORM: HP LaserJet Pro products ABSTRACT: A potential security vulnerability has been identified with certain HP LaserJet Pro printers. The vulnerability could be exploited remotely to gain unauthorized access to data. REFERENCE LINKS: SecurityTracker Alert ID 1028869 CVE-2013-4807 Vendor URL IMPACT ASSESSMENT: Medium DISCUSSION: The following models are affected: HP LaserJet Pro P1102w CE657A/CE658A HP LaserJet Pro P1606dn CE749A HP LaserJet Pro M1212nf MFP CE841A HP LaserJet Pro M1213nf MFP CE845A

199

U-265: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain  

Broader source: Energy.gov (indexed) [DOE]

5: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users 5: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain Information and Execute Arbitrary Code U-265: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain Information and Execute Arbitrary Code September 21, 2012 - 6:00am Addthis PROBLEM: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain Information and Execute Arbitrary Code PLATFORM: HP SiteScope v11.10, v11.11, v11.12 for Windows, Linux and Solaris ABSTRACT: A vulnerability was reported in HP SiteScope. reference LINKS: HP Security Bulletin Document ID: c03489683 SecurityTracker Alert ID: 1027547 CVE-2012-3259 CVE-2012-3260 CVE-2012-3261 CVE-2012-3262 CVE-2012-3263 CVE-2012-3264 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in HP SiteScope. A remote user can execute

200

U-232: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the  

Broader source: Energy.gov (indexed) [DOE]

32: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny 32: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the Host OS U-232: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the Host OS August 10, 2012 - 7:00am Addthis PROBLEM: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the Host OS PLATFORM: This vulnerability effects only Xen 4.0 and 4.1. Xen 3.4 and earlier and xen-unstable are not vulnerable. ABSTRACT: A vulnerability was reported in Xen. A local user on a guest operating system can cause denial of service conditions on the host. reference LINKS: Xen Security Announcements SecurityTracker Alert ID: 1027365 seclists.org CVE-2012-3433 IMPACT ASSESSMENT: Medium Discussion: An HVM guest is able to manipulate its physical address space such that tearing down the guest takes an extended period amount of time searching

Note: This page contains sample records for the topic "wireshark multiple bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

U-029: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets Remote Users  

Broader source: Energy.gov (indexed) [DOE]

29: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets Remote 29: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets Remote Users Gain Unauthorized Access U-029: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets Remote Users Gain Unauthorized Access November 8, 2011 - 8:00am Addthis PROBLEM: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets Remote Users Gain Unauthorized Access. PLATFORM: HP TCP/IP Services for OpenVMS v5.6 and v5.7 on iTanium and ALPHA Servers. ABSTRACT: A remote user can gain unauthorized access reference LINKS: HP Support document ID: c01908983 SecurityTracker Alert ID: 1026279 CVE-2011-3168 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in TCP/IP Services for OpenVMS. A remote user can gain unauthorized access. On systems running POP or IMAP servers, a remote user can gain unauthorized access.

202

U-232: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the  

Broader source: Energy.gov (indexed) [DOE]

32: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny 32: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the Host OS U-232: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the Host OS August 10, 2012 - 7:00am Addthis PROBLEM: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the Host OS PLATFORM: This vulnerability effects only Xen 4.0 and 4.1. Xen 3.4 and earlier and xen-unstable are not vulnerable. ABSTRACT: A vulnerability was reported in Xen. A local user on a guest operating system can cause denial of service conditions on the host. reference LINKS: Xen Security Announcements SecurityTracker Alert ID: 1027365 seclists.org CVE-2012-3433 IMPACT ASSESSMENT: Medium Discussion: An HVM guest is able to manipulate its physical address space such that tearing down the guest takes an extended period amount of time searching

203

U-265: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain  

Broader source: Energy.gov (indexed) [DOE]

5: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users 5: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain Information and Execute Arbitrary Code U-265: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain Information and Execute Arbitrary Code September 21, 2012 - 6:00am Addthis PROBLEM: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain Information and Execute Arbitrary Code PLATFORM: HP SiteScope v11.10, v11.11, v11.12 for Windows, Linux and Solaris ABSTRACT: A vulnerability was reported in HP SiteScope. reference LINKS: HP Security Bulletin Document ID: c03489683 SecurityTracker Alert ID: 1027547 CVE-2012-3259 CVE-2012-3260 CVE-2012-3261 CVE-2012-3262 CVE-2012-3263 CVE-2012-3264 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in HP SiteScope. A remote user can execute

204

Year of Biodiversity Podcast Welcome to Bug Bytes, a bimonthly podcast from Texas A&M University's  

E-Print Network [OSTI]

are affected. Biodiversity encompasses humans, plants, animals, fungi, bacteria, food, and water at the scale that we don't! Join us on this excursion as we learn from the bugs that share in every aspect of our lives the human element, the diversity of cultures and how we impact the world around us. How, in turn we

Behmer, Spencer T.

205

V-043: Perl Locale::Maketext Module '_compile()' Multiple Code Injection  

Broader source: Energy.gov (indexed) [DOE]

3: Perl Locale::Maketext Module '_compile()' Multiple Code 3: Perl Locale::Maketext Module '_compile()' Multiple Code Injection Vulnerabilities V-043: Perl Locale::Maketext Module '_compile()' Multiple Code Injection Vulnerabilities December 10, 2012 - 1:00am Addthis PROBLEM: Perl Locale::Maketext Module Two Code Injection Vulnerabilities PLATFORM: Locale::Maketext 1.23 is affected; other versions also may be affected. ABSTRACT: Two vulnerabilities have been reported in Locale::Maketext module for Perl REFERENCE LINKS: Secunia Advisory SA51498 Debian Bug report logs - #695224 Bugtraq ID: 56852 IMPACT ASSESSMENT: Medium DISCUSSION: Two vulnerabilities have been reported in Locale::Maketext module for Perl, which can be exploited by malicious users to compromise an application using the module. The vulnerabilities are caused due to the "_compile()" function not

206

V-043: Perl Locale::Maketext Module '_compile()' Multiple Code Injection  

Broader source: Energy.gov (indexed) [DOE]

3: Perl Locale::Maketext Module '_compile()' Multiple Code 3: Perl Locale::Maketext Module '_compile()' Multiple Code Injection Vulnerabilities V-043: Perl Locale::Maketext Module '_compile()' Multiple Code Injection Vulnerabilities December 10, 2012 - 1:00am Addthis PROBLEM: Perl Locale::Maketext Module Two Code Injection Vulnerabilities PLATFORM: Locale::Maketext 1.23 is affected; other versions also may be affected. ABSTRACT: Two vulnerabilities have been reported in Locale::Maketext module for Perl REFERENCE LINKS: Secunia Advisory SA51498 Debian Bug report logs - #695224 Bugtraq ID: 56852 IMPACT ASSESSMENT: Medium DISCUSSION: Two vulnerabilities have been reported in Locale::Maketext module for Perl, which can be exploited by malicious users to compromise an application using the module. The vulnerabilities are caused due to the "_compile()" function not

207

Bugs boost Cold War clean-up: Bacteria could scrub uranium from sites contaminated decades ago. updated at midnight GMTtoday is friday, november 14  

E-Print Network [OSTI]

in the study was contaminated by low levels of uranium from mining residue. The team hopes that the techniqueBugs boost Cold War clean-up: Bacteria could scrub uranium from sites contaminated decades ago boost Cold War clean-up Bacteria could scrub uranium from sites contaminated decades ago. 13 October

Lovley, Derek

208

Got the "Buy Local" bug? Here are some resources for you! From farmers markets to grocery stores to university cafeterias, more retailers are showcasing food  

E-Print Network [OSTI]

the feasibility of new marketing opportunities; expand capacity for locally and regionallygrown productsGot the "Buy Local" bug? Here are some resources for you! From farmers markets to grocery stores for local fresh markets. Interested producers should contact their local FSA office at www

Debinski, Diane M.

209

Solution Structure of Ptu1, a Toxin from the Assassin Bug Peirates turpis That Blocks the Voltage-Sensitive Calcium Channel N-Type  

Science Journals Connector (OSTI)

Ptu1 is a toxin from the assassin bug Peirates turpis which has been demonstrated to bind reversibly the N-type calcium channels and to have lower affinity than the ?-conotoxin MVIIA. We have determined the solution structure of Ptu1 by use of ...

Cédric Bernard; Gerardo Corzo; Amor Mosbah; Terumi Nakajima; Hervé Darbon

2001-10-02T23:59:59.000Z

210

Does fundamental host range match ecological host range? A retrospective case study of a Lygus plant bug parasitoid  

Science Journals Connector (OSTI)

Using the retrospective case study of Peristenus digoneutis (Hymenoptera: Braconidae) introduced in the United States for biological control of native Lygus plant bugs (Hemiptera: Miridae), laboratory and field studies were conducted in the area of origin to evaluate whether the fundamental host range of P. digoneutis matches its ecological host range. Furthermore, it was determined whether these approaches would have been indicative of the post-introduction host range of P. digoneutis in North America [Day, W.H., 1999. Host preference of introduced and native parasites (Hymenoptera: Braconidae) of phytophagous plant bugs (Hemiptera: Miridae) in alfalfa-grass fields in the north-eastern USA, BioControl 44, 249–261.]. Seven non-target mirid species were selected to define the fundamental host range of P. digoneutis in the area of origin in Europe. Laboratory choice and no-choice tests demonstrated that all selected non-target species were attacked by P. digoneutis and were largely suitable for parasitoid development. To confirm the validity of the fundamental host range, the ecological host range of P. digoneutis in the area of origin was investigated. Peristenus digoneutis was reared from 10 hosts, including three Lygus species and seven non-target hosts from the subfamily Mirinae. Despite the fact that laboratory tests demonstrated a high parasitism level in non-targets, ecological assessments in both North America (Day, 1999) and Europe suggest a much lower impact of P. digoneutis on non-target mirids, with low levels of parasitism (below 1% in Europe). Therefore, ecological host range studies in the area of origin provide useful supplementary data for interpreting pre-release laboratory host range testing.

T. Haye; H. Goulet; P.G. Mason; U. Kuhlmann

2005-01-01T23:59:59.000Z

211

Complete genome sequence of Coriobacterium glomerans type strain (PW2T) from the midgut of Pyrrhocoris apterus L. (red soldier bug)  

SciTech Connect (OSTI)

Coriobacterium glomerans Haas and Ko nig 1988, is the only species of the genus Coriobacterium, family Coriobacteriaceae, order Coriobacteriales, phylum Actinobacteria. The bacterium thrives as an endosymbiont of pyrrhocorid bugs, i.e. the red fire bug Pyrrhocoris apterus L. The rationale for sequencing the genome of strain PW2T is its endosymbiotic life style which is rare among members of Actinobacteria. Here we describe the features of this symbiont, together with the complete genome sequence and its annotation. This is the first complete genome sequence of a member of the genus Coriobacterium and the sixth member of the order Coriobacteriales for which complete genome sequences are now available. The 2,115,681 bp long single replicon genome with its 1,804 protein-coding and 54 RNA genes is part of the Genomic Encyclopedia of Bacteria and Archaea project.

Stackebrandt, Erko [DSMZ - German Collection of Microorganisms and Cell Cultures GmbH, Braunschweig, Germany; Zeytun, Ahmet [Los Alamos National Laboratory (LANL); Lapidus, Alla L. [U.S. Department of Energy, Joint Genome Institute; Nolan, Matt [U.S. Department of Energy, Joint Genome Institute; Lucas, Susan [U.S. Department of Energy, Joint Genome Institute; Hammon, Nancy [U.S. Department of Energy, Joint Genome Institute; Deshpande, Shweta [U.S. Department of Energy, Joint Genome Institute; Cheng, Jan-Fang [U.S. Department of Energy, Joint Genome Institute; Tapia, Roxanne [Los Alamos National Laboratory (LANL); Goodwin, Lynne A. [Los Alamos National Laboratory (LANL); Pitluck, Sam [U.S. Department of Energy, Joint Genome Institute; Liolios, Konstantinos [U.S. Department of Energy, Joint Genome Institute; Pagani, Ioanna [U.S. Department of Energy, Joint Genome Institute; Ivanova, N [U.S. Department of Energy, Joint Genome Institute; Mavromatis, K [U.S. Department of Energy, Joint Genome Institute; Mikhailova, Natalia [U.S. Department of Energy, Joint Genome Institute; Huntemann, Marcel [U.S. Department of Energy, Joint Genome Institute; Pati, Amrita [U.S. Department of Energy, Joint Genome Institute; Chen, Amy [U.S. Department of Energy, Joint Genome Institute; Palaniappan, Krishna [U.S. Department of Energy, Joint Genome Institute; Chang, Yun-Juan [ORNL; Land, Miriam L [ORNL; Hauser, Loren John [ORNL; Rohde, Manfred [HZI - Helmholtz Centre for Infection Research, Braunschweig, Germany; Pukall, Rudiger [DSMZ - German Collection of Microorganisms and Cell Cultures GmbH, Braunschweig, Germany; Goker, Markus [DSMZ - German Collection of Microorganisms and Cell Cultures GmbH, Braunschweig, Germany; Detter, J. Chris [U.S. Department of Energy, Joint Genome Institute; Woyke, Tanja [U.S. Department of Energy, Joint Genome Institute; Bristow, James [U.S. Department of Energy, Joint Genome Institute; Eisen, Jonathan [U.S. Department of Energy, Joint Genome Institute; Markowitz, Victor [U.S. Department of Energy, Joint Genome Institute; Hugenholtz, Philip [U.S. Department of Energy, Joint Genome Institute; Kyrpides, Nikos C [U.S. Department of Energy, Joint Genome Institute; Klenk, Hans-Peter [DSMZ - German Collection of Microorganisms and Cell Cultures GmbH, Braunschweig, Germany

2013-01-01T23:59:59.000Z

212

Multiple density layered insulator  

DOE Patents [OSTI]

A multiple density layered insulator for use with a laser is disclosed wh provides at least two different insulation materials for a laser discharge tube, where the two insulation materials have different thermoconductivities. The multiple layer insulation materials provide for improved thermoconductivity capability for improved laser operation.

Alger, Terry W. (Tracy, CA)

1994-01-01T23:59:59.000Z

213

What Did They Do in IEA 34/43? Or How to Diagnose and Repair Bugs in 500,000 Lines of Code: Preprint  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

4978 4978 June 2009 What Did They Do in IEA 34/43? Or How to Diagnose and Repair Bugs in 500,000 Lines of Code Preprint R. Judkoff National Renewable Energy Laboratory J. Neymark J. Neymark & Associates To be presented at the Building Simulation 2009 Conference Glasgow, Scotland 27-30 July 2009 NOTICE The submitted manuscript has been offered by an employee of the Alliance for Sustainable Energy, LLC (ASE), a contractor of the US Government under Contract No. DE-AC36-08-GO28308. Accordingly, the US Government and ASE retain a nonexclusive royalty-free license to publish or reproduce the published form of this contribution, or allow others to do so, for US Government purposes. This report was prepared as an account of work sponsored by an agency of the United States government.

214

Bugs, Drugs & Smoke  

E-Print Network [OSTI]

Panic in Surat Then came Ebola Change in awareness Ready tonew diseases (e.g. Ebola and Marburg) have appeared. Thissomething far more serious. Ebola first appeared in 1976 in

WHO

2012-01-01T23:59:59.000Z

215

Bugs, Drugs & Smoke  

E-Print Network [OSTI]

in saving lives, poor sanitation, unclean water (Photo 2.9)and food due to poor hygiene and sanitation. administered by

WHO

2012-01-01T23:59:59.000Z

216

Pyrochemical multiplicity counter development  

SciTech Connect (OSTI)

Impure plutonium-bearing materials from pyrochemical processes often display both significant self-multiplication and variable ({alpha},n) reaction rates. Standard neutron coincidence counting techniques usually fail to accurately measure these materials. Neutron multiplicity counters measure the third moment of the neutron multiplicity distribution and thus make it possible to deduce the fertile plutonium mass of a sample even when both the self-multiplication and the ({alpha},n) reaction rate are unknown. A multiplicity counter suitable for measuring pyrochemical materials has been designed and built. This paper describes the results of characterization studies for the new counter. The counter consists of 126 helium-3 tubes arranged in 4 concentric rings in a polyethylene moderator; the average spacing between the tubes is 1.59 cm. The end plugs for the counter are made of graphite, and the 24.1- by 37.5-cm sample cavity is cadmium lined. The counter consists of two distinct halves from which the neutron counts are summed. The counter is capable of operation in either a freestanding mode with the two halves coupled together by an external cabinet or in a glove-box mode with the two halves placed around a glovebox well and then mated. For a {sup 252}Cf source centered in the sample cavity, the measured efficiency of the new multiplicity counter is 57.7% and its die-away time is 47.2{mu}s. 8 refs., 9 figs.

Langner, D.G.; Dytlewski, N.; Krick, M.S.

1991-01-01T23:59:59.000Z

217

V-094: IBM Multiple Products Multiple Vulnerabilities | Department of  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

94: IBM Multiple Products Multiple Vulnerabilities 94: IBM Multiple Products Multiple Vulnerabilities V-094: IBM Multiple Products Multiple Vulnerabilities February 19, 2013 - 1:41am Addthis PROBLEM: IBM Multiple Products Multiple Vulnerabilities PLATFORM: IBM Maximo Asset Management versions 7.5, 7.1, and 6.2 IBM Maximo Asset Management Essentials versions 7.5, 7.1, and 6.2 IBM SmartCloud Control Desk version 7.5 IBM Tivoli Asset Management for IT versions 7.2, 7.1, and 6.2 IBM Tivoli Change and Configuration Management Database versions 7.2 and 7.1 IBM Tivoli Service Request Manager versions 7.2, 7.1, and 6.2 ABSTRACT: A weakness and multiple vulnerabilities have been reported in multiple IBM products. REFERENCE LINKS: IBM Reference #:1625624 IBM Product Security Incident Response Blog Secunia Advisory SA52132

218

Multiple Rankine topping cycles  

SciTech Connect (OSTI)

The efficiency of a Rankine cycle is primarily determined by the temperatures of heat addition and rejection. However, no working fluid has been identified which will operate in a Rankine cycle over an extremely wide temperature range. Multiple Rankine topping cycles offer a technique for achieving high thermal efficiencies in power plants by allowing the use of several working fluids. This paper gives a history of Rankine topping cycles, presents an analysis for the calculation of the overall efficiency of a three-module multiple Rankine cycle, and presents results from a case study for a sodium-mercury-water cycle.

McWhirter, J.D. [Argonne National Lab., Idaho Falls, ID (United States). Engineering Div.]|[Idaho State Univ., Pocatello, ID (United States). Coll. of Engineering

1995-07-01T23:59:59.000Z

219

Multiple gap photovoltaic device  

DOE Patents [OSTI]

A multiple gap photovoltaic device having a transparent electrical contact adjacent a first cell which in turn is adjacent a second cell on an opaque electrical contact, includes utilizing an amorphous semiconductor as the first cell and a crystalline semiconductor as the second cell.

Dalal, Vikram L. (Newark, DE)

1981-01-01T23:59:59.000Z

220

Multiple System Rate Process  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

DSW Multiple System Transmission Rate Process DSW Multiple System Transmission Rate Process Federal Register Notice Withdrawing Rate Proposal (PDF) Formal Process Extension Federal Register Notice (PDF) Customer Savings Under Various MSTR (XLS) Public Information Forum March 29, 2005 Customer Meeting Overview (Power Point) Customer Meeting Overview (PDF) Customer Meeting Transcript (PDF) Public Comment Forum April 6, 2005 Customer Meeting Transcript (PDF) Response Letter 5-17-05 (PDF) Customer Letters Tonopah ID-5/25/05 (PDF) APS-5/26/05 (PDF) SRP-5/27/05 (PDF) RSLynch-6/1/05 (PDF) KRSaline-6/1/05 (PDF) Formal Process Federal Register Notice (Word) Federal Register Notice (PDF) Brochure (Word) Appendices to Brochure: A B C D E1 E2 F1 F2 GH Public Information Forum July 14, 2004 Customer Meeting Overview (Power Point)

Note: This page contains sample records for the topic "wireshark multiple bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Multiple sclerosis and interferon  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Multiple sclerosis and interferon Multiple sclerosis and interferon Name: iguanajoe Status: N/A Age: N/A Location: N/A Country: N/A Date: Around 1993 Question: I have recently read that interferon is being used as a treatment for multiple sclerosis. Please explain how it affects the nerve tissue and how effective it is. Replies: Interferon is a cell to cell chemical messenger which essentially protects cells from viruses. That is, when a virus infects a cell, it sends out interferon, which is received by neighboring cells. A biochemical reaction then follows which builds the cells resistance viruses, and hopefully, it will be enough to prevent the virus from spreading. If there is work with interferon and MS, perhaps some researchers believe that MS is caused by a viral infection that destroys nervous tissue. r, that viruses cause some genetic mutation which compromises the maintenance of healthy nervous tissue. By the way, the genetic cause for another muscular-nervous disorder, Lou Gherigs Disease or ALS, was recently found to be a hereditary genetic disorder. People susceptible to ALS did not have a gene which codes for a certain superoxide dismutase antioxidant enzyme, necessary to maintain healthy nervous tissue and prevent it from free radical destruction. Maybe the cause of MS is similar.

222

JC3 Bulletin Archive | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

March 8, 2013 March 8, 2013 V-107: Wireshark Multiple Denial of Service Vulnerabilities Multiple vulnerabilities have been reported in Wireshark, which can be exploited by malicious people to cause a DoS (Denial of Service). March 7, 2013 V-106: Citrix Access Gateway Unspecified Security Bypass Vulnerability A vulnerability has been reported in Citrix Access Gateway, which can be exploited by malicious people to bypass certain security restrictions. March 6, 2013 V-105: Google Chrome Multiple Vulnerabilities Multiple vulnerabilities have been reported in Google Chrome March 5, 2013 V-104: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code A vulnerability was reported in Oracle Java March 4, 2013 V-103: RSA Authentication Agent Lets Remote Users Bypass Authentication

223

Multiple layer insulation cover  

DOE Patents [OSTI]

A multiple layer insulation cover for preventing heat loss in, for example, a greenhouse, is disclosed. The cover is comprised of spaced layers of thin foil covered fabric separated from each other by air spaces. The spacing is accomplished by the inflation of spaced air bladders which are integrally formed in the cover and to which the layers of the cover are secured. The bladders are inflated after the cover has been deployed in its intended use to separate the layers of the foil material. The sizes of the material layers are selected to compensate for sagging across the width of the cover so that the desired spacing is uniformly maintained when the cover has been deployed. The bladders are deflated as the cover is stored thereby expediting the storage process and reducing the amount of storage space required.

Farrell, James J. (Livingston Manor, NY); Donohoe, Anthony J. (Ovid, NY)

1981-11-03T23:59:59.000Z

224

Traits and Multiple Genes  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Traits and Multiple Genes Traits and Multiple Genes Name: Frank Location: N/A Country: N/A Date: N/A Question: Please, could you give me an example of how human traits are controlled by more than one pair of alleles? Replies: Your question is just a bit vague, there are different answers depending on just what your question is. I will answer it in terms of polygenic traits also known as additive alleles. When you think of traits such as skin color, hair color and eye color, or traits where there is a wide range of phenotypes they are usually under the control of more than one pair of alleles. These alleles can even be on different chromosomes! Each pair of additive alleles adds to the phenotype. For instance in the case of skin color, scientists now believe that 3 genes control skin color. You then get 3 sets from your mother and 3 from your father for 6 possibilities. If all 6 of the alleles are for dark skin, you will have the darkest possible skin. If you have 5 dark alleles and one light, you will have very dark skin. If you have all 6 light alleles then you will have the lightest skin possible. Is it possible to have a child that is light skinned when both parents are dark-skinned? Well, not if both have all 6 dark alleles, but if they have some light alleles and the child inherits all of the possible light alleles available, then yes, the child could have lighter skin than either parent. It is now believed that eye color is not simply brown being dominant over blue because how many people do you know that have the same shade of brown or blue eyes? Eye color must also be polygenic.

225

AM with Multiple Merlins  

E-Print Network [OSTI]

We introduce and study a new model of interactive proofs: AM(k), or Arthur-Merlin with k non-communicating Merlins. Unlike with the better-known MIP, here the assumption is that each Merlin receives an independent random challenge from Arthur. One motivation for this model (which we explore in detail) comes from the close analogies between it and the quantum complexity class QMA(k), but the AM(k) model is also natural in its own right. We illustrate the power of multiple Merlins by giving an AM(2) protocol for 3SAT, in which the Merlins' challenges and responses consist of only n^{1/2+o(1)} bits each. Our protocol has the consequence that, assuming the Exponential Time Hypothesis (ETH), any algorithm for approximating a dense CSP with a polynomial-size alphabet must take n^{(log n)^{1-o(1)}} time. Algorithms nearly matching this lower bound are known, but their running times had never been previously explained. Brandao and Harrow have also recently used our 3SAT protocol to show quasipolynomial hardness for approximating the values of certain entangled games. In the other direction, we give a simple quasipolynomial-time approximation algorithm for free games, and use it to prove that, assuming the ETH, our 3SAT protocol is essentially optimal. More generally, we show that multiple Merlins never provide more than a polynomial advantage over one: that is, AM(k)=AM for all k=poly(n). The key to this result is a subsampling theorem for free games, which follows from powerful results by Alon et al. and Barak et al. on subsampling dense CSPs, and which says that the value of any free game can be closely approximated by the value of a logarithmic-sized random subgame.

Scott Aaronson; Russell Impagliazzo; Dana Moshkovitz

2014-01-27T23:59:59.000Z

226

Hadron multiplicities at the LHC  

E-Print Network [OSTI]

We present the predictions for hadron multiplicities in pp, pA and AA collisions at the LHC based on our approach to the Color Glass Condensate.

D. Kharzeev; E. Levin; M. Nardi

2007-07-05T23:59:59.000Z

227

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

September 10, 2012 September 10, 2012 U-254: Webmin Flaws Let Remote Authenticated Users Execute Arbitrary Code and View Arbitrary Files Webmin Multiple Input Validation Vulnerabilities September 6, 2012 U-252: Barracuda Web Filter Input Validation Flaws Permit Cross-Site Scripting Attacks Barracuda Web Filter Authentification Module Multiple HTML Injection Vulnerabilities September 5, 2012 U-251: Bugzilla LDAP Injection and Information Disclosure Vulnerabilities Bugzilla is prone to an LDAP-injection vulnerability and an information-disclosure vulnerability September 4, 2012 U-250: Wireshark DRDA Dissector Flaw Lets Remote Users Deny Service Wireshark is prone to a denial-of-service vulnerability. August 30, 2012 U-248: Symantec Messaging Gateway Multiple Flaws Let Remote Users Access

228

Parallel progressive multiple sequence alignment  

Science Journals Connector (OSTI)

Multiple Sequence Alignment is an essential tool in the analysis and comparison of biological sequences. Unfortunately, the complexity of this problem is exponential. Currently feasible methods are, therefore, only approximations. The progressive ...

Erik Pitzer

2005-02-01T23:59:59.000Z

229

Multiple Motivations Institutional Change Principle  

Broader source: Energy.gov [DOE]

The multiple motivations principle suggests that a portfolio approach—rather than a single strategy—may be required to achieve change. Research demonstrates that people and institutions adopt new...

230

Multiple hypothesis evaluation in auditing  

E-Print Network [OSTI]

In many audit tasks, auditors evaluate multiple hypotheses to diagnose the situation. Research suggests this is a complex task that individuals have difficulty performing. Further, there is little guidance in professional ...

Srivastava, Rajendra P.; Wright, Arnold; Mock, Theodore J.

2002-11-01T23:59:59.000Z

231

Multiple matching of parameterized patterns  

Science Journals Connector (OSTI)

We extend Baker's theory of parameterized pattern matching [Proc. 25th Annual STOC, 1993, pp. 71–80] to algorithms that match multiple patterns in a text. We first consider the case where the patterns are fixed a...

Ramana M. Idury; Alejandro A. Schäffer

1994-01-01T23:59:59.000Z

232

JC3 Bulletin Archive | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

3, 2011 3, 2011 T-636: Wireshark Multiple Flaws Let Remote Users Deny Service Multiple vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions. June 2, 2011 T-635: Cisco AnyConnect Secure Mobility Client Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges Cisco AnyConnect Secure Mobility Client contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on a targeted system. The vulnerability exists due to improper validation of program executables downloaded by the Cisco AnyConnect Secure Mobility Client. An unauthenticated, remote attacker could exploit the vulnerability by convincing the targeted user to view a malicious website. If successful, the attacker could execute arbitrary code on the system with the privileges

233

The INEL beryllium multiplication experiment  

SciTech Connect (OSTI)

The experiment to measure the multiplication of 14-MeV neutrons in bulk beryllium has been completed. The experiment consists of determining the ratio of {sup 56}Mn activities induced in a large manganese bath by a central 14-MeV neutron source, with and without a beryllium sample surrounding the source. In the manganese bath method a neutron source is placed at the center of a totally-absorbing aqueous solution of MnSo{sub 4}. The capture of neutrons by Mn produces a {sup 56}Mn activity proportional to the emission rate of the source. As applied to the measurement of the multiplication of 14- MeV neutrons in bulk beryllium, the neutron source is a tritium target placed at the end of the drift tube of a small deuteron accelerator. Surrounding the source is a sample chamber. When the sample chamber is empty, the neutrons go directly to the surrounding MnSO{sub 4} solution, and produce a {sup 56}Mn activity proportional to the neutron emission rate. When the chamber contains a beryllium sample, the neutrons first enter the beryllium and multiply through the (n,2n) process. Neutrons escaping from the beryllium enter the bath and produce a {sup 56}Mn activity proportional to the neutron emission rate multiplied by the effective value of the multiplication in bulk beryllium. The ratio of the activities with and without the sample present is proportional to the multiplication value. Detailed calculations of the multiplication and all the systematic effects were made with the Monte Carlo program MCNP, utilizing both the Young and Stewart and the ENDF/B-VI evaluations for beryllium. Both data sets produce multiplication values that are in excellent agreement with the measurements for both raw and corrected values of the multiplication. We conclude that there is not real discrepancy between experimental and calculated values for the multiplication of neutrons in bulk beryllium. 12 figs., 11 tabs., 18 refs.

Smith, J.R.; King, J.J.

1991-03-01T23:59:59.000Z

234

Fair capacity sharing of multiple aperiodic servers  

E-Print Network [OSTI]

For handling multiple aperiodic tasks with different temporal requirements, multiple aperiodic servers are used. Since capacity is partitioned statically among the multiple servers, they suffer from heavy capacity exhaustions. Bernat and Burns...

Melapudi, Vinod Reddy

2002-01-01T23:59:59.000Z

235

Federal Energy Management Program: Multiple Motivations Institutional  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Multiple Multiple Motivations Institutional Change Principle to someone by E-mail Share Federal Energy Management Program: Multiple Motivations Institutional Change Principle on Facebook Tweet about Federal Energy Management Program: Multiple Motivations Institutional Change Principle on Twitter Bookmark Federal Energy Management Program: Multiple Motivations Institutional Change Principle on Google Bookmark Federal Energy Management Program: Multiple Motivations Institutional Change Principle on Delicious Rank Federal Energy Management Program: Multiple Motivations Institutional Change Principle on Digg Find More places to share Federal Energy Management Program: Multiple Motivations Institutional Change Principle on AddThis.com... Sustainable Buildings & Campuses

236

Modularization to Support Multiple Brand Platforms  

E-Print Network [OSTI]

Methods to determine acceptable architecture for multiple platforms supporting multiple brands must represent both platform cost saving commonization as well as revenue enhancing brand distinctions. Functional architecting ...

Agus, Sudjianto

2001-09-09T23:59:59.000Z

237

Symplectic Integrator Mercury: Bug Report  

E-Print Network [OSTI]

We report on a problem found in MERCURY, a hybrid symplectic integrator used for dynamical problems in Astronomy. The variable that keeps track of bodies' statuses is uninitialised, which can result in bodies disappearing from simulations in a non-physical manner. Some FORTRAN compilers implicitly initialise variables, preventing simulations from having this problem. With other compilers, simulations with a suitably large maximum number of bodies parameter value are also unaffected. Otherwise, the problem manifests at the first event after the integrator is started, whether from scratch or continuing a previously stopped simulation. Although the problem does not manifest in some conditions, explicitly initialising the variable solves the problem in a permanent and unconditional manner.

K. de Souza Torres; D. R. Anderson

2008-08-04T23:59:59.000Z

238

The Harlequin Cabbage-bug.  

E-Print Network [OSTI]

SUBSTATIONS P. L. DOWNS, President, Temple .................................................................................. Term expires 1919 CHARLES ROGAN, Vzce Preszdent, Austin ...................................................................... Term.... V. M., .Veterinarian SUBSTATION NO. 1: Beeville, Bee Connty DIVISION OF CHEMISTRY E. E. BINFORD, B. S., Superintendent G. S. FRAPS,.~~. D., Chemist in Charge; SUBSTATION NO. 2: Troup, Smith State Chemlst R H RIDGELL B. S Assistant Chemist W. S...

Paddock, F.B. (Floyd B.)

1915-01-01T23:59:59.000Z

239

OpenEI Community - bug  

Open Energy Info (EERE)

Ghost" entries http:en.openei.orgcommunitydiscussionghost-entries

There is an issue that Illinois State University has come across.  From Nick B:

240

Multiple smart weapons employment mechanism  

SciTech Connect (OSTI)

A digital communications armament network adaptor is described for carrying multiple smart weapons on a single wing pylon station of an aircraft, comprising: an aircraft having a weapons controller configured in compliance with MIL-STD 1553; multiple wing-mounted pylons on said aircraft, each providing a weapons station with communications and ejection and release mechanisms electrically connected to said controller for the airborne launch of smart weapons; a multiple ejector rack affixed to at least one pylon, said rack holding a plurality of smart weapons; and an electronic digital network connected between the controller and said rack-mounted smart weapons, said network located in said rack and including circuitry which receives coded digital communications from said controller and selectively rebroadcasts said communications to one of said smart weapons on said rack designated by said coded communications, thereby controlling all required functions of said designated smart weapon.

McGlynn, M.P.; Meiklejohn, W.D.

1993-07-20T23:59:59.000Z

Note: This page contains sample records for the topic "wireshark multiple bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Information transfer at multiple scales  

Science Journals Connector (OSTI)

In the study of complex systems a fundamental issue is the mapping of the networks of interaction between constituent subsystems of a complex system or between multiple complex systems. Such networks define the web of dependencies and patterns of continuous and dynamic coupling between the system’s elements characterized by directed flow of information spanning multiple spatial and temporal scales. Here, we propose a wavelet-based extension of transfer entropy to measure directional transfer of information between coupled systems at multiple time scales and demonstrate its effectiveness by studying (a) three artificial maps, (b) physiological recordings, and (c) the time series recorded from a chaos-controlled simulated robot. Limitations and potential extensions of the proposed method are discussed.

Max Lungarella; Alex Pitti; Yasuo Kuniyoshi

2007-11-27T23:59:59.000Z

242

Interactive Multiple Scale Small Multiples Andrew S. Forsberg  

E-Print Network [OSTI]

-dependent, include thousands of time steps, and have multiple fields. While mathematical modeling helps users? Motivated by the complex data generated from bat flight simulations in a wind tunnel [8], we designed datasets (e.g., kinematics, anatomical structures, and the wake structure behind bat wings). The views

Laidlaw, David

243

Multiple resonant railgun power supply  

DOE Patents [OSTI]

A multiple repetitive resonant railgun power supply provides energy for repetitively propelling projectiles from a pair of parallel rails. A plurality of serially connected paired parallel rails are powered by similar power supplies. Each supply comprises an energy storage capacitor, a storage inductor to form a resonant circuit with the energy storage capacitor and a magnetic switch to transfer energy between the resonant circuit and the pair of parallel rails for the propelling of projectiles. The multiple serial operation permits relatively small energy components to deliver overall relatively large amounts of energy to the projectiles being propelled.

Honig, E.M.; Nunnally, W.C.

1985-06-19T23:59:59.000Z

244

Multiple matching of parameterized patterns  

Science Journals Connector (OSTI)

We extend Baker's theory of parameterized string matching (1993) to algorithms that match multiple patterns in a text. We first consider the case where the patterns are fixed and preprocessed once, and then the case where the pattern set can change by insertions and deletions. Baker's algorithms are based on suffix trees, whereas ours are based on pattern matching automata.

Ramana M. Idury; Alejandro A. Schäffer

1996-01-01T23:59:59.000Z

245

Multiple Sclerosis Society (Grant Tracker) Multiple Sclerosis Society (Grant Tracker) applicant guide June 2012 Page 1  

E-Print Network [OSTI]

Multiple Sclerosis Society (Grant Tracker) Multiple Sclerosis Society (Grant Tracker) applicant guide June 2012 Page 1 2012 INTERNAL USER GUIDE A Guide to the Multiple Sclerosis Society Grant Tracker Society web page: http://www.mssociety.org.uk/ #12;Multiple Sclerosis Society (Grant Tracker) Multiple

246

The proliferation of functions: multiple systems playing multiple roles in multiple super systems  

E-Print Network [OSTI]

 played by any given system are represented by the  function analysis diagram (Aurisicchio, Bracewell, & Armstrong, 2013;  Devoino et al., 1997). Here, components of a system are connected to each  other through the effect that one has on the other. Components can affect  multiple...

Crilly, Nathan

2014-07-14T23:59:59.000Z

247

A NEW MULTIPLE-UNIT ELECTRODIALYSIS APPARATUS  

Science Journals Connector (OSTI)

...NEW MULTIPLE-UNIT ELECTRODIALYSIS APPARATUS 10.1126...NEW MULTIPLE-UNIT ELECTRODIALYSIS APPARATUS. | Journal...maturity, variety and treatment on the iodine value...CHICAGO, ILLINOIS WATER SOLUBLE MAGNESIUM...NEW MULTIPLE-UNIT ELECTRODIALYSIS ous fields of science...

Aasulv Löddesöl

1932-07-22T23:59:59.000Z

248

Recirculation in multiple wave conversions  

SciTech Connect (OSTI)

A one-dimensional multiple wave-conversion model is constructed that allows energy recirculation in ray phase space. Using a modular eikonal approach, the connection coefficients for this model are calculated by ray phase-space methods. Analytical results (confirmed numerically) show that all connection coefficients exhibit interference effects that depend on an interference phase, calculated from the coupling constants and the area enclosed by the intersecting rays. This conceptual model, which focuses on the topology of intersecting rays in phase space, is used to investigate how mode conversion between primary and secondary waves is modified by the presence of a tertiary wave.

Kaufman, A. N.; Brizard, A.J.; Kaufman, A.N.; Tracy, E.R.

2008-07-30T23:59:59.000Z

249

Multiple protocol fluorometer and method  

DOE Patents [OSTI]

A multiple protocol fluorometer measures photosynthetic parameters of phytoplankton and higher plants using actively stimulated fluorescence protocols. The measured parameters include spectrally-resolved functional and optical absorption cross sections of PSII, extent of energy transfer between reaction centers of PSII, F.sub.0 (minimal), F.sub.m (maximal) and F.sub.v (variable) components of PSII fluorescence, photochemical and non-photochemical quenching, size of the plastoquinone (PQ) pool, and the kinetics of electron transport between Q.sub.a and PQ pool and between PQ pool and PSI. The multiple protocol fluorometer, in one embodiment, is equipped with an excitation source having a controlled spectral output range between 420 nm and 555 nm and capable of generating flashlets having a duration of 0.125-32 .mu.s, an interval between 0.5 .mu.s and 2 seconds, and peak optical power of up to 2 W/cm.sup.2. The excitation source is also capable of generating, simultaneous with the flashlets, a controlled continuous, background illumination.

Kolber, Zbigniew S. (Shoreham, NY); Falkowski, Paul G. (Stony Brook, NY)

2000-09-19T23:59:59.000Z

250

Inverse scattering series for multiple attenuation: An example with surface and internal multiples  

SciTech Connect (OSTI)

A multiple attenuation method derived from an inverse scattering series is described. The inversion series approach allows a separation of multiple attenuation subseries from the full series. The surface multiple attenuation subseries was described and illustrated in Carvalho et al. (1991, 1992). The internal multiple attenuation method consists of selecting the parts of the odd terms that are associated with removing only multiply reflected energy. The method, for both types of multiples, is multidimensional and does not rely on periodicity or differential moveout, nor does it require a model of the reflectors generating the multiples. An example with internal and surface multiples will be presented.

Araujo, F.V. [PPPG/Federal Univ. of Bahia, Salvador (Brazil); Weglein, A.B. [Schlumberger Cambridge Research (United Kingdom); Carvalho, P.M. [Petrobras SA, Rio de Janeiro (Brazil); Stolt, R.H.

1994-12-31T23:59:59.000Z

251

Hereditary Multiple Exostoses with Pseudoaneurysm  

SciTech Connect (OSTI)

A 16-year-old male patient with hereditary multiple exostoses (HME) was found to have a pseudoaneurysm of the left popliteal artery caused by osteochondroma in the lower femur. The diagnosis was confirmed by ultrasound, magnetic resonance imaging and magnetic resonance angiography without the need to perform an angiogram. The osteochondroma was excised and the popliteal artery was repaired with a saphenous graft. Vascular complications are extremely rare in HME, pseudoaneurysm being the most common and mostly located in the popliteal artery. This complication should be considered in young HME patients with a mass at the knee region. The radiological spectrum of investigations allows the diagnosis of this complication with proper and less invasive management procedures for the patient.

Al-Hadidy, Azmy M. [Jordan University Hospital, University of Jordan, Department of Diagnostic Radiology (Jordan)], E-mail: ahadidy@ju.edu.jo; Al-Smady, Moa'ath M. [Jordan University Hospital, University of Jordan, Department of Vascular Surgery (Jordan); Haroun, Azmi A. [Jordan University Hospital, University of Jordan, Department of Diagnostic Radiology (Jordan); Hamamy, Hanan A. [National Institute for Diabetes Endocrinology and Genetics (Jordan); Ghoul, Suha M. [Jordan University Hospital, University of Jordan, Department of Diagnostic Radiology (Jordan); Shennak, Akram O. [Jordan University Hospital, University of Jordan, Department of Orthopedic Surgery (Jordan)

2007-06-15T23:59:59.000Z

252

Inverted and multiple nematic emulsions  

Science Journals Connector (OSTI)

We investigate experimentally the structures that form when small colloidal particles are suspended in a nematic solvent. These structures are anisotropic, and their formation is driven by interactions arising from the orientational elasticity of the nematic solvent. By using inverted and multiple nematic emulsions composed of water droplets dispersed in a thermotropic liquid crystal, we identify the nature of these interactions, and demonstrate that they can be controlled by the anchoring of the liquid crystal molecules at the surfaces of the droplets. When the anchoring is normal, the droplets form linear chains, suggesting a long-range dipole-dipole attraction between the particles. By contrast, the interactions are repulsive at short range, and prevent contact of the droplets, thereby stabilizing them against coalescence. When the anchoring is planar, the droplets generate distortions that have a quadrupolar character. The resultant elastic interactions lead to more compact, but still anisotropic, clusters.

P. Poulin and D. A. Weitz

1998-01-01T23:59:59.000Z

253

Multiple acousto-optic q-switch  

DOE Patents [OSTI]

An improved dynamic moire interferometer comprised of a lasing medium providing a plurality of beams of coherent light, a multiple q-switch producing multiple trains of 100,000 or more pulses per second, a combining means collimating multiple trains of pulses into substantially a single train and directing beams to specimen gratings affixed to a test material, and a controller, triggering and sequencing the emission of the pulses with the occurrence and recording of a dynamic loading event.

Deason, Vance A. (Idaho Falls, ID)

1993-01-01T23:59:59.000Z

254

Multiplicity of investment equilibria when pollution permits are not tradable  

E-Print Network [OSTI]

Paper ???? Multiplicity of investment equilibria whenauthor. Multiplicity of investment equilibria when pollutionon aggregate levels of investment in abatement capital.

Karp, Larry

2006-01-01T23:59:59.000Z

255

Systems analysis of multiple regulator perturbations allows discoveryo...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Systems analysis of multiple regulator perturbations allows discoveryof virulence factors in Salmonella. Systems analysis of multiple regulator perturbations allows discoveryof...

256

Multiple Layer Graphene Optical Modulator - Energy Innovation...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Materials Advanced Materials Find More Like This Return to Search Multiple Layer Graphene Optical Modulator Lawrence Berkeley National Laboratory Contact LBL About This...

257

Code design for multiple-input multiple-output broadcast channels  

E-Print Network [OSTI]

Recent information theoretical results indicate that dirty-paper coding (DPC) achieves the entire capacity region of the Gaussian multiple-input multiple-output (MIMO) broadcast channel (BC). This thesis presents practical code designs for Gaussian...

Uppal, Momin Ayub

2009-06-02T23:59:59.000Z

258

Rank Modulation with Multiplicity Anxiao (Andrew) Jiang  

E-Print Network [OSTI]

Rank Modulation with Multiplicity Anxiao (Andrew) Jiang Computer Science and Eng. Dept. Texas A&M University College Station, TX 77843 yuewang@cse.tamu.edu Abstract--Rank modulation is a scheme that uses-change memories, etc. An extension of rank modulation is studied in this paper, where multiple cells can have

Jiang, Anxiao "Andrew"

259

Analysis of Variance (ANOVA) Multiple Comparisons  

E-Print Network [OSTI]

Analysis of Variance (ANOVA) Multiple Comparisons The Kruskal-Wallis Test Two-Way ANOVA Stat 491 The Kruskal-Wallis Test Two-Way ANOVA Introduction We are interested in testing equality of k population means (ANOVA) Multiple Comparisons The Kruskal-Wallis Test Two-Way ANOVA ANOVA: Simulated Data (k = 4; µ1 = 5

Bardsley, John

260

Multiple Point Schemes for Corank 1 Maps  

Science Journals Connector (OSTI)

......Multiple Point Schemes for Corank 1 Maps Washington Luiz Marar David Mond...MULTIPLE POINT SCHEMES FOR CORANK 1 MAPS WASHINGTON LUIZ MARAR AND DAVID...1). Finally, denote the map Cn "1+fc -> C*~m defined...g:(Cn -1+k ,0) *C\\gis G-invariant}. Then

Washington Luiz Marar; David Mond

1989-06-01T23:59:59.000Z

Note: This page contains sample records for the topic "wireshark multiple bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Charged track multiplicity in B meson decay  

Science Journals Connector (OSTI)

We have used the CLEO II detector to study the multiplicity of charged particles in the decays of B mesons produced at the ?(4S) resonance. Using a sample of 1.5×106 B meson pairs, we find the mean inclusive charged particle multiplicity to be 10.71±0.02-0.15+0.21 for the decay of the pair. This corresponds to a mean multiplicity of 5.36±0.01-0.08+0.11 for a single B meson. Using the same data sample, we have also extracted the mean multiplicities in semileptonic and nonleptonic decays. We measure a mean of 7.82±0.05-0.19+0.21 charged particles per BB¯ decay when both mesons decay semileptonically. When neither B meson decays semileptonically, we measure a mean charged particle multiplicity of 11.62±0.04-0.18+0.24 per BB¯ pair.

G. Brandenburg et al. (CLEO Collaboration)

2000-03-07T23:59:59.000Z

262

Modeling Multiple Causes of Carcinogenesis  

SciTech Connect (OSTI)

An array of epidemiological results and databases on test animal indicate that risk of cancer and atherosclerosis can be up- or down-regulated by diet through a range of 200%. Other factors contribute incrementally and include the natural terrestrial environment and various human activities that jointly produce complex exposures to endotoxin-producing microorganisms, ionizing radiations, and chemicals. Ordinary personal habits and simple physical irritants have been demonstrated to affect the immune response and risk of disease. There tends to be poor statistical correlation of long-term risk with single agent exposures incurred throughout working careers. However, Agency recommendations for control of hazardous exposures to humans has been substance-specific instead of contextually realistic even though there is consistent evidence for common mechanisms of toxicological and carcinogenic action. That behavior seems to be best explained by molecular stresses from cellular oxygen metabolism and phagocytosis of antigenic invasion as well as breakdown of normal metabolic compounds associated with homeostatic- and injury-related renewal of cells. There is continually mounting evidence that marrow stroma, comprised largely of monocyte-macrophages and fibroblasts, is important to phagocytic and cytokinetic response, but the complex action of the immune process is difficult to infer from first-principle logic or biomarkers of toxic injury. The many diverse database studies all seem to implicate two important processes, i.e., the univalent reduction of molecular oxygen and breakdown of aginuine, an amino acid, by hydrolysis or digestion of protein which is attendant to normal antigen-antibody action. This behavior indicates that protection guidelines and risk coefficients should be context dependent to include reference considerations of the composite action of parameters that mediate oxygen metabolism. A logic of this type permits the realistic common-scale modeling of multiple causes of carcinogenesis and shifts the risk-assessment logic to considerations of ?what dose does?? in contrast to the current process of the substance-specific question of ?what dose is?? Whether reactive oxygen is the proximate or contributing cause of disease or simply a better estimate of biologically effective dose, it has enormous advantages for improved risk- and policy-based decisions. Various estimates of immune system modulation will be given based on radiobiology.

Jones, T.D.

1999-01-24T23:59:59.000Z

263

PJM Interconnection (Multiple States) | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

PJM Interconnection (Multiple States) PJM Interconnection (Multiple States) PJM Interconnection (Multiple States) < Back Eligibility Developer Savings Category Alternative Fuel Vehicles Hydrogen & Fuel Cells Buying & Making Electricity Water Home Weatherization Solar Wind Program Info State Delaware Program Type Interconnection PJM (originally Pennsylvania, Jersey, Maryland) Interconnection is a Regional Transmission Organization (RTO) that coordinates the movement of wholesale electricity in all or parts of Delaware, Illinois, Indiana, Kentucky, Maryland, Michigan, New Jersey, North Carolina, Ohio, Pennsylvania, Tennessee, Virginia, West Virginia and the District of Columbia. The PJM region has an area of 214,000 square miles, a population of about 60 million and a peak demand of 163,848 megawatts

264

A Study of Multiplicities in Hadronic Interactions  

SciTech Connect (OSTI)

Using data from the SELEX (Fermilab E781) experiment obtained with a minimum-bias trigger, we study multiplicity and angular distributions of secondary particles produced in interactions in the experimental targets. We observe interactions of {Sigma}{sup -}, proton, {pi}{sup -}, and {pi}{sup +}, at beam momenta between 250 GeV/c and 650 GeV/c, in copper, polyethylene, graphite, and beryllium targets. We show that the multiplicity and angular distributions for meson and baryon beams at the same momentum are identical. We also show that the mean multiplicity increases with beam momentum, and presents only small variations with the target material.

Estrada Tristan, Nora Patricia; /San Luis Potosi U.

2006-02-01T23:59:59.000Z

265

The MARVEL assembly for neutron multiplication  

SciTech Connect (OSTI)

A new multiplying test assembly is under development at Idaho National Laboratory to support research, validation, evaluation, and learning. The item is comprised of three stacked, highly-enriched uranium (HEU) cylinders, each 11.4 cm in diameter and having a combined height of up to 11.7 cm. The combined mass of all three cylinders is 20.3 kg of HEU. Calculations for the bare configuration of the assembly indicate a multiplication level of >3.5 (keff=0.72). Reflected configurations of the assembly, using either polyethylene or tungsten, are possible and have the capability of raising the assembly's multiplication level to greater than 10. This paper describes simulations performed to assess the assembly's multiplication level under different conditions and describes the resources available at INL to support the use of these materials. We also describe some preliminary calculations and test activities using the assembly to study neutron multiplication.

David L. Chichester; Mathew T. Kinlaw

2013-10-01T23:59:59.000Z

266

Multiple Vehicle Routing Problem with Fuel Constraints  

E-Print Network [OSTI]

In this paper, a Multiple Vehicle Routing Problem with Fuel Constraints (MVRPFC) is considered. This problem consists of a field of targets to be visited, and a collection of vehicles with fuel tanks that may visit the targets. Consideration...

Levy, David

2013-06-26T23:59:59.000Z

267

Anisotropic Grid Adaptation for Multiple Aerodynamic Outputs  

E-Print Network [OSTI]

Anisotropic grid–adaptive strategies are presented for viscous flow simulations in which the accurate prediction of multiple aerodynamic outputs (such as the lift, drag, and moment coefficients) is required from a single ...

Venditti, David A.

268

Nonparametric estimation of multiple structures with outliers  

E-Print Network [OSTI]

Nonparametric estimation of multiple structures with outliers Wei Zhang and Jana Kosecka George outliers (pseudo outliers) to it in addition to the true outliers (gross outliers). The problem of robust

Kosecka, Jana

269

Algorithms for Multiple Vehicle Routing Problems  

E-Print Network [OSTI]

Surveillance and monitoring applications require a collection of heterogeneous vehicles to visit a set of targets. This dissertation considers three fundamental routing problems involving multiple vehicles that arise in these applications. The main...

Bae, Jung Yun

2014-06-02T23:59:59.000Z

270

Friction and the Multiplicity of Equilibria  

E-Print Network [OSTI]

but large, the measure of the ROM is therefore non-monotonicTherefore the measure of the ROM is positive. However, as ?region of multiplicity” (ROM) is the intersection of two or

Karp, Larry

2005-01-01T23:59:59.000Z

271

Multiple-Coincidence Interrogation of Fissionables  

SciTech Connect (OSTI)

The multiple coincidence technique uses 14.1 MeV neutrons to produce (n, multiple-?) coincidences to detect fissile and fissionable materials. Measurements of n-?-? coincidences with targets of depleted uranium (DU), W, and Pb, show that the counting rate for the DU is substantially above that for the non-fissionables. Also, the data involving prompt neutrons and delayed gammas in the DU time spectra provide a signature for fissionables that is distinct from that of non-fissionables.

J.P. Hurley, R.P. Keegan, J.R. Tinsley, R. Trainham

2009-05-01T23:59:59.000Z

272

An analysis of multiple component mooring lines  

E-Print Network [OSTI]

AN ANALYSIS OF MULTIPLE COMPONENT MOORING LINES A Thesis by THOMAS ROBERT NALTERS Submitted to the Graduate College of Texas ASM University in partial fulfillment of the requirement for the degree of MASTER OF SCIENCE December 1977 Major...'595 ABSTRACT An Analysis Of Multiple Component Mooring Lines (December 1977) Thomas Robert Walters, B. E. , Vanderbilt University Co-Chai rman of Advisory Committee: Dr. Ts ung- Chow Su Co- Chai rman of Advisory Committee: Dr. Richard Domi nguez...

Walters, Thomas Robert

2012-06-07T23:59:59.000Z

273

T-597: WordPress Multiple Security Vulnerabilities | Department...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

7: WordPress Multiple Security Vulnerabilities T-597: WordPress Multiple Security Vulnerabilities April 7, 2011 - 5:42am Addthis PROBLEM: WordPress is prone to multiple security...

274

V-041: Red Hat CloudForms Multiple Vulnerabilities | Department...  

Energy Savers [EERE]

V-041: Red Hat CloudForms Multiple Vulnerabilities V-041: Red Hat CloudForms Multiple Vulnerabilities December 6, 2012 - 4:01am Addthis PROBLEM: Red Hat CloudForms Multiple...

275

T-694: IBM Tivoli Federated Identity Manager Products Multiple...  

Broader source: Energy.gov (indexed) [DOE]

T-694: IBM Tivoli Federated Identity Manager Products Multiple Vulnerabilities T-694: IBM Tivoli Federated Identity Manager Products Multiple Vulnerabilities August 16, 2011 -...

276

In Situ Live Cell Sensing of Multiple Nucleotides Exploiting...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

In Situ Live Cell Sensing of Multiple Nucleotides Exploiting DNARNA Aptamers and Graphene Oxide Nanosheets. In Situ Live Cell Sensing of Multiple Nucleotides Exploiting DNARNA...

277

V-205: IBM Tivoli System Automation for Multiplatforms Java Multiple...  

Broader source: Energy.gov (indexed) [DOE]

5: IBM Tivoli System Automation for Multiplatforms Java Multiple Vulnerabilities V-205: IBM Tivoli System Automation for Multiplatforms Java Multiple Vulnerabilities July 29, 2013...

278

V-132: IBM Tivoli System Automation Application Manager Multiple...  

Energy Savers [EERE]

32: IBM Tivoli System Automation Application Manager Multiple Vulnerabilities V-132: IBM Tivoli System Automation Application Manager Multiple Vulnerabilities April 12, 2013 -...

279

Hydrogen Bonded Arrays: The Power of Multiple Hydrogen Bonds...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Bonded Arrays: The Power of Multiple Hydrogen Bonds. Hydrogen Bonded Arrays: The Power of Multiple Hydrogen Bonds. Abstract: Hydrogen bond interactions in small covalent model...

280

Covalency in Metal-Oxygen Multiple Bonds Evaluated Using Oxygen...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Covalency in Metal-Oxygen Multiple Bonds Evaluated Using Oxygen K-edge Spectroscopy and Electronic Structure Theory . Covalency in Metal-Oxygen Multiple Bonds Evaluated Using...

Note: This page contains sample records for the topic "wireshark multiple bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Generalized Mercury/Waterfilling for Multiple-Input Multiple-Output Channels  

E-Print Network [OSTI]

Generalized Mercury/Waterfilling for Multiple-Input Multiple-Output Channels Fernando P procedure that generalizes the mercury/waterfilling algorithm, previously proposed for parallel non-interfering chan- nels. In this generalization the mercury level accounts for the sub- optimal (non-Gaussian) input

Verdú, Sergio

282

Charged-particle multiplicity at LHC energies  

ScienceCinema (OSTI)

The talk presents the measurement of the pseudorapidity density and the multiplicity distribution with ALICE at the achieved LHC energies of 0.9 and 2.36 TeV.An overview about multiplicity measurements prior to LHC is given and the related theoretical concepts are briefly discussed.The analysis procedure is presented and the systematic uncertainties are detailed. The applied acceptance corrections and the treatment of diffraction are discussed.The results are compared with model predictions. The validity of KNO scaling in restricted phase space regions is revisited. 

None

2011-10-06T23:59:59.000Z

283

Erratum: Formation Control of Multiple Mobile Robots Systems  

Science Journals Connector (OSTI)

The paper entitled “Formation Control of Multiple Mobile Robots Systems” by Zhanfeng Li, Youliang Ma...

Zhanfeng Li; Youliang Ma; Tong Ren

2008-01-01T23:59:59.000Z

284

Multiple Triclosan Targets in Trypanosoma brucei  

Science Journals Connector (OSTI)

...Microbiology ARTICLE ARTICLES Multiple Triclosan Targets in Trypanosoma brucei Kimberly...It was therefore not surprising that triclosan, an inhibitor of type II enoyl-acyl...EC50s) of 10 and 13 muM, respectively. Triclosan also inhibited cell-free fatty acid...

Kimberly S. Paul; Cyrus J. Bacchi; Paul T. Englund

2004-08-01T23:59:59.000Z

285

Wind direction modelling using multiple observation points  

Science Journals Connector (OSTI)

...gains in the produced output power. chaos engineering|wind forecasting|multiple measurements...realized that the modelling of power output in wind turbines needs to be performed...region; in region 3, for high winds, the power output is subject to a threshold...

2008-01-01T23:59:59.000Z

286

Quasi Multiplication and K-groups  

E-Print Network [OSTI]

We give a negative answer to the question raised by Mart Abel about whether his proposed definition of K0 and K1 groups in terms of quasi multiplication is indeed equivalent to the established ones in algebraic K-theory....

Lee, Tsiu-Kwen; Sheu, Albert Jeu-Liang

2013-02-28T23:59:59.000Z

287

A Survey of Multiplicity Fluctuations in PHENIX  

E-Print Network [OSTI]

The PHENIX Experiment at the Relativistic Heavy Ion Collider has made measurements of event-by-event fluctuations in the charged particle multiplicity as a function of collision energy, centrality, collision species, and transverse momentum in heavy ion collisions. The results of these measurements will be reviewed and discussed.

Jeffery T. Mitchell

2005-10-27T23:59:59.000Z

288

Computer Simulations Reveal Multiple Functions for Aromatic  

E-Print Network [OSTI]

Computer Simulations Reveal Multiple Functions for Aromatic Residues in Cellulase Enzymes NREL researchers use high-performance computing to demonstrate fundamental roles of aromatic residues in cellulase enzyme tunnels. National Renewable Energy Laboratory (NREL) computer simulations of a key indus- trial

289

Gene prediction by multiple spliced alignment  

Science Journals Connector (OSTI)

With recent advances in sequencing technologies, a huge amount of DNA sequences become available year after year. In order to obtain useful information on these sequences, we need to process them in search of biologically meaningful regions. The genes ... Keywords: comparative genomics, gene prediction, multiple spliced alignment

Rodrigo Mitsuo Kishi; Ronaldo Fiorilo dos Santos; Said Sadique Adi

2011-08-01T23:59:59.000Z

290

Medical image classification with multiple kernel learning  

Science Journals Connector (OSTI)

Nowadays, medical images are generated by hospitals and medical centers rapidly. The large volume of medical image data produces a strong need to effective medical image retrieval. The visual characteristic of medical image, such as modality, anatomical ... Keywords: feature fusion, image classification, medical imaging, multiple kernel learning

Hong Wu; Hao Zhang; Chao Li

2010-12-01T23:59:59.000Z

291

Parallel MATLAB: Single Program Multiple Data  

E-Print Network [OSTI]

Parallel MATLAB: Single Program Multiple Data John Burkardt (FSU) Gene Cliff (AOE/ICAM - ecliff Research Computing ICAM: Interdisciplinary Center for Applied Mathematics 1 / 67 #12;MATLAB Parallel MATLAB sets up one special agent called the client. MATLAB sets up the requested number of workers, each

Crawford, T. Daniel

292

Parallel MATLAB: Single Program Multiple Data  

E-Print Network [OSTI]

Parallel MATLAB: Single Program Multiple Data John Burkardt (FSU) Gene Cliff (AOE/ICAM - ecliff Research Computing ICAM: Interdisciplinary Center for Applied Mathematics 1 / 67 #12;Matlab Parallel ( 'myscript', 'Profile', ... 'ithaca_R2012a', 'matlabpool', 7 ) 5 / 67 #12;SPMD: The SPMD Environment Matlab

Crawford, T. Daniel

293

Parallel MATLAB: Single Program Multiple Data  

E-Print Network [OSTI]

Parallel MATLAB: Single Program Multiple Data John Burkardt (FSU) Gene Cliff (AOE/ICAM - ecliff: Advanced Research Computing ICAM: Interdisciplinary Center for Applied Mathematics 1 / 69 #12;Matlab ( 'myscript', 'Profile', ... 'ithaca_R2012a', 'matlabpool', 7 ) 5 / 69 #12;SPMD: The SPMD Environment Matlab

Crawford, T. Daniel

294

Parallel MATLAB: Single Program Multiple Data  

E-Print Network [OSTI]

Parallel MATLAB: Single Program Multiple Data John Burkardt (FSU) Gene Cliff (AOE/ICAM - ecliff Research Computing ICAM: Interdisciplinary Center for Applied Mathematics 1 / 66 #12;MATLAB Parallel MATLAB sets up one special worker called the client. MATLAB sets up the requested number of workers, each

Crawford, T. Daniel

295

The multiple vortex nature of tropical cyclogenesis  

E-Print Network [OSTI]

) __________________________ __________________________ John Nielsen-Gammon Craig Epifanio (Chair of Committee) (Member) __________________________ __________________________ Fuqing Zhang Hongxing Liu (Member) (Member) December 2004 Major Subject: Atmospheric Sciences... iii ABSTRACT The Multiple Vortex Nature of Tropical Cyclogenesis. (December 2004) Jason Allen Sippel, B.S., Texas A&M University Chair of Advisory Committee: Dr. John Nielsen-Gammon This thesis contains an observational analysis...

Sippel, Jason Allen

2005-02-17T23:59:59.000Z

296

Experimental Verification of Carrier Multiplication in Graphene  

Science Journals Connector (OSTI)

By this method, we obtain occupation probabilities at eight distinct energies, enabling a safe reconstruction of the time-dependent carrier distribution in the relevant range in momentum space, assuming quasi-instantaneous thermalization of the excited carriers. ... Schaller, R. D.; Klimov, V. I.High Efficiency Carrier Multiplication in PbSe Nanocrystals: Implications for Solar Energy Conversion Phys. ...

T. Plötzing; T. Winzer; E. Malic; D. Neumaier; A. Knorr; H. Kurz

2014-08-21T23:59:59.000Z

297

Jet multiplicities as the QGP thermometer  

E-Print Network [OSTI]

It is proposed to use the energy behavior of mean multiplicities of jets propagating in a nuclear medium as the thermometer of this medium during the collision phases. The qualitative effects are demonstrated in the framework of the fixed coupling QCD with account of jet quenching.

I. M. Dremin; O. S. Shadrin

2006-02-10T23:59:59.000Z

298

Monitoring voltage collapse margin with synchrophasors across transmission corridors with multiple lines and multiple contingencies  

E-Print Network [OSTI]

We use synchrophasor measurements of the complex voltage and current at both ends of multiple transmission lines that connect areas of a power system to monitor the online voltage collapse margin. A new reduction is used to reduce the multiple transmission lines to a single line equivalent and determine how to combine the synchrophasor measurements. Generator reactive power limits can be accommodated. The results show that this methodology can capture the effect of multiple contingencies inside the transmission corridors, giving awareness to the operators about the severity of contingencies with respect to voltage stability.

Ramirez, Lina

2014-01-01T23:59:59.000Z

299

Bed Bugs: Clinical Relevance and Control Options  

Science Journals Connector (OSTI)

...in the accommodation sector, the key to reducing...consisted of a hemispherical construction that insects could climb...233, 234). The heating of whole rooms comes...insecticides to open spaces via aerosols), space sprays, and incendiary...

Stephen L. Doggett; Dominic E. Dwyer; Pablo F. Peñas; Richard C. Russell

2012-01-01T23:59:59.000Z

300

Bed Bugs: Clinical Relevance and Control Options  

Science Journals Connector (OSTI)

...the treatment of field infestations...95) and cedar oil. The modes of...Best Yet cedar oil can kill all bed...the control of field infestations...complexes, as the gas cannot be tightly...Insecticides The cost to develop and...insects during spray operations. In laboratory...

Stephen L. Doggett; Dominic E. Dwyer; Pablo F. Peñas; Richard C. Russell

2012-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "wireshark multiple bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

DOODLE-BUGS AND LAW-MAKERS  

Science Journals Connector (OSTI)

...through adolescence. A research group has been assembled. The fund...This committee is conducting a group of studies, of bio-logical...turned south and east via the Klamath lakes to north-western Nevada...some day a wandering ant will fall into the pit and thus keep alive...

J. F. McClendon

1932-07-22T23:59:59.000Z

302

'Bugs' used to treat FGD wastewater  

SciTech Connect (OSTI)

Tough regulation of heavy metals may justify a bioreactor approach in addition to chemical treatment of FGD wastewater. Two of Duke Energy' coal-fired plants, Belews Creek and Allen (in North Carolina) have installed new biological reactor systems to increase selenium removal to levels not achievable by existing scrubber waste water systems. The ABMet system removes nitrate and selenium in a single step. Progress Energy has installed the system at Roxboro and Mayo Stations, also in North Carolina. 1 fig., 2 photos.

Blankinship, S.

2009-09-15T23:59:59.000Z

303

noBugs - project tracking system.  

E-Print Network [OSTI]

??Testing has become a major part of any project in IT industry. Testing is done at every phase of SDLC because the cost and risk… (more)

Kankanawadi, Jyoti Manjunath

2011-01-01T23:59:59.000Z

304

Bed Bugs: Clinical Relevance and Control Options  

Science Journals Connector (OSTI)

...of Prurigo of Hebra in Egypt. J. Egypt. Soc. Parasitol. 15...saw a bedbug. New York Daily News. http://articles...Bedbugs not back by popular demand. Dimens. Crit. Care...at Seaport. New York Daily News. http://articles...

Stephen L. Doggett; Dominic E. Dwyer; Pablo F. Peñas; Richard C. Russell

2012-01-01T23:59:59.000Z

305

A material's multiple personalities | Argonne National Laboratory  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

News News Press Releases Feature Stories In the News Experts Guide Media Contacts Social Media Photos Videos Fact Sheets, Brochures and Reports Summer Science Writing Internship The brightness and energy of X-ray beams are critical properties for research. The APS Upgrade will make our X-ray beams brighter, meaning more X-rays can be focused onto a smaller, laser-like spot, allowing researchers to gather more data in greater detail in less time. A material's multiple personalities By Jared Sagoff * September 11, 2013 Tweet EmailPrint ARGONNE, Ill. - Just like people, materials can sometimes exhibit "multiple personalities." This kind of unusual behavior in a certain class of materials has compelled researchers at the U.S. Department of Energy's Argonne National Laboratory to take a closer look at the precise

306

Multiple Scattering Measurements in the MICE Experiment  

SciTech Connect (OSTI)

The international Muon Ionization Cooling Experiment (MICE), under construction at RAL, will test a prototype cooling channel for a future Neutrino Factory or Muon Collider. The cooling channel aims to achieve, using liquid hydrogen absorbers, a 10% reduction in transverse emittance. The change in 4D emittance will be determined with an accuracy of 1% by measuring muons individually. Step IV of MICE will make the first precise emittance-reduction measurements of the experiment. Simulation studies using G4MICE, based on GEANT4, find a significant difference in multiple scattering in low Z materials, compared with the standard expression quoted by the Particle Data Group. Direct measurement of multiple scattering using the scintillating-fibre trackers is found to be possible, but requires the measurement resolution to be unfolded from the data.

Carlisle, T.; Cobb, J.; /Oxford U.; Neuffer, D.; /Fermilab

2012-05-01T23:59:59.000Z

307

Weak multiplicativity for random quantum channels  

E-Print Network [OSTI]

It is known that random quantum channels exhibit significant violations of multiplicativity of maximum output p-norms for any p>1. In this work, we show that a weaker variant of multiplicativity nevertheless holds for these channels. For any constant p>1, given a random quantum channel N (i.e. a channel whose Stinespring representation corresponds to a random subspace S), we show that with high probability the maximum output p-norm of n copies of N decays exponentially with n. The proof is based on relaxing the maximum output infinity-norm of N to the operator norm of the partial transpose of the projector onto S, then calculating upper bounds on this quantity using ideas from random matrix theory.

Montanaro, Ashley

2011-01-01T23:59:59.000Z

308

Method for High Accuracy Multiplicity Correlation Measurements  

E-Print Network [OSTI]

Multiplicity correlation measurements provide insight into the dynamics of high energy collisions. Models describing these collisions need these correlation measurements to tune the strengths of the underlying QCD processes which influence all observables. Detectors, however, often possess limited coverage or reduced efficiency that influence correlation measurements in obscure ways. In this paper, the effects of non-uniform detection acceptance and efficiency on the measurement of multiplicity correlations between two distinct detector regions (termed forward-backward correlations) are derived. This result is transformed into a correction method. Verification of the presented correction method is provided through simulations using different event generators. The result of the method allows one to correct measurements in a simulation independent manner with high accuracy and thereby shed light on the underlying processes.

Gulbrandsen, K

2014-01-01T23:59:59.000Z

309

Experience with pipelined multiple instruction streams  

SciTech Connect (OSTI)

Pipelining has been used to implement efficient, high-speed vector computers. It is also an effective method for implementing multiprocessors. The Heterogeneous Element Processor (HEP) built by Denelcor Incorporated is the first commercially available computer system to use pipelining to implement multiple processes. This paper introduces the architecture and programming environment of the HEP and surveys a range of scientific applications programs for which parallel versions have been produced, tested, and analyzed on this computer. In all cases, the ideal of one instruction completion every pipeline step time is closely approached. Speed limitations in the parallel programs are more often a result of the extra code necessary to ensure synchronization than of actual synchronization lockout at execution time. The pipelined multiple instruction stream architecture is shown to cover a wide range of applications with good utilization of the parallel hardware.

Jordon, H.F.

1984-01-01T23:59:59.000Z

310

Multiple Rankine topping cycles offer high efficiency  

SciTech Connect (OSTI)

The efficiency of a Rankine cycle is primarily determined by the temperatures of heat addition and heat rejection. However, no working fluid has been identified that will operate in a Rankine cycle over an extremely wide temperature range. Multiple Rankine topping cycles offer a technique for achieving high thermal efficiencies in power plants by allowing the use of several working fluids to span larger temperature ranges.

McWhirter, J.D. [Idaho State Univ., Pocatello, ID (United States)

1997-10-01T23:59:59.000Z

311

Neutron multiplicities for the transplutonium nuclides  

SciTech Connect (OSTI)

This paper continues, with respect to the transplutonium nuclides, earlier efforts to collate and evaluate data from the scientific literature on the prompt neutron multiplicity distribution from fission and its first moment = ..sigma..nuPnu. The isotopes considered here for which P/sub nu/ and or data (or both) were found in the literature are of americium (Am), curium (Cm), berkelium (Bk), californium (Cf), einsteinium (Es), fermium (Fm), and nobelium (No).

Holden, N.E.; Zucker, M.S.

1985-01-01T23:59:59.000Z

312

[0268] First Galley Proofs MULTIPLICITIES, BOUNDARY POINTS,  

E-Print Network [OSTI]

, multiplicity, extreme point, sharp point, boundary point. c Ð , Zagreb Paper OaM-0268 1 #12;2 W.S. CHEUNG NUMERICAL RANGES WAI-SHUN CHEUNG, XUHUA LIU AND TIN-YAU TAM (Communicated by C.-K. Li) Abstract, XUHUA LIU AND T.Y. TAM Given W(A), Embry [8] introduced M = M (A) := {x Cn : x Ax = x x}. In general

Tam, Tin-Yau

313

Alternatives for Helium-3 in Multiplicity Counters  

SciTech Connect (OSTI)

Alternatives to helium-3 are being actively pursued due to the shortage and rising costs of helium-3. For safeguards applications, there are a number of ongoing investigations to find alternatives that provide the same capability in a cost-effective manner. One of the greatest challenges is to find a comparable alternative for multiplicity counters, since they require high efficiency and short collection or die-away times. Work has been progressing on investigating three commercially available alternatives for high efficiency multiplicity counters: boron trifluoride (BF3) filled proportional tubes, boron-lined proportional tubes, and lithium fluoride with zinc sulfide coated light guides. The baseline multiplicity counter used for the investigation is the Epithermal Neutron Multiplicity Counter with 121 helium-3 filled tubes at 10 atmosphere pressure, which is a significant capability to match. The primary tool for the investigation has been modeling and simulation using the Monte Carlo N-Particle eXtended (MCNPX) radiation transport program, with experiments to validate the models. To directly calculate the coincidence rates in boron-lined (and possibly other) detectors, the MCNPX code has been enhanced to allow the existing coincidence tally to be used with energy deposition rather than neutron capture reactions. This allows boron-lined detectors to be modeled more accurately. Variations of tube number and diameter along with variations in the amount of inter-tube moderator have been conducted for the BF3 and boron-lined cases. Tube pressure was investigated for BF3, up to two atmospheres, as well as optimal boron thickness in the boron-lined tubes. The lithium fluoride was modeled as sheets of material with light guides in between, and the number and thickness of the sheets investigated. The amount of light guide, which in this case doubles as a moderator, was also optimized. The results of these modeling and simulation optimization investigations are described and results presented.

Ely, James H.; Siciliano, Edward R.; Lintereur, Azaree T.; Swinhoe, Martyn T.

2013-04-01T23:59:59.000Z

314

Exponential smoothing with a damped multiplicative trend  

Science Journals Connector (OSTI)

Multiplicative trend exponential smoothing has received very little attention in the literature. It involves modelling the local slope by smoothing successive ratios of the local level, and this leads to a forecast function that is the product of level and growth rate. By contrast, the popular Holt method uses an additive trend formulation. It has been argued that more real series have multiplicative trends than additive. However, even if this is true, it seems likely that the more conservative forecast function of the Holt method will be more robust when applied in an automated way to a large batch of series with different types of trend. In view of the improvements in accuracy seen in dampening the Holt method, in this paper we investigate a new damped multiplicative trend approach. An empirical study, using the monthly time series from the M3-Competition, gave encouraging results for the new approach at a range of forecast horizons, when compared to the established exponential smoothing methods.

James W. Taylor

2003-01-01T23:59:59.000Z

315

MPACT Fast Neutron Multiplicity System Prototype Development  

SciTech Connect (OSTI)

This document serves as both an FY2103 End-of-Year and End-of-Project report on efforts that resulted in the design of a prototype fast neutron multiplicity counter leveraged upon the findings of previous project efforts. The prototype design includes 32 liquid scintillator detectors with cubic volumes 7.62 cm in dimension configured into 4 stacked rings of 8 detectors. Detector signal collection for the system is handled with a pair of Struck Innovative Systeme 16-channel digitizers controlled by in-house developed software with built-in multiplicity analysis algorithms. Initial testing and familiarization of the currently obtained prototype components is underway, however full prototype construction is required for further optimization. Monte Carlo models of the prototype system were performed to estimate die-away and efficiency values. Analysis of these models resulted in the development of a software package capable of determining the effects of nearest-neighbor rejection methods for elimination of detector cross talk. A parameter study was performed using previously developed analytical methods for the estimation of assay mass variance for use as a figure-of-merit for system performance. A software package was developed to automate these calculations and ensure accuracy. The results of the parameter study show that the prototype fast neutron multiplicity counter design is very nearly optimized under the restraints of the parameter space.

D.L. Chichester; S.A. Pozzi; J.L. Dolan; M.T. Kinlaw; S.J. Thompson; A.C. Kaplan; M. Flaska; A. Enqvist; J.T. Johnson; S.M. Watson

2013-09-01T23:59:59.000Z

316

Tracking Multiple Topics for Finding Interesting Articles  

SciTech Connect (OSTI)

We introduce multiple topic tracking (MTT) for iScore to better recommend news articles for users with multiple interests and to address changes in user interests over time. As an extension of the basic Rocchio algorithm, traditional topic detection and tracking, and single-pass clustering, MTT maintains multiple interest profiles to identify interesting articles for a specific user given user-feedback. Focusing on only interesting topics enables iScore to discard useless profiles to address changes in user interests and to achieve a balance between resource consumption and classification accuracy. iScore is able to achieve higher quality results than traditional methods such as the Rocchio algorithm. We identify several operating parameters that work well for MTT. Using the same parameters, we show that MTT alone yields high quality results for recommending interesting articles from several corpora. The inclusion of MTT improves iScore's performance by 25% in recommending news articles from the Yahoo! News RSS feeds and the TREC11 adaptive filter article collection. And through a small user study, we show that iScore can still perform well when only provided with little user feedback.

Pon, R K; Cardenas, A F; Buttler, D J; Critchlow, T J

2008-01-03T23:59:59.000Z

317

Tracking Multiple Topics for Finding Interesting Articles  

SciTech Connect (OSTI)

We introduce multiple topic tracking (MTT) for iScore to better recommend news articles for users with multiple interests and to address changes in user interests over time. As an extension of the basic Rocchio algorithm, traditional topic detection and tracking, and single-pass clustering, MTT maintains multiple interest profiles to identify interesting articles for a specific user given user-feedback. Focusing on only interesting topics enables iScore to discard useless profiles to address changes in user interests and to achieve a balance between resource consumption and classification accuracy. Also by relating a topic's interestingness to an article's interestingness, iScore is able to achieve higher quality results than traditional methods such as the Rocchio algorithm. We identify several operating parameters that work well for MTT. Using the same parameters, we show that MTT alone yields high quality results for recommending interesting articles from several corpora. The inclusion of MTT improves iScore's performance by 9% to 14% in recommending news articles from the Yahoo! News RSS feeds and the TREC11 adaptive filter article collection. And through a small user study, we show that iScore can still perform well when only provided with little user feedback.

Pon, R K; Cardenas, A F; Buttler, D J; Critchlow, T J

2007-02-15T23:59:59.000Z

318

Design of globally optimal multiple description scalar quantizers  

E-Print Network [OSTI]

This thesis investigates the design of globally optimal multiple description scalar quantizers. The design of multiple description scalar quantizers is formulated as a combinatorial optimization problem due to the index assignment issue. The first...

Desilva, Buveneka Kanishka

2012-06-07T23:59:59.000Z

319

Multiple Steady States in Ideal Two-Product Distillation  

E-Print Network [OSTI]

Multiple Steady States in Ideal Two-Product Distillation Elling W. Jacobsen and Sigurd Skogestad Chemical Engineering Dept., University of Trondheim-NTH, N-7034 Trondheim, Norway Simple distillation and compositions in the column. Introduction Multiple steady states (multiplicity) in distillation columns have

Skogestad, Sigurd

320

New multiplicativity results for qubit maps  

E-Print Network [OSTI]

Let $\\Phi$ be a trace-preserving, positivity-preserving (but not necessarily completely positive) linear map on the algebra of complex $2 \\times 2$ matrices, and let $\\Omega$ be any finite-dimensional completely positive map. For $p=2$ and $p \\geq 4$, we prove that the maximal $p$-norm of the product map $\\Phi \\ot \\Omega$ is the product of the maximal $p$-norms of $\\Phi$ and $\\Omega$. Restricting $\\Phi$ to the class of completely positive maps, this settles the multiplicativity question for all qubit channels in the range of values $p \\geq 4$.

Christopher King; Nilufer Koldan

2006-03-09T23:59:59.000Z

Note: This page contains sample records for the topic "wireshark multiple bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Multiple volume compressor for hot gas engine  

DOE Patents [OSTI]

A multiple volume compressor for use in a hot gas (Stirling) engine having a plurality of different volume chambers arranged to pump down the engine when decreased power is called for and return the working gas to a storage tank or reservoir. A valve actuated bypass loop is placed over each chamber which can be opened to return gas discharged from the chamber back to the inlet thereto. By selectively actuating the bypass valves, a number of different compressor capacities can be attained without changing compressor speed whereby the capacity of the compressor can be matched to the power available from the engine which is used to drive the compressor.

Stotts, Robert E. (Clifton Park, NY)

1986-01-01T23:59:59.000Z

322

Multiple frequency method for operating electrochemical sensors  

DOE Patents [OSTI]

A multiple frequency method for the operation of a sensor to measure a parameter of interest using calibration information including the steps of exciting the sensor at a first frequency providing a first sensor response, exciting the sensor at a second frequency providing a second sensor response, using the second sensor response at the second frequency and the calibration information to produce a calculated concentration of the interfering parameters, using the first sensor response at the first frequency, the calculated concentration of the interfering parameters, and the calibration information to measure the parameter of interest.

Martin, Louis P. (San Ramon, CA)

2012-05-15T23:59:59.000Z

323

Experience with pipelined multiple instruction streams  

SciTech Connect (OSTI)

The authors introduces the architecture and programming environment of the heterogeneous element processor (HEP) and surveys a range of scientific applications programs for which parallel versions have been produced, tested, and analyzed on this computer. In all cases, the ideal of one instruction completion every pipeline step time is closely approached. Speed limitations in the parallel programs are more often a result of the extra code necessary to ensure synchronization than of actual synchronization lockout at execution time. The pipelined multiple instruction stream architecture is shown to cover a wide range of applications with good utilization of the parallel hardware. 35 references.

Jordan, H.F.

1984-01-01T23:59:59.000Z

324

Multiplicative cascades and seismicity in natural time  

Science Journals Connector (OSTI)

Natural time ? enables the distinction of two origins of self-similarity, i.e., the process memory and the process increments infinite variance. Employing multiplicative cascades in natural time, the most probable value of the variance ?1(???2?????2) is explicitly related with the parameter b of the Gutenberg-Richter law of randomly shuffled earthquake data. Moreover, the existence of temporal and magnitude correlations is studied in the original earthquake data. Magnitude correlations are larger for closer in time earthquakes, when the maximum interoccurrence time varies from half a day to 1 min.

N. V. Sarlis; E. S. Skordas; P. A. Varotsos

2009-08-11T23:59:59.000Z

325

Multiple gamma lines from semi-annihilation  

SciTech Connect (OSTI)

Hints in the Fermi data for a 130 GeV gamma line from the galactic center have ignited interest in potential gamma line signatures of dark matter. Explanations of this line based on dark matter annihilation face a parametric tension since they often rely on large enhancements of loop-suppressed cross sections. In this paper, we pursue an alternative possibility that dark matter gamma lines could arise from ''semi-annihilation'' among multiple dark sector states. The semi-annihilation reaction ?{sub i}?{sub j} ? ?{sub k}? with a single final state photon is typically enhanced relative to ordinary annihilation ?{sub i}?-bar {sub i} ? ?? into photon pairs. Semi-annihilation allows for a wide range of dark matter masses compared to the fixed mass value required by annihilation, opening the possibility to explain potential dark matter signatures at higher energies. The most striking prediction of semi-annihilation is the presence of multiple gamma lines, with as many as order N{sup 3} lines possible for N dark sector states, allowing for dark sector spectroscopy. A smoking gun signature arises in the simplest case of degenerate dark matter, where a strong semi-annihilation line at 130 GeV would be accompanied by a weaker annihilation line at 173 GeV. As a proof of principle, we construct two explicit models of dark matter semi-annihilation, one based on non-Abelian vector dark matter and the other based on retrofitting Rayleigh dark matter.

D'Eramo, Francesco [Department of Physics, University of California, Berkeley, CA 94720 (United States); McCullough, Matthew; Thaler, Jesse, E-mail: fraderamo@berkeley.edu, E-mail: mccull@mit.edu, E-mail: jthaler@mit.edu [Center for Theoretical Physics, Massachusetts Institute of Technology, Cambridge, MA 02139 (United States)

2013-04-01T23:59:59.000Z

326

T-576: Oracle Solaris Adobe Flash Player Multiple Vulnerabilities |  

Broader source: Energy.gov (indexed) [DOE]

6: Oracle Solaris Adobe Flash Player Multiple Vulnerabilities 6: Oracle Solaris Adobe Flash Player Multiple Vulnerabilities T-576: Oracle Solaris Adobe Flash Player Multiple Vulnerabilities March 14, 2011 - 3:05pm Addthis PROBLEM: Oracle has acknowledged multiple vulnerabilities in Adobe Flash Player included in Solaris, which can be exploited by malicious people to compromise a user's system. PLATFORM: Sun Solaris 10 ABSTRACT: Oracle Solaris Adobe Flash Player Multiple Vulnerabilities. reference LINKS: Secunia Advisory: SA43747 Oracle Sun Advisory: CVE Multiple Vulnerabilities in Adobe Flash Player Secure List: SA43747 Oracle Sun Support Adobe Flash Player for Linux and Solaris IMPACT ASSESSMENT: High Discussion: Oracle has acknowledged multiple vulnerabilities in Solaris, which can be exploited by malicious people to disclose sensitive information, bypass

327

Prompt neutron multiplicities for the transplutonium nuclides  

SciTech Connect (OSTI)

The direct determination of the average prompt neutron emission values is reviewed, and a method of comparing different sites of neutron emission multiplicity distribution values is described. Measured and recommended values are tabulated for these nuclides: /sup 241/Am, /sup 242/Am, /sup 242/Cm, /sup 243/Cm, /sup 244/Cm, /sup 246/Cm, /sup 247/Cm, /sup 248/Cm, /sup 250/Cm, /sup 245/Cm, /sup 249/Bk, /sup 246/Cf, /sup 249/Cf, /sup 250/Cf, /sup 252/Cf, /sup 254/Cf, /sup 251/Cf, /sup 253/Es, /sup 254/Es, /sup 244/Fm, /sup 246/Fm, /sup 255/Fm, /sup 252/No, /sup 254/Fm, /sup 256/Fm, /sup 257/Fm. 59 refs., 24 tabs. (LEW)

Holden, N.E.; Zucker, M.S.

1985-01-01T23:59:59.000Z

328

Free Energy of Multiple Overlapping Chains  

Science Journals Connector (OSTI)

How accurate is pair additivity in describing interactions between soft polymer-based nanoparticles? Using numerical simulations we compute the free energy cost required to overlap multiple chains in the same region of space, and provide a quantitative measure of the effectiveness of pair additivity as a function of chain number and length. Our data suggest that pair additivity can indeed become quite inadequate as the chain density in the overlapping region increases. We also show that even a scaling theory based on polymer confinement can only partially account for the complexity of the problem. In fact, we unveil and characterize an isotropic to star-polymer crossover taking place for large number of chains, and propose a revised scaling theory that better captures the physics of the problem.

Katherine Klymko and Angelo Cacciuto

2011-12-27T23:59:59.000Z

329

Multiple crossbar network: Integrated supercomputing framework  

SciTech Connect (OSTI)

At Los Alamos National Laboratory, site of one of the world's most powerful scientific supercomputing facilities, a prototype network for an environment that links supercomputers and workstations is being developed. Driven by a need to provide graphics data at movie rates across a network from a Cray supercomputer to a Sun scientific workstation, the network is called the Multiple Crossbar Network (MCN). It is intended to be coarsely grained, loosely coupled, general-purpose interconnection network that will vastly increase the speed at which supercomputers communicate with each other in large networks. The components of the network are described, as well as work done in collaboration with vendors who are interested in providing commercial products. 9 refs.

Hoebelheinrich, R. (Los Alamos National Lab., NM (USA))

1989-01-01T23:59:59.000Z

330

Multiple predictor smoothing methods for sensitivity analysis.  

SciTech Connect (OSTI)

The use of multiple predictor smoothing methods in sampling-based sensitivity analyses of complex models is investigated. Specifically, sensitivity analysis procedures based on smoothing methods employing the stepwise application of the following nonparametric regression techniques are described: (1) locally weighted regression (LOESS), (2) additive models, (3) projection pursuit regression, and (4) recursive partitioning regression. The indicated procedures are illustrated with both simple test problems and results from a performance assessment for a radioactive waste disposal facility (i.e., the Waste Isolation Pilot Plant). As shown by the example illustrations, the use of smoothing procedures based on nonparametric regression techniques can yield more informative sensitivity analysis results than can be obtained with more traditional sensitivity analysis procedures based on linear regression, rank regression or quadratic regression when nonlinear relationships between model inputs and model predictions are present.

Helton, Jon Craig; Storlie, Curtis B.

2006-08-01T23:59:59.000Z

331

Bug Bytes,Summer 2008 1 W elcome to Bug Bytes, our newly  

E-Print Network [OSTI]

was named the best in the country by the Chronicle of Higher Education, considered the top news and job for that perfect entomological t-shirts, books, insect art prints, insect candy, and posters of California drag- insect. You can see what's available at www. bohartmuseum.com. Purchases at the Education Programs

Ishida, Yuko

332

What is a bed bug? Bed bugs are small, oval, reddish brown, non-  

E-Print Network [OSTI]

zippers. Thus, experts recommend using hard luggage that closes tight. ·Protectyourclothes. Seal your clothes inside air-tight bags. ·Protectyourluggage. Never set your luggage on the bed or on a couch. Put. ·Treatyourluggagebeforeyoustoreit. After you have unpacked, vacuum your luggage thoroughly. Also, if it is hot outside, you can seal

Almor, Amit

333

V-050: IBM InfoSphere Information Server Multiple Vulnerabilities |  

Broader source: Energy.gov (indexed) [DOE]

0: IBM InfoSphere Information Server Multiple Vulnerabilities 0: IBM InfoSphere Information Server Multiple Vulnerabilities V-050: IBM InfoSphere Information Server Multiple Vulnerabilities December 19, 2012 - 1:00am Addthis PROBLEM: IBM InfoSphere Information Server Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in versions prior to 9.1. ABSTRACT: Multiple vulnerabilities have been reported in IBM InfoSphere Information Server REFERENCE LINKS: Secunia Advisory SA51605 IBM Support home IBM InfoSphere Information Server, Version 9.1 fix list IMPACT ASSESSMENT: Medium DISCUSSION: Multiple vulnerabilities have been reported in IBM InfoSphere Information Server, where some have an unknown impact and others can be exploited by malicious users to bypass certain security restrictions. 1) An unspecified error exists in the InfoCenter component.

334

U-104: Adobe Flash Player Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

4: Adobe Flash Player Multiple Vulnerabilities 4: Adobe Flash Player Multiple Vulnerabilities U-104: Adobe Flash Player Multiple Vulnerabilities February 16, 2012 - 6:30am Addthis PROBLEM: Adobe Flash Player Multiple Vulnerabilities PLATFORM: Adobe Flash Player versions 11.1.102.55 and prior for Windows, Macintosh, Linux, and Solaris Adobe Flash Player versions 11.1.112.61 and prior for Android 4.x Adobe Flash Player versions 11.1.111.5 and prior for Android 3.x and prior ABSTRACT: Multiple vulnerabilities have been reported in Adobe Flash Player, which can be exploited by malicious people to conduct cross-site scripting attacks, bypass certain security restrictions, and compromise a user's system. reference LINKS: Adobe Security Bulletin Secunia Advisory 48033 IMPACT ASSESSMENT: High Discussion: Multiple vulnerabilities have been reported in Adobe Flash Player, which

335

U-249: Google Chrome Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

49: Google Chrome Multiple Vulnerabilities 49: Google Chrome Multiple Vulnerabilities U-249: Google Chrome Multiple Vulnerabilities August 31, 2012 - 6:00am Addthis PROBLEM: Google Chrome Multiple Vulnerabilities PLATFORM: Google Chrome 21.x ABSTRACT: Multiple vulnerabilities have been reported in Google Chrome. reference LINKS: Secunia Advisory SA50447 Stable Channel Update CVE-2012-2865 CVE-2012-2866 CVE-2012-2867 CVE-2012-2868 CVE-2012-2869 CVE-2012-2870 CVE-2012-2871 CVE-2012-2872 IMPACT ASSESSMENT: High Discussion: Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact and others can be exploited by malicious people to conduct cross-site scripting attacks and compromise a user's system. 1) An out-of-bounds read error exists when handling line breaks. 2) A bad cast error exists within run-ins.

336

V-121: Google Chrome Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

1: Google Chrome Multiple Vulnerabilities 1: Google Chrome Multiple Vulnerabilities V-121: Google Chrome Multiple Vulnerabilities March 28, 2013 - 12:29am Addthis PROBLEM: Google Chrome Multiple Vulnerabilities PLATFORM: versions prior to 26.0.1410.43. ABSTRACT: Multiple vulnerabilities have been reported in Google Chrome REFERENCE LINKS: Secunia Advisory SA52761 CVE-2013-0916 CVE-2013-0917 CVE-2013-0918 CVE-2013-0919 CVE-2013-0920 CVE-2013-0921 CVE-2013-0922 CVE-2013-0923 CVE-2013-0924 CVE-2013-0925 CVE-2013-0926 IMPACT ASSESSMENT: High DISCUSSION: Multiple vulnerabilities have been reported in Google Chrome, where one has an unknown impact and others can be exploited by malicious people to bypass certain security restrictions and compromise a user's system. IMPACT: 1) A use-after-free error exists in Web Audio.

337

V-105: Google Chrome Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

5: Google Chrome Multiple Vulnerabilities 5: Google Chrome Multiple Vulnerabilities V-105: Google Chrome Multiple Vulnerabilities March 6, 2013 - 12:09am Addthis PROBLEM: Google Chrome Multiple Vulnerabilities PLATFORM: Google Chrome prior to 25.0.1364.152. ABSTRACT: Multiple vulnerabilities have been reported in Google Chrome REFERENCE LINKS: Stable Channel Update Secunia Advisory SA52454 CVE-2013-0902 CVE-2013-0903 CVE-2013-0904 CVE-2013-0905 CVE-2013-0906 CVE-2013-0907 CVE-2013-0908 CVE-2013-0909 CVE-2013-0910 CVE-2013-0911 IMPACT ASSESSMENT: High DISCUSSION: Multiple vulnerabilities in Google Chrome may have an unknown impact and others can be exploited by malicious people to compromise a user's system. 1) A use-after-free error exists in frame loader. 2) A use-after-free error exists in browser navigation handling.

338

V-050: IBM InfoSphere Information Server Multiple Vulnerabilities |  

Broader source: Energy.gov (indexed) [DOE]

0: IBM InfoSphere Information Server Multiple Vulnerabilities 0: IBM InfoSphere Information Server Multiple Vulnerabilities V-050: IBM InfoSphere Information Server Multiple Vulnerabilities December 19, 2012 - 1:00am Addthis PROBLEM: IBM InfoSphere Information Server Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in versions prior to 9.1. ABSTRACT: Multiple vulnerabilities have been reported in IBM InfoSphere Information Server REFERENCE LINKS: Secunia Advisory SA51605 IBM Support home IBM InfoSphere Information Server, Version 9.1 fix list IMPACT ASSESSMENT: Medium DISCUSSION: Multiple vulnerabilities have been reported in IBM InfoSphere Information Server, where some have an unknown impact and others can be exploited by malicious users to bypass certain security restrictions. 1) An unspecified error exists in the InfoCenter component.

339

Organic light emitting device having multiple separate emissive layers  

DOE Patents [OSTI]

An organic light emitting device having multiple separate emissive layers is provided. Each emissive layer may define an exciton formation region, allowing exciton formation to occur across the entire emissive region. By aligning the energy levels of each emissive layer with the adjacent emissive layers, exciton formation in each layer may be improved. Devices incorporating multiple emissive layers with multiple exciton formation regions may exhibit improved performance, including internal quantum efficiencies of up to 100%.

Forrest, Stephen R. (Ann Arbor, MI)

2012-03-27T23:59:59.000Z

340

Measuring multiple residual-stress components using the contour method and multiple cuts  

SciTech Connect (OSTI)

The conventional contour method determines one component of stress over the cross section of a part. The part is cut into two, the contour of the exposed surface is measured, and Bueckner's superposition principle is analytically applied to calculate stresses. In this paper, the contour method is extended to the measurement of multiple stress components by making multiple cuts with subsequent applications of superposition. The theory and limitations are described. The theory is experimentally tested on a 316L stainless steel disk with residual stresses induced by plastically indenting the central portion of the disk. The stress results are validated against independent measurements using neutron diffraction. The theory has implications beyond just multiple cuts. The contour method measurements and calculations for the first cut reveal how the residual stresses have changed throughout the part. Subsequent measurements of partially relaxed stresses by other techniques, such as laboratory x-rays, hole drilling, or neutron or synchrotron diffraction, can be superimposed back to the original state of the body.

Prime, Michael B [Los Alamos National Laboratory; Swenson, Hunter [Los Alamos National Laboratory; Pagliaro, Pierluigi [U. PALERMO; Zuccarello, Bernardo [U. PALERMO

2009-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "wireshark multiple bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure Control  

Broader source: Energy.gov (indexed) [DOE]

CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain GAO is making recommendations to the Department of Homeland Security (DHS) to develop a strategy for coordinating control systems security efforts and to enhance information sharing with relevant stakeholders. DHS officials did not agree or disagree with GAO's recommendations, but stated that they would take them under advisement. CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain More Documents & Publications GAO Challenges and Efforts to Secure Control Systems (March 2004)

342

Building multiple adsorption sites in porous polymer networks...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Building multiple adsorption sites in porous polymer networks for carbon capture applications Previous Next List Weigang Lu, Wolfgang M. Verdegaal, Jiamei Yu, Perla B Balbuena,...

343

ALS Capabilities Reveal Multiple Functions of Ebola Virus  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

ALS Capabilities Reveal Multiple Functions of Ebola Virus Print A central dogma of molecular biology is that a protein's sequence dictates its fold, and the fold dictates its...

344

A Photovoltaic Test Platform Realized with Multiple Independent Outputs.  

E-Print Network [OSTI]

??In this thesis, a project to design and build a photovoltaic test platform is discussed. Essentially, it is a photovoltaic simulator designed to have multiple… (more)

Crawford, Kevin P.

2011-01-01T23:59:59.000Z

345

Smoothing of the cosmic background radiation by multiple gravitational scattering  

Science Journals Connector (OSTI)

We investigated the smoothing of the cosmic background radiation (CBR) ... rays increases exponentially through multiple scatterings. This exponential growth occurs if the distance is smaller...

Junichiro Making

1994-01-01T23:59:59.000Z

346

Multiplex Chaos Synchronization in Semiconductor Lasers with Multiple Optoelectronic Feedbacks  

E-Print Network [OSTI]

Secure chaos based multiplex communication system scheme is proposed utilizing globally coupled semiconductor lasers with multiple variable time delay optoelectronic feedbacks.

E. M. Shahverdiev; K. A. Shore

2011-11-06T23:59:59.000Z

347

Carrier Multiplication in Nanocrystal Quantum Dots and Solar Energy Conversion  

Science Journals Connector (OSTI)

This paper discusses aspects of carrier multiplication (multiexciton generation by single photons) in semiconductor nanocrystals such as its mechanism, competing relaxation channels,...

Klimov, Victor I

348

Project Profile: CSP Energy Storage Solutions - Multiple Technologies...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

CSP Energy Storage Solutions - Multiple Technologies Compared US Solar Holdings logo US Solar Holdings, under the Thermal Storage FOA, is aiming to demonstrate commercial,...

349

Multiple frequency electron cyclotron heating for the Levitated Dipole Experiment .  

E-Print Network [OSTI]

??The use of multiple frequencies of electron cyclotron resonance heating (ECRH) in the Levitated Dipole Experiment (LDX) is an important tool that will tailor the… (more)

Mahar, Scott B

2005-01-01T23:59:59.000Z

350

Poly(dimethylsiloxane) microchip-based immunoassay with multiple...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

immunoassay with multiple reaction zones: Toward on-chip multiplex detection platform. Abstract: In this work, a poly(dimethylsiloxane) (PDMS) microchip-based immuno-sensing...

351

Multiple phase estimation in quantum cloning machines  

E-Print Network [OSTI]

Since the initial discovery of the Wootters-Zurek no-cloning theorem, a wide variety of quantum cloning machines have been proposed aiming at imperfect but optimal cloning of quantum states within its own context. Remarkably, most previous studies have employed the Bures fidelity or the Hilbert-Schmidt norm as the figure of merit to characterize the quality of the corresponding cloning scenarios. However, in many situations, what we truly care about is the relevant information about certain parameters encoded in quantum states. In this work, we investigate the multiple phase estimation problem in the framework of quantum cloning machines, from the perspective of quantum Fisher information matrix (QFIM). Focusing on the generalized d-dimensional equatorial states, we obtain the analytical formulas of QFIM for both universal quantum cloning machine (UQCM) and phase-covariant quantum cloning machine (PQCM), and prove that PQCM indeed performs better than UQCM in terms of QFIM. We highlight that our method can be generalized to arbitrary cloning schemes where the fidelity between the single-copy input and output states is input-state independent. Furthermore, the attainability of the quantum Cramer-Rao bound is also explicitly discussed.

Yao Yao; Li Ge; Xing Xiao; Xiao-guang Wang; Chang-pu Sun

2014-07-22T23:59:59.000Z

352

Cancer Treatment Using Multiple Chemotheraputic Agents Subject to Drug Resistance  

E-Print Network [OSTI]

Cancer Treatment Using Multiple Chemotheraputic Agents Subject to Drug Resistance J. J. Westman-7045 USA Abstract A compartment model for the evolution of cancer subject to multiple chemotherapeutic agents is presented. The formulation accounts for the heterogeneous nature of cancer and drug resistance

Hanson, Floyd B.

353

Coordinated Output Regulation of Multiple Heterogeneous Linear Systems  

E-Print Network [OSTI]

, the generalizations of coordination of multiple linear dynamic systems to the cooperative output regulation problemCoordinated Output Regulation of Multiple Heterogeneous Linear Systems Ziyang Meng, Tao Yang, Dimos V. Dimarogonas, and Karl H. Johansson Abstract-- The coordinated output regulation problem

Dimarogonas, Dimos

354

A Multiple Criteria Decision Analysis (MCDA) Software Selection Framework  

Science Journals Connector (OSTI)

With the gaining popularity of multiple criteria decision analysis (MCDA) among researchers and practitioners, a variety of software that implements sophisticated MCDA methods and techniques is now available. To address the issue of the missing methodological ... Keywords: Multiple Criteria Decision Analysis, MCDA, Software evaluation, multicriteria aggregation procedures

Yan Li; Manoj A. Thomas

2014-01-01T23:59:59.000Z

355

Cognitive Single Carrier Systems: Joint Impact of Multiple Licensed Transceivers  

E-Print Network [OSTI]

Cognitive Single Carrier Systems: Joint Impact of Multiple Licensed Transceivers Kyeong Jin Kim of interference from multiple licensed transceivers on cognitive underlay single carrier systems is examined, and 3) interference power from the primary transmitters. For this cognitive underlay single carrier

Elkashlan, Maged

356

Discovery in Hydrating Plaster Using Multiple Machine Learning Methods  

E-Print Network [OSTI]

Discovery in Hydrating Plaster Using Multiple Machine Learning Methods Judith E. Devaney, John G plaster over multiple time periods. We use three dimensional data obtained through X-ray microtomography of the plaster datasets that had been labeled with their autoclass predictions. The rules were found to have both

Fernandez, Thomas

357

Multiple Aphid Resistance from Alien Sources and its Chromosomal Location  

E-Print Network [OSTI]

Multiple Aphid Resistance from Alien Sources and its Chromosomal Location in Bread Wheat Leonardo A Alien Sources and Its Chromosomal Location in Bread Wheat Abstract Wheat (Triticum aestivum) is a very of this thesis were to: 1) identify novel sources of resistance to multiple aphid species in a wheat-alien

358

Generalized quadratic multiple knapsack problem and two solution approaches  

Science Journals Connector (OSTI)

The Quadratic Knapsack Problem (QKP) is one of the well-known combinatorial optimization problems. If more than one knapsack exists, then the problem is called a Quadratic Multiple Knapsack Problem (QMKP). Recently, knapsack problems with setups have ... Keywords: Combinatorial optimization, F-MSG, Generalized Quadratic Multiple Knapsack Problem (G-QMKP), Genetic Algorithm (GA), Production with plastic injection

Tugba Saraç; Aydin Sipahioglu

2014-03-01T23:59:59.000Z

359

Model Reduction for Power Electronics Systems with Multiple Heat Sources  

E-Print Network [OSTI]

Model Reduction for Power Electronics Systems with Multiple Heat Sources A. Augustin, T. Hauck, B demonstrates the model order re- duction procedures applied to semiconductor devices with multiple heat sources. The approach is demonstrated for a device with nine heat sources where some of them are perma- nently active

Paris-Sud XI, Université de

360

Exploiting Collective Effects of Multiple Optoelectronic Devices Integrated in a  

E-Print Network [OSTI]

Exploiting Collective Effects of Multiple Optoelectronic Devices Integrated in a Single Fiber. In this work, we demonstrate the successful fabrication of an eight-device cascaded optoelectronic fiber of integrating multiple optoelectronic components into a single fiber cross-section. This is in fact a common

California at Irvine, University of

Note: This page contains sample records for the topic "wireshark multiple bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Multiple Frequency Electron Cyclotron Heating for the Levitated Dipole Experiment  

E-Print Network [OSTI]

Multiple Frequency Electron Cyclotron Heating for the Levitated Dipole Experiment by Scott B. Mahar on Graduate Students #12;2 #12;Multiple Frequency Electron Cyclotron Heating for the Levitated Dipole frequencies of electron cyclotron resonance heating (ECRH) in the Levitated Dipole Experiment (LDX

362

Complex multiplication, rationality and mirror symmetry for abelian varieties  

E-Print Network [OSTI]

We show that complex multiplication on abelian varieties is equivalent to the existence of a constant rational K\\"ahler metric. We give a sufficient condition for a mirror of an abelian variety of CM-type to be of CM-type as well. We also study the relationship between complex multiplication and rationality of a toroidal lattice vertex algebra.

Meng Chen

2005-12-20T23:59:59.000Z

363

Cooperative target convergence using multiple agents  

SciTech Connect (OSTI)

This work considers the problem of causing multiple (100`s) autonomous mobile robots to converge to a target and provides a follow-the-leader approach to the problem. Each robot has only a limited-range sensor for sending the target and also larger but also limited-range robot-to-robot communication capability. Because of the small amount of information available to the robots, a practical approach to improve convergence to the target is to have a robot follow the robot with the best quality of information. Specifically, each robot emits a signal that informs in-range robots what its status is. A robot has a status value of 0 if it is itself in range of the target. A robot has a status of 1 if it is not in range of the target but is in communication range of a robot that is in range of the target. A robot has a status of 2 if it is not in range of the target but is within range of another robot that has status 1, and so on. Of all the mobile robots that any given robot is in range of, it follows the one with the best status. The emergent behavior is the ant-like trails of robots following each other toward the target. If the robot is not in range of another robot that is either in range of the target or following another robot, the robot will assign-1 to its quality-of-information, and will execute an exhaustive search. The exhaustive search will continue until it encounters either the target or another robot with a nonnegative quality-of-information. The quality of information approach was extended to the case where each robot only has two-bit signals informing it of distance to in-range robots.

Kwok, K.S.; Driessen, B.J.

1997-10-01T23:59:59.000Z

364

V-090: Adobe Flash Player / AIR Multiple Vulnerabilities | Department of  

Broader source: Energy.gov (indexed) [DOE]

0: Adobe Flash Player / AIR Multiple Vulnerabilities 0: Adobe Flash Player / AIR Multiple Vulnerabilities V-090: Adobe Flash Player / AIR Multiple Vulnerabilities February 13, 2013 - 12:14am Addthis PROBLEM: Adobe Flash Player / AIR Multiple Vulnerabilities PLATFORM: Adobe Flash Player versions 11.5.502.149 and prior for Windows and Macintosh Adobe Flash Player versions 11.2.202.262 and prior for Linux Adobe Flash Player versions 11.1.115.37 and prior for Android 4.x Adobe Flash Player versions 11.1.111.32 and prior for Android 3.x and 2.x Adobe AIR versions 3.5.0.1060 and prior Adobe AIR versions 3.5.0.1060 SDK and prior ABSTRACT: Multiple vulnerabilities have been reported in Adobe Flash Player and AIR. REFERENCE LINKS: Vulnerability identifier: APSB13-05 Secunia Advisory SA52166 CVE-2013-0637 CVE-2013-0638 CVE-2013-0639

365

V-059: MoinMoin Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

9: MoinMoin Multiple Vulnerabilities 9: MoinMoin Multiple Vulnerabilities V-059: MoinMoin Multiple Vulnerabilities January 1, 2013 - 5:57am Addthis PROBLEM: MoinMoin Multiple Vulnerabilities PLATFORM: Version(s): MoinMoin 1.x ABSTRACT: Multiple vulnerabilities have been reported in MoinMoin, which can be exploited by malicious users to conduct script insertion attacks and compromise a vulnerable system and by malicious people to manipulate certain data. REFERENCE LINKS: Secunia Advisory SA51663 CVE-2012-6080 CVE-2012-6081 CVE-2012-6082 IMPACT ASSESSMENT: High DISCUSSION: 1) Certain input when handling the AttachFile action is not properly verified before being used to write files. This can be exploited to overwrite arbitrary files via directory traversal sequences. 2) The application allows the upload of files with arbitrary extensions to

366

U-100: Google Chrome Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

0: Google Chrome Multiple Vulnerabilities 0: Google Chrome Multiple Vulnerabilities U-100: Google Chrome Multiple Vulnerabilities February 10, 2012 - 7:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact and others can be exploited by malicious people to bypass certain security restrictions, manipulate certain data, and compromise a user's system. PLATFORM: Google Chrome 16.x ABSTRACT: A remote user can create a specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. Reference LINKS: Google Announcements and Release Channel Secunia Advisory SA47938 Security Tracker ID 1026654 IMPACT ASSESSMENT: High Discussion: Multiple vulnerabilities have been reported in Google Chrome, where some

367

V-096: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities |  

Broader source: Energy.gov (indexed) [DOE]

6: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities 6: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities V-096: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities February 21, 2013 - 6:00am Addthis PROBLEM: A weakness and multiple vulnerabilities have been reported in Mozilla Thunderbird and SeaMonkey PLATFORM: The vulnerabilities are reported in Thunderbird versions prior to 17.0.3 and SeaMonkey versions prior to 2.16. ABSTRACT: A weakness and multiple vulnerabilities have been reported in Mozilla Thunderbird and SeaMonkey, which can be exploited by malicious people to disclose potentially sensitive information, conduct spoofing attacks, bypass certain security restrictions, and compromise a user's system. REFERENCE LINKS: Secunia Advisory SA52280 Mozilla Security Advisory 2013-21 CVE-2013-0765 CVE-2013-0772

368

V-132: IBM Tivoli System Automation Application Manager Multiple  

Broader source: Energy.gov (indexed) [DOE]

2: IBM Tivoli System Automation Application Manager Multiple 2: IBM Tivoli System Automation Application Manager Multiple Vulnerabilities V-132: IBM Tivoli System Automation Application Manager Multiple Vulnerabilities April 12, 2013 - 6:00am Addthis PROBLEM: IBM has acknowledged multiple vulnerabilities in IBM Tivoli System Automation Application Manager PLATFORM: The vulnerabilities are reported in IBM Tivoli System Automation Application Manager versions 3.1, 3.2, 3.2.1, and 3.2.2 ABSTRACT: Multiple security vulnerabilities exist in the IBM Java Runtime Environment component of IBM Tivoli System Automation Application Manager which may affect the product REFERENCE LINKS: Secunia Advisory: SA53006 IBM Security Bulletin 21633991 IBM Security Bulletin 21633992 CVE-2011-3563 CVE-2012-0497 CVE-2012-0498 CVE-2012-0499 CVE-2012-0501

369

U-066: Mozilla Firefox / Thunderbird Multiple Vulnerabilities | Department  

Broader source: Energy.gov (indexed) [DOE]

6: Mozilla Firefox / Thunderbird Multiple Vulnerabilities 6: Mozilla Firefox / Thunderbird Multiple Vulnerabilities U-066: Mozilla Firefox / Thunderbird Multiple Vulnerabilities December 22, 2011 - 6:30am Addthis PROBLEM: Mozilla Firefox / Thunderbird Multiple Vulnerabilities . PLATFORM: Mozilla Firefox 8.x and Mozilla Thunderbird 8.x ABSTRACT: Multiple vulnerabilities have been reported in Mozilla Firefox and Thunderbird. reference LINKS: Advisory 2011-53 Advisory 2011-54 Advisory 2011-55 Advisory 2011-56 Advisory 2011-57 Advisory 2011-58 Secunia Advisory: SA47302 IMPACT ASSESSMENT: High Discussion: Vulnerabilities have been reported in Mozilla Firefox and Thunderbird, where one has an unknown impact and others can be exploited by malicious people to disclose sensitive information and compromise a user's system. 1) Some unspecified errors can be exploited to corrupt memory. No further

370

V-126: Mozilla Firefox Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

6: Mozilla Firefox Multiple Vulnerabilities 6: Mozilla Firefox Multiple Vulnerabilities V-126: Mozilla Firefox Multiple Vulnerabilities April 4, 2013 - 6:00am Addthis PROBLEM: Mozilla Firefox Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in versions prior to 20.0 ABSTRACT: Multiple vulnerabilities have been reported in Mozilla Firefox, which can be exploited by malicious, local users to gain escalated privileges and by malicious people to conduct spoofing and cross-site scripting attacks and compromise a user's system. REFERENCE LINKS: Secunia Advisory SA52770 Secunia Advisory SA52293 Mozilla Security Announcement mfsa2013-30 Mozilla Security Announcement mfsa2013-31 Mozilla Security Announcement mfsa2013-32 Mozilla Security Announcement mfsa2013-34 Mozilla Security Announcement mfsa2013-35

371

V-224: Google Chrome Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

4: Google Chrome Multiple Vulnerabilities 4: Google Chrome Multiple Vulnerabilities V-224: Google Chrome Multiple Vulnerabilities August 22, 2013 - 1:05am Addthis PROBLEM: Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact and others can be exploited by malicious, local users to disclose potentially sensitive information and by malicious people to compromise a user's system. PLATFORM: Google Chrome 28.x ABSTRACT: The vulnerabilities are reported in versions prior to 29.0.1547.57 REFERENCE LINKS: Secunia Advisory ID: 1028921 CVE-2013-2887 CVE-2013-2900 CVE-2013-2901 CVE-2013-2902 CVE-2013-2903 CVE-2013-2904 CVE-2013-2905 IMPACT ASSESSMENT: High DISCUSSION: Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact and others can be exploited by malicious, local users to disclose

372

V-096: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities |  

Broader source: Energy.gov (indexed) [DOE]

6: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities 6: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities V-096: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities February 21, 2013 - 6:00am Addthis PROBLEM: A weakness and multiple vulnerabilities have been reported in Mozilla Thunderbird and SeaMonkey PLATFORM: The vulnerabilities are reported in Thunderbird versions prior to 17.0.3 and SeaMonkey versions prior to 2.16. ABSTRACT: A weakness and multiple vulnerabilities have been reported in Mozilla Thunderbird and SeaMonkey, which can be exploited by malicious people to disclose potentially sensitive information, conduct spoofing attacks, bypass certain security restrictions, and compromise a user's system. REFERENCE LINKS: Secunia Advisory SA52280 Mozilla Security Advisory 2013-21 CVE-2013-0765 CVE-2013-0772

373

V-132: IBM Tivoli System Automation Application Manager Multiple  

Broader source: Energy.gov (indexed) [DOE]

2: IBM Tivoli System Automation Application Manager Multiple 2: IBM Tivoli System Automation Application Manager Multiple Vulnerabilities V-132: IBM Tivoli System Automation Application Manager Multiple Vulnerabilities April 12, 2013 - 6:00am Addthis PROBLEM: IBM has acknowledged multiple vulnerabilities in IBM Tivoli System Automation Application Manager PLATFORM: The vulnerabilities are reported in IBM Tivoli System Automation Application Manager versions 3.1, 3.2, 3.2.1, and 3.2.2 ABSTRACT: Multiple security vulnerabilities exist in the IBM Java Runtime Environment component of IBM Tivoli System Automation Application Manager which may affect the product REFERENCE LINKS: Secunia Advisory: SA53006 IBM Security Bulletin 21633991 IBM Security Bulletin 21633992 CVE-2011-3563 CVE-2012-0497 CVE-2012-0498 CVE-2012-0499 CVE-2012-0501

374

U-162: Drupal Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

162: Drupal Multiple Vulnerabilities 162: Drupal Multiple Vulnerabilities U-162: Drupal Multiple Vulnerabilities May 4, 2012 - 7:00am Addthis PROBLEM: Drupal Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in 7.x versions prior to 7.13. ABSTRACT: Several vulnerabilities were reported in Drupal: Denial of Service, Access bypass, and Unvalidated form redirect reference LINKS: Security Advisory: DRUPAL-SA-CORE-2012-002 Bugtraq ID: 53359 Secunia Advisory SA49012 CVE-2012-1588 CVE-2012-1589 CVE-2012-1590 CVE-2012-1591 CVE-2012-2153 MPACT ASSESSMENT: High Discussion: A weakness, a security issue, and multiple vulnerabilities have been reported in Drupal, which can be exploited by malicious users to disclose sensitive information, bypass certain security restrictions, and cause a DoS (Denial of Service).

375

T-542: SAP Crystal Reports Server Multiple Vulnerabilities | Department of  

Broader source: Energy.gov (indexed) [DOE]

2: SAP Crystal Reports Server Multiple Vulnerabilities 2: SAP Crystal Reports Server Multiple Vulnerabilities T-542: SAP Crystal Reports Server Multiple Vulnerabilities January 25, 2011 - 2:30pm Addthis PROBLEM: SAP Crystal Reports Server Multiple Vulnerabilities. PLATFORM: Crystal Reports Server 2008 ABSTRACT: Multiple vulnerabilities in SAP Crystal Reports Server 2008, which can be exploited by malicious users to disclose potentially sensitive information and by malicious people to conduct cross-site scripting attacks, manipulate certain data, and compromise a user's system. reference LINKS: Secunia Advisory SA43060 Vulnerability Report: Crystal Reports Server 2008 IMPACT ASSESSMENT: High Discussion: 1) Input passed to the "actId" parameter in InfoViewApp/jsp/common/actionNav.jsp, "backUrl" parameter in

376

V-092: Pidgin Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

2: Pidgin Multiple Vulnerabilities 2: Pidgin Multiple Vulnerabilities V-092: Pidgin Multiple Vulnerabilities February 15, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Pidgin PLATFORM: Vulnerabilities are reported in version 2.10.6. Prior versions may also be affected. ABSTRACT: Multiple vulnerabilities have been reported in Pidgin, which can be exploited by malicious people to manipulate certain data, cause a DoS (Denial of Service), and compromise a user's system. REFERENCE LINKS: Secunia Advisory SA52178 Pidgin CVE-2013-0271 CVE-2013-0272 CVE-2013-0273 CVE-2013-0274 IMPACT ASSESSMENT: High DISCUSSION: 1) An error within the MXit protocol plugin when saving images can be exploited to overwrite certain files. 2) A boundary error within the "mxit_cb_http_read()" function

377

V-180: IBM Application Manager For Smart Business Multiple Vulnerabilities  

Broader source: Energy.gov (indexed) [DOE]

V-180: IBM Application Manager For Smart Business Multiple V-180: IBM Application Manager For Smart Business Multiple Vulnerabilities V-180: IBM Application Manager For Smart Business Multiple Vulnerabilities June 18, 2013 - 12:38am Addthis PROBLEM: IBM Application Manager For Smart Business Multiple Vulnerabilities PLATFORM: IBM Application Manager For Smart Business 1.x ABSTRACT: A security issue and multiple vulnerabilities have been reported in IBM Application Manager For Smart Business REFERENCE LINKS: Security Bulletin 1640752 Secunia Advisory SA53844 CVE-2012-1531 CVE-2012-1532 CVE-2012-1533 CVE-2012-2190 CVE-2012-2191 CVE-2012-2203 CVE-2012-3143 CVE-2012-3159 CVE-2012-3216 CVE-2012-4820 CVE-2012-4821 CVE-2012-4822 CVE-2012-4823 CVE-2012-5068 CVE-2012-5069 CVE-2012-5071 CVE-2012-5072 CVE-2012-5073 CVE-2012-5075 CVE-2012-5079

378

V-214: Mozilla Firefox Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

4: Mozilla Firefox Multiple Vulnerabilities 4: Mozilla Firefox Multiple Vulnerabilities V-214: Mozilla Firefox Multiple Vulnerabilities August 8, 2013 - 2:16am Addthis PROBLEM: Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 23.0 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors. PLATFORM: Mozilla Firefox 22.x ABSTRACT: The vulnerabilities are reported in versions prior to 23.0. REFERENCE LINKS: Secunia Advisory SA54418 CVE-2013-1701 CVE-2013-1702 CVE-2013-1704 CVE-2013-1705 CVE-2013-1706 CVE-2013-1707 CVE-2013-1709 CVE-2013-1710 CVE-2013-1711 CVE-2013-1713 CVE-2013-1714 CVE-2013-1717 IMPACT ASSESSMENT: High DISCUSSION: Multiple vulnerabilities have been reported in Mozilla Firefox, which can

379

T-542: SAP Crystal Reports Server Multiple Vulnerabilities | Department of  

Broader source: Energy.gov (indexed) [DOE]

2: SAP Crystal Reports Server Multiple Vulnerabilities 2: SAP Crystal Reports Server Multiple Vulnerabilities T-542: SAP Crystal Reports Server Multiple Vulnerabilities January 25, 2011 - 2:30pm Addthis PROBLEM: SAP Crystal Reports Server Multiple Vulnerabilities. PLATFORM: Crystal Reports Server 2008 ABSTRACT: Multiple vulnerabilities in SAP Crystal Reports Server 2008, which can be exploited by malicious users to disclose potentially sensitive information and by malicious people to conduct cross-site scripting attacks, manipulate certain data, and compromise a user's system. reference LINKS: Secunia Advisory SA43060 Vulnerability Report: Crystal Reports Server 2008 IMPACT ASSESSMENT: High Discussion: 1) Input passed to the "actId" parameter in InfoViewApp/jsp/common/actionNav.jsp, "backUrl" parameter in

380

V-059: MoinMoin Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

9: MoinMoin Multiple Vulnerabilities 9: MoinMoin Multiple Vulnerabilities V-059: MoinMoin Multiple Vulnerabilities January 1, 2013 - 5:57am Addthis PROBLEM: MoinMoin Multiple Vulnerabilities PLATFORM: Version(s): MoinMoin 1.x ABSTRACT: Multiple vulnerabilities have been reported in MoinMoin, which can be exploited by malicious users to conduct script insertion attacks and compromise a vulnerable system and by malicious people to manipulate certain data. REFERENCE LINKS: Secunia Advisory SA51663 CVE-2012-6080 CVE-2012-6081 CVE-2012-6082 IMPACT ASSESSMENT: High DISCUSSION: 1) Certain input when handling the AttachFile action is not properly verified before being used to write files. This can be exploited to overwrite arbitrary files via directory traversal sequences. 2) The application allows the upload of files with arbitrary extensions to

Note: This page contains sample records for the topic "wireshark multiple bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

V-119: IBM Security AppScan Enterprise Multiple Vulnerabilities |  

Broader source: Energy.gov (indexed) [DOE]

9: IBM Security AppScan Enterprise Multiple Vulnerabilities 9: IBM Security AppScan Enterprise Multiple Vulnerabilities V-119: IBM Security AppScan Enterprise Multiple Vulnerabilities March 26, 2013 - 12:56am Addthis PROBLEM: IBM Security AppScan Enterprise Multiple Vulnerabilities PLATFORM: IBM Rational AppScan 5.x IBM Rational AppScan 8.x ABSTRACT: IBM has acknowledged multiple vulnerabilities REFERENCE LINKS: IBM Reference #:1626264 Secunia Advisory SA52764 CVE-2008-4033 CVE-2012-4431 CVE-2012-5081 CVE-2013-0473 CVE-2013-0474 CVE-2013-0510 CVE-2013-0511 CVE-2013-0512 CVE-2013-0513 CVE-2013-0532 IMPACT ASSESSMENT: Medium DISCUSSION: 1) The application allows users to perform certain actions via HTTP requests without performing proper validity checks to verify the requests. This can be exploited to e.g. cause a DoS when a logged-in user visits a

382

V-111: Multiple vulnerabilities have been reported in Puppet | Department  

Broader source: Energy.gov (indexed) [DOE]

1: Multiple vulnerabilities have been reported in Puppet 1: Multiple vulnerabilities have been reported in Puppet V-111: Multiple vulnerabilities have been reported in Puppet March 14, 2013 - 12:12am Addthis PROBLEM: Multiple vulnerabilities have been reported in Puppet PLATFORM: Puppet 2.x Puppet 3.x Puppet Enterprise 1.x Puppet Enterprise 2.x ABSTRACT: Puppet Multiple Vulnerabilities REFERENCE LINKS: Puppet Blog Secunia Advisory SA52596 CVE-2013-1640 CVE-2013-1652 CVE-2013-1653 CVE-2013-1654 CVE-2013-1655 CVE-2013-2274 CVE-2013-2275 IMPACT ASSESSMENT: High DISCUSSION: 1) An unspecified error exists when invoking the "template" or "inline_template" functions while responding to a catalog request and can be exploited to execute arbitrary code via a specially crafted catalog request. 2) An input validation error exists in the application and can be exploited

383

V-118: IBM Lotus Domino Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

8: IBM Lotus Domino Multiple Vulnerabilities 8: IBM Lotus Domino Multiple Vulnerabilities V-118: IBM Lotus Domino Multiple Vulnerabilities March 25, 2013 - 12:40am Addthis PROBLEM: IBM Lotus Domino Multiple Vulnerabilities PLATFORM: IBM Domino 8.x ABSTRACT: Multiple vulnerabilities have been reported in IBM Lotus Domino REFERENCE LINKS: IBM Reference #:1627597 Secunia Advisory SA52753 CVE-2012-6277 CVE-2013-0486 CVE-2013-0487 IMPACT ASSESSMENT: High DISCUSSION: 1) An unspecified error can be exploited to disclose time-limited authentication credentials via the Domino Java Console and subsequently gain otherwise restricted access. Successful exploitation may require certain knowledge of Domino server configuration. 2) An unspecified error in the HTTP server component can be exploited to cause a memory leak and subsequently crash the server.

384

V-097: Google Chrome Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

7: Google Chrome Multiple Vulnerabilities 7: Google Chrome Multiple Vulnerabilities V-097: Google Chrome Multiple Vulnerabilities February 22, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Google Chrome PLATFORM: The vulnerabilities are reported in versions prior to Google Chrome 24.x ABSTRACT: Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact and others can be exploited by malicious people to bypass certain security restrictions and compromise a user's system. REFERENCE LINKS: Secunia Advisory SA52320 Chrome Stable Channel Update CVE-2013-0879 CVE-2013-0880 CVE-2013-0881 CVE-2013-0882 CVE-2013-0883 CVE-2013-0884 CVE-2013-0885 CVE-2013-0886 CVE-2013-0887 CVE-2013-0888 CVE-2013-0889 CVE-2013-0890 CVE-2013-0891 CVE-2013-0892 CVE-2013-0893

385

U-093: Mozilla Firefox Multiple Flaws Permit Remote Code Execution,  

Broader source: Energy.gov (indexed) [DOE]

3: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, 3: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting Attacks U-093: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting Attacks February 1, 2012 - 5:51am Addthis PROBLEM: Multiple vulnerabilities were reported in Mozilla Firefox. PLATFORM: Linux (Any), UNIX (Any), Windows (Any) Version(s): prior to 3.2.26; prior to 10.0 ABSTRACT: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting. reference LINKS: SecurityTracker Alert ID: 1026605 CVE-2011-3659, CVE-2012-0442 CVE-2012-0443, CVE-2012-0444 CVE-2012-0445, CVE-2012-0446 CVE-2012-0447, CVE-2012-0449 CVE-2012-0450 Vendor Site IMPACT ASSESSMENT:

386

V-092: Pidgin Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

2: Pidgin Multiple Vulnerabilities 2: Pidgin Multiple Vulnerabilities V-092: Pidgin Multiple Vulnerabilities February 15, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Pidgin PLATFORM: Vulnerabilities are reported in version 2.10.6. Prior versions may also be affected. ABSTRACT: Multiple vulnerabilities have been reported in Pidgin, which can be exploited by malicious people to manipulate certain data, cause a DoS (Denial of Service), and compromise a user's system. REFERENCE LINKS: Secunia Advisory SA52178 Pidgin CVE-2013-0271 CVE-2013-0272 CVE-2013-0273 CVE-2013-0274 IMPACT ASSESSMENT: High DISCUSSION: 1) An error within the MXit protocol plugin when saving images can be exploited to overwrite certain files. 2) A boundary error within the "mxit_cb_http_read()" function

387

V-022: Attachmate Reflection Products Java Multiple Vulnerabilities |  

Broader source: Energy.gov (indexed) [DOE]

2: Attachmate Reflection Products Java Multiple Vulnerabilities 2: Attachmate Reflection Products Java Multiple Vulnerabilities V-022: Attachmate Reflection Products Java Multiple Vulnerabilities November 13, 2012 - 1:00am Addthis PROBLEM: Attachmate Reflection Products Java Multiple Vulnerabilities PLATFORM: Reflection X 2011 Reflection Suite for X 2011 Reflection for Secure IT Server for Windows Reflection for Secure IT Client and Server for UNIX ABSTRACT: Security issues related to Reflection PKI Services Manager REFERENCE LINKS: PKI Services Manager Technical Note 2560 Secunia Advisory SA51256 CVE-2012-0551 CVE-2012-1711 CVE-2012-1713 CVE-2012-1716 CVE-2012-1717 CVE-2012-1718 CVE-2012-1719 CVE-2012-1720 CVE-2012-1721 CVE-2012-1722 CVE-2012-1723 CVE-2012-1724 CVE-2012-1725 CVE-2012-1726 IMPACT ASSESSMENT: High DISCUSSION: Attachmate has acknowledged multiple vulnerabilities in some Reflection

388

U-013: HP Data Protector Multiple Unspecified Vulnerabilities | Department  

Broader source: Energy.gov (indexed) [DOE]

3: HP Data Protector Multiple Unspecified Vulnerabilities 3: HP Data Protector Multiple Unspecified Vulnerabilities U-013: HP Data Protector Multiple Unspecified Vulnerabilities October 18, 2011 - 9:00am Addthis PROBLEM: HP Data Protector Multiple Unspecified Vulnerabilities. PLATFORM: HP Data Protector Notebook Extension 6.20; HP Data Protector for Personal Computers 7.0 ABSTRACT: Multiple vulnerabilities were reported in HP Data Protector. A remote user can execute arbitrary code on the target system. reference LINKS: HP Security Document ID: c03054543 SecurityTracker Alert ID: 1026195 Secunia Advisory: SA46468 CVE-2011-3156 CVE-2011-3157 CVE-2011-3158 CVE-2011-3159 CVE-2011-3160 CVE-2011-3161 CVE-2011-3162 IMPACT ASSESSMENT: High Discussion: Potential security vulnerabilities has been identified with HP Data Protector Notebook Extension. These vulnerabilities could be remotely

389

U-162: Drupal Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

62: Drupal Multiple Vulnerabilities 62: Drupal Multiple Vulnerabilities U-162: Drupal Multiple Vulnerabilities May 4, 2012 - 7:00am Addthis PROBLEM: Drupal Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in 7.x versions prior to 7.13. ABSTRACT: Several vulnerabilities were reported in Drupal: Denial of Service, Access bypass, and Unvalidated form redirect reference LINKS: Security Advisory: DRUPAL-SA-CORE-2012-002 Bugtraq ID: 53359 Secunia Advisory SA49012 CVE-2012-1588 CVE-2012-1589 CVE-2012-1590 CVE-2012-1591 CVE-2012-2153 MPACT ASSESSMENT: High Discussion: A weakness, a security issue, and multiple vulnerabilities have been reported in Drupal, which can be exploited by malicious users to disclose sensitive information, bypass certain security restrictions, and cause a DoS (Denial of Service).

390

Multiple pass and multiple layer friction stir welding and material enhancement processes  

DOE Patents [OSTI]

Processes for friction stir welding, typically for comparatively thick plate materials using multiple passes and multiple layers of a friction stir welding tool. In some embodiments a first portion of a fabrication preform and a second portion of the fabrication preform are placed adjacent to each other to form a joint, and there may be a groove adjacent the joint. The joint is welded and then, where a groove exists, a filler may be disposed in the groove, and the seams between the filler and the first and second portions of the fabrication preform may be friction stir welded. In some embodiments two portions of a fabrication preform are abutted to form a joint, where the joint may, for example, be a lap joint, a bevel joint or a butt joint. In some embodiments a plurality of passes of a friction stir welding tool may be used, with some passes welding from one side of a fabrication preform and other passes welding from the other side of the fabrication preform.

Feng, Zhili (Knoxville, TN) [Knoxville, TN; David, Stan A. (Knoxville, TN) [Knoxville, TN; Frederick, David Alan (Harriman, TN) [Harriman, TN

2010-07-27T23:59:59.000Z

391

Midwest Independent System Operator (Multiple States) | Department of  

Broader source: Energy.gov (indexed) [DOE]

Independent System Operator (Multiple States) Independent System Operator (Multiple States) Midwest Independent System Operator (Multiple States) < Back Eligibility Developer Savings Category Alternative Fuel Vehicles Hydrogen & Fuel Cells Buying & Making Electricity Water Home Weatherization Solar Wind Program Info State Montana Program Type Interconnection Provider Midwest Independent System Operator Midwest Independent Transmission System Operator (MISO) is a Regional Transmission Organization, which administers wholesale electricity markets in all or parts of 11 U.S. states and the Canadian province of Manitoba. MISO administers electricity transmission grids across the Midwest and into Canada, and provides tools, transmission planning strategies, and integration for utilities in those markets.

392

Western Interstate Nuclear Compact State Nuclear Policy (Multiple States) |  

Broader source: Energy.gov (indexed) [DOE]

Western Interstate Nuclear Compact State Nuclear Policy (Multiple Western Interstate Nuclear Compact State Nuclear Policy (Multiple States) Western Interstate Nuclear Compact State Nuclear Policy (Multiple States) < Back Eligibility Agricultural Commercial Construction Fed. Government Fuel Distributor Industrial Institutional Investor-Owned Utility Local Government Municipal/Public Utility Nonprofit Retail Supplier Rural Electric Cooperative State/Provincial Govt Systems Integrator Transportation Tribal Government Utility Savings Category Alternative Fuel Vehicles Hydrogen & Fuel Cells Buying & Making Electricity Water Home Weatherization Solar Wind Program Info State Arizona Program Type Siting and Permitting Provider Western Interstate Energy Board Legislation authorizes states' entrance into the Western Interstate Nuclear Compact, which aims to undertake the cooperation of participating states in

393

Southern States Energy Compact (Multiple States) | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Southern States Energy Compact (Multiple States) Southern States Energy Compact (Multiple States) Southern States Energy Compact (Multiple States) < Back Eligibility Agricultural Commercial Construction Developer Fed. Government Fuel Distributor General Public/Consumer Industrial Installer/Contractor Institutional Investor-Owned Utility Local Government Low-Income Residential Multi-Family Residential Municipal/Public Utility Nonprofit Residential Retail Supplier Rural Electric Cooperative Schools State/Provincial Govt Systems Integrator Transportation Tribal Government Utility Savings Category Alternative Fuel Vehicles Hydrogen & Fuel Cells Buying & Making Electricity Water Home Weatherization Solar Wind Program Info State Alabama Program Type Environmental Regulations Industry Recruitment/Support Provider Southern States Energy Board

394

Delaware River Basin Commission (Multiple States) | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Delaware River Basin Commission (Multiple States) Delaware River Basin Commission (Multiple States) Delaware River Basin Commission (Multiple States) < Back Eligibility Utility Commercial Agricultural Investor-Owned Utility State/Provincial Govt Industrial Construction Municipal/Public Utility Local Government Installer/Contractor Rural Electric Cooperative Tribal Government Systems Integrator Savings Category Water Buying & Making Electricity Home Weatherization Program Info Start Date 1961 State Delaware Program Type Environmental Regulations Siting and Permitting Provider Project Review Section The Delaware River Basin Commission (DRBC) is a federal-interstate compact government agency that was formed by concurrent legislation enacted in 1961 by the United States and the four basin states (Pennsylvania, New York, New

395

Exceeding the Limit in Solar Energy Conversion with Multiple Excitons  

Science Journals Connector (OSTI)

The former comes from the transparence of the semiconductor material to solar radiation with photon energies below the bandgap (Eg), while the latter results from the cooling of hot carriers, initially generated by photon energies above Eg, to the band edges before they are extracted to do work. ... Carrier multiplication or singlet fission can be used to decrease the thermalization loss by converting part of the excess photon energy to multiple electron–hole pairs, thus increasing photocurrent. ... (9) However, such enhancement has little effect on the power conversion efficiency because significant carrier multiplication only occurs at photon energies as high as 4Eg. ...

Xiaoyang Zhu

2013-06-18T23:59:59.000Z

396

Interstate Commission on the Potomac River Basin (Multiple States) |  

Broader source: Energy.gov (indexed) [DOE]

Interstate Commission on the Potomac River Basin (Multiple States) Interstate Commission on the Potomac River Basin (Multiple States) Interstate Commission on the Potomac River Basin (Multiple States) < Back Eligibility Commercial Construction Industrial Investor-Owned Utility Local Government Municipal/Public Utility Rural Electric Cooperative Systems Integrator Tribal Government Utility Savings Category Water Buying & Making Electricity Home Weatherization Program Info State District of Columbia Program Type Environmental Regulations Siting and Permitting Provider Interstate Commission on the Potomac River Basin The Interstate Commission on the Potomac River Basin's (ICPRB) mission is to enhance, protect, and conserve the water and associated land resources of the Potomac River and its tributaries through regional and interstate

397

V-122: IBM Tivoli Application Dependency Discovery Manager Java Multiple  

Broader source: Energy.gov (indexed) [DOE]

2: IBM Tivoli Application Dependency Discovery Manager Java 2: IBM Tivoli Application Dependency Discovery Manager Java Multiple Vulnerabilities V-122: IBM Tivoli Application Dependency Discovery Manager Java Multiple Vulnerabilities March 29, 2013 - 6:00am Addthis PROBLEM: IBM has acknowledged multiple vulnerabilities in IBM Tivoli Application Dependency Discovery Manager PLATFORM: The vulnerabilities are reported in version 7.2.0.0 through 7.2.1.3 ABSTRACT: Multiple security vulnerabilities exist in the Java Runtime Environments (JREs) that can affect the security of IBM Tivoli Application Dependency Discovery Manager. REFERENCE LINKS: Secunia Advisory SA52829 IBM Security Bulletin 1631786 CVE-2012-1531 CVE-2012-3143 CVE-2012-3216 CVE-2012-4820 CVE-2012-4822 CVE-2012-5069 CVE-2012-5071 CVE-2012-5073 CVE-2012-5075 CVE-2012-5079

398

U-191: Oracle Java Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

91: Oracle Java Multiple Vulnerabilities 91: Oracle Java Multiple Vulnerabilities U-191: Oracle Java Multiple Vulnerabilities June 14, 2012 - 7:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Oracle Java, which can be exploited by malicious local users PLATFORM: Oracle Java JDK 1.7.x / 7.x Oracle Java JRE 1.7.x / 7.x Sun Java JDK 1.5.x Sun Java JDK 1.6.x / 6.x Sun Java JRE 1.4.x Sun Java JRE 1.5.x / 5.x Sun Java JRE 1.6.x / 6.x Sun Java SDK 1.4.x ABSTRACT: The Critical Patch Update for Java SE also includes non-security fixes. Critical Patch Updates are cumulative and each advisory describes only the security fixes added since the previous Critical Patch Update. Thus, prior Critical Patch Update Advisories should be reviewed for information regarding earlier accumulated security fixes.

399

U-035: Adobe Flash Player Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

35: Adobe Flash Player Multiple Vulnerabilities 35: Adobe Flash Player Multiple Vulnerabilities U-035: Adobe Flash Player Multiple Vulnerabilities November 14, 2011 - 10:15am Addthis PROBLEM: Adobe Flash Player Multiple Vulnerabilities. PLATFORM: Adobe Flash Player 11.0.1.152 and earlier versions for Windows, Macintosh, Linux and Solaris operating systems Adobe Flash Player 11.0.1.153 and earlier versions for Android Adobe AIR 3.0 and earlier versions for Windows, Macintosh, and Android ABSTRACT: Adobe recommends users of Adobe Flash Player 11.0.1.152 and earlier versions for Windows, Macintosh, Linux and Solaris update to Adobe Flash Player 11.1.102.55. Users of Adobe Flash Player 11.0.1.153 and earlier versions for Android should update to Adobe Flash Player 11.1.102.59 for Android. Users of Adobe AIR 3.0 for Windows, Macintosh, and Android should

400

V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilities |  

Broader source: Energy.gov (indexed) [DOE]

61: IBM Maximo Asset Management Products Java Multiple 61: IBM Maximo Asset Management Products Java Multiple Vulnerabilities V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilities May 22, 2013 - 12:46am Addthis PROBLEM: IBM Maximo Asset Management Products Java Multiple Vulnerabilities PLATFORM: IBM Maximo Asset Management 6.x IBM Maximo Asset Management 7.x IBM Maximo Asset Management Essentials 7.x ABSTRACT: Asset and Service Mgmt Products - Potential security exposure when using JavaTM based applications due to vulnerabilities in Java Software Developer Kits. REFERENCE LINKS: IBM Reference #:1638135 Secunia Advisory SA53451 CVE-2013-0401 CVE-2013-2433 CVE-2013-2434 CVE-2013-0402 CVE-2013-1488 CVE-2013-1491 CVE-2013-1518 CVE-2013-1537 CVE-2013-1540 CVE-2013-1557 CVE-2013-1558 CVE-2013-1561 CVE-2013-1563 CVE-2013-1564 CVE-2013-1569

Note: This page contains sample records for the topic "wireshark multiple bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

V-187: Mozilla Firefox Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

7: Mozilla Firefox Multiple Vulnerabilities 7: Mozilla Firefox Multiple Vulnerabilities V-187: Mozilla Firefox Multiple Vulnerabilities June 27, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Mozilla Firefox PLATFORM: Mozilla Firefox 21.x ABSTRACT: These vulnerabilities can be exploited by malicious people to conduct cross-site scripting and spoofing attacks, disclose potentially sensitive information, bypass certain security restrictions, and compromise a user's system. REFERENCE LINKS: Secunia Advisory SA53970 Secunia Advisory SA53953 Mozilla Advisory mfsa2013-49 Mozilla Advisory mfsa2013-50 Mozilla Advisory mfsa2013-51 Mozilla Advisory mfsa2013-53 Mozilla Advisory mfsa2013-55 Mozilla Advisory mfsa2013-56 Mozilla Advisory mfsa2013-59 CVE-2013-1682 CVE-2013-1683 CVE-2013-1684 CVE-2013-1685

402

V-208: Google Chrome Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

8: Google Chrome Multiple Vulnerabilities 8: Google Chrome Multiple Vulnerabilities V-208: Google Chrome Multiple Vulnerabilities August 1, 2013 - 2:32am Addthis PROBLEM: Multiple unspecified vulnerabilities in Google Chrome before 28.0.1500.95 allow attackers to cause a denial of service or possibly have other impact via unknown vectors. PLATFORM: Google Chrome 28.x ABSTRACT: Some vulnerabilities have been reported in Google Chrome which allows attackers to access and compromise a user's system. REFERENCE LINKS: Secunia Advisory SA54325 CVE-2013-2881 CVE-2013-2882 CVE-2013-2883 CVE-2013-2884 CVE-2013-2885 CVE-2013-2886 IMPACT ASSESSMENT: High DISCUSSION: Several vulnerabilities have been reported in Google Chrome, where some have an unknown impact and others can be exploited by malicious people to

403

U-173: Symantec Web Gateway Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

3: Symantec Web Gateway Multiple Vulnerabilities 3: Symantec Web Gateway Multiple Vulnerabilities U-173: Symantec Web Gateway Multiple Vulnerabilities May 21, 2012 - 7:00am Addthis PROBLEM: Symantec Web Gateway Multiple Vulnerabilities PLATFORM: 5.0.x prior to 5.0.3 ABSTRACT: Several vulnerabilities were reported in Symantec Web Gateway. A remote user can include and execute arbitrary code on the target system. A remote user can conduct cross-site scripting attacks. A remote user can view/delete/upload files on the target system. Reference Links: SecurityTracker Alert ID: 1027078 CVE-2012-0296 CVE-2012-0297 CVE-2012-0298 CVE-2012-0299 IMPACT ASSESSMENT: Medium Discussion: The management interface does not properly authenticate remote users and does not properly validate user-supplied input. A remote user can cause arbitrary scripting code to be executed by the

404

V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilities |  

Broader source: Energy.gov (indexed) [DOE]

1: IBM Maximo Asset Management Products Java Multiple 1: IBM Maximo Asset Management Products Java Multiple Vulnerabilities V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilities May 22, 2013 - 12:46am Addthis PROBLEM: IBM Maximo Asset Management Products Java Multiple Vulnerabilities PLATFORM: IBM Maximo Asset Management 6.x IBM Maximo Asset Management 7.x IBM Maximo Asset Management Essentials 7.x ABSTRACT: Asset and Service Mgmt Products - Potential security exposure when using JavaTM based applications due to vulnerabilities in Java Software Developer Kits. REFERENCE LINKS: IBM Reference #:1638135 Secunia Advisory SA53451 CVE-2013-0401 CVE-2013-2433 CVE-2013-2434 CVE-2013-0402 CVE-2013-1488 CVE-2013-1491 CVE-2013-1518 CVE-2013-1537 CVE-2013-1540 CVE-2013-1557 CVE-2013-1558 CVE-2013-1561 CVE-2013-1563 CVE-2013-1564 CVE-2013-1569

405

U-179: IBM Java 7 Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

9: IBM Java 7 Multiple Vulnerabilities 9: IBM Java 7 Multiple Vulnerabilities U-179: IBM Java 7 Multiple Vulnerabilities May 30, 2012 - 7:00am Addthis PROBLEM: IBM has acknowledged multiple vulnerabilities in IBM Java PLATFORM: IBM Java 7.x ABSTRACT: Vulnerabilities can be exploited by malicious users to disclose certain information and by malicious people to disclose potentially sensitive information, hijack a user's session, conduct DNS cache poisoning attacks, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system. Reference Links: Secunia Advisory 49333 CVE-2011-3389 Vendor Advisory IMPACT ASSESSMENT: High Discussion: IBM released a patch to address vulerabilities in IBM Java 7. IBM 7 SR1 is available for download. Impact: Hijacking Manipulation of data Exposure of sensitive information

406

T-540: Sybase EAServer Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

40: Sybase EAServer Multiple Vulnerabilities 40: Sybase EAServer Multiple Vulnerabilities T-540: Sybase EAServer Multiple Vulnerabilities January 24, 2011 - 6:16am Addthis PROBLEM: Sybase EAServer Multiple Vulnerabilities PLATFORM: Sybase EAServer versions 6.3 and prior ABSTRACT: Sybase EAServer is prone to a security-bypass vulnerability and a directory-traversal vulnerability. Attackers may exploit these issues to execute arbitrary code within the context of the application or to disclose sensitive information. Sybase EAServer versions 6.3 and prior are affected. reference LINKS: Bugtraq ID: 45809 SyBase Advisory IMPACT ASSESSMENT: Medium Discussion: Remote exploitation of a design vulnerability in Sybase EAServer could allow an attacker to install arbitrary web services, this condition can result in arbitrary code execution allowing attacker to gain control over

407

V-131: Adobe Shockwave Player Multiple Vulnerabilities | Department of  

Broader source: Energy.gov (indexed) [DOE]

1: Adobe Shockwave Player Multiple Vulnerabilities 1: Adobe Shockwave Player Multiple Vulnerabilities V-131: Adobe Shockwave Player Multiple Vulnerabilities April 11, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Adobe Shockwave Player PLATFORM: The vulnerabilities are reported in versions 12.0.0.112 and prior ABSTRACT: This update addresses vulnerabilities that could allow an attacker to run malicious code on the affected system REFERENCE LINKS: Secunia Advisory: SA52981 Adobe Security Bulletin CVE-2013-1383 CVE-2013-1384 CVE-2013-1385 CVE-2013-1386 IMPACT ASSESSMENT: High DISCUSSION: This update resolves : 1) A buffer overflow vulnerability that could lead to code execution 2) Memory corruption vulnerabilities that could lead to code execution 3) Memory leakage vulnerability that could be exploited to reduce the

408

V-125: Cisco Connected Grid Network Management System Multiple  

Broader source: Energy.gov (indexed) [DOE]

5: Cisco Connected Grid Network Management System Multiple 5: Cisco Connected Grid Network Management System Multiple Vulnerabilities V-125: Cisco Connected Grid Network Management System Multiple Vulnerabilities April 3, 2013 - 1:44am Addthis PROBLEM: Cisco Connected Grid Network Management System Multiple Vulnerabilities PLATFORM: Cisco Connected Grid Network Management System 2.x ABSTRACT: Some vulnerabilities have been reported in Cisco Connected Grid Network Management System. REFERENCE LINKS: Cisco Security Notice CVE-2013-1163 Cisco Security Notice CVE-2013-1171 Secunia Advisory SA52834 SecurityTracker Alert ID: 1028374 SecurityTracker Alert ID: 1028373 CVE-2013-1163 CVE-2013-1171 IMPACT ASSESSMENT: Medium DISCUSSION: 1) Certain input related to the element list component is not properly sanitised before being returned to the user. This can be exploited to

409

V-122: IBM Tivoli Application Dependency Discovery Manager Java Multiple  

Broader source: Energy.gov (indexed) [DOE]

2: IBM Tivoli Application Dependency Discovery Manager Java 2: IBM Tivoli Application Dependency Discovery Manager Java Multiple Vulnerabilities V-122: IBM Tivoli Application Dependency Discovery Manager Java Multiple Vulnerabilities March 29, 2013 - 6:00am Addthis PROBLEM: IBM has acknowledged multiple vulnerabilities in IBM Tivoli Application Dependency Discovery Manager PLATFORM: The vulnerabilities are reported in version 7.2.0.0 through 7.2.1.3 ABSTRACT: Multiple security vulnerabilities exist in the Java Runtime Environments (JREs) that can affect the security of IBM Tivoli Application Dependency Discovery Manager. REFERENCE LINKS: Secunia Advisory SA52829 IBM Security Bulletin 1631786 CVE-2012-1531 CVE-2012-3143 CVE-2012-3216 CVE-2012-4820 CVE-2012-4822 CVE-2012-5069 CVE-2012-5071 CVE-2012-5073 CVE-2012-5075 CVE-2012-5079

410

V-152: Cisco Unified Customer Voice Portal (CVP) Multiple Vulnerabilities |  

Broader source: Energy.gov (indexed) [DOE]

2: Cisco Unified Customer Voice Portal (CVP) Multiple 2: Cisco Unified Customer Voice Portal (CVP) Multiple Vulnerabilities V-152: Cisco Unified Customer Voice Portal (CVP) Multiple Vulnerabilities May 9, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Cisco Unified Customer Voice Portal (CVP) PLATFORM: The vulnerabilities are reported in versions prior to 9.0.1 ES 11 ABSTRACT: Various components of Cisco Unified CVP are affected. These vulnerabilities can be exploited independently; however, more than one vulnerability could be exploited on the same device. REFERENCE LINKS: Secunia Advisory SA53306 Cisco Advisory ID cisco-sa-20130508-cvp Cisco Applied Mitigation Bulletin CVE-2013-1220 CVE-2013-1221 CVE-2013-1222 CVE-2013-1223 CVE-2013-1224 CVE-2013-1225 IMPACT ASSESSMENT: Medium DISCUSSION:

411

U-187: Adobe Flash Player Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

7: Adobe Flash Player Multiple Vulnerabilities 7: Adobe Flash Player Multiple Vulnerabilities U-187: Adobe Flash Player Multiple Vulnerabilities June 11, 2012 - 7:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Adobe Flash Player PLATFORM: Adobe Flash Player 11.2.202.235 and earlier for Windows, Macintosh and Linux Adobe Flash Player 11.1.115.8 and earlier for Android 4.x Adobe Flash Player 11.1.111.9 and earlier for Android 3.x and 2.x Adobe AIR 3.2.0.2070 and earlier for Windows, Macintosh and Android ABSTRACT: Adobe released security updates for Adobe Flash Player 11.2.202.235 and earlier versions for Windows, Macintosh and Linux, Adobe Flash Player 11.1.115.8 and earlier versions for Android 4.x, and Adobe Flash Player 11.1.111.9 and earlier versions for Android 3.x and 2.x. These updates

412

V-125: Cisco Connected Grid Network Management System Multiple  

Broader source: Energy.gov (indexed) [DOE]

5: Cisco Connected Grid Network Management System Multiple 5: Cisco Connected Grid Network Management System Multiple Vulnerabilities V-125: Cisco Connected Grid Network Management System Multiple Vulnerabilities April 3, 2013 - 1:44am Addthis PROBLEM: Cisco Connected Grid Network Management System Multiple Vulnerabilities PLATFORM: Cisco Connected Grid Network Management System 2.x ABSTRACT: Some vulnerabilities have been reported in Cisco Connected Grid Network Management System. REFERENCE LINKS: Cisco Security Notice CVE-2013-1163 Cisco Security Notice CVE-2013-1171 Secunia Advisory SA52834 SecurityTracker Alert ID: 1028374 SecurityTracker Alert ID: 1028373 CVE-2013-1163 CVE-2013-1171 IMPACT ASSESSMENT: Medium DISCUSSION: 1) Certain input related to the element list component is not properly sanitised before being returned to the user. This can be exploited to

413

U-002:Adobe Photoshop Elements Multiple Memory Corruption Vulnerabilities |  

Broader source: Energy.gov (indexed) [DOE]

02:Adobe Photoshop Elements Multiple Memory Corruption 02:Adobe Photoshop Elements Multiple Memory Corruption Vulnerabilities U-002:Adobe Photoshop Elements Multiple Memory Corruption Vulnerabilities October 4, 2011 - 11:00am Addthis PROBLEM: Adobe Photoshop Elements Multiple Memory Corruption Vulnerabilities. PLATFORM: Adobe Photoshop Elements 8.0 and earlier versions for Windows. ABSTRACT: A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system. reference LINKS: Adobe Advisory: APSA11-03 SecurityTracker Alert ID: 1026132 SecurityFocus: CVE-2011-2443 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Adobe Photoshop Elements. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a specially crafted '.grd' or '.abr' file that,

414

U-179: IBM Java 7 Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

9: IBM Java 7 Multiple Vulnerabilities 9: IBM Java 7 Multiple Vulnerabilities U-179: IBM Java 7 Multiple Vulnerabilities May 30, 2012 - 7:00am Addthis PROBLEM: IBM has acknowledged multiple vulnerabilities in IBM Java PLATFORM: IBM Java 7.x ABSTRACT: Vulnerabilities can be exploited by malicious users to disclose certain information and by malicious people to disclose potentially sensitive information, hijack a user's session, conduct DNS cache poisoning attacks, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system. Reference Links: Secunia Advisory 49333 CVE-2011-3389 Vendor Advisory IMPACT ASSESSMENT: High Discussion: IBM released a patch to address vulerabilities in IBM Java 7. IBM 7 SR1 is available for download. Impact: Hijacking Manipulation of data Exposure of sensitive information

415

T-694: IBM Tivoli Federated Identity Manager Products Multiple  

Broader source: Energy.gov (indexed) [DOE]

4: IBM Tivoli Federated Identity Manager Products Multiple 4: IBM Tivoli Federated Identity Manager Products Multiple Vulnerabilities T-694: IBM Tivoli Federated Identity Manager Products Multiple Vulnerabilities August 16, 2011 - 3:30pm Addthis PROBLEM: Multiple vulnerabilities have been reported in IBM Tivoli Federated Identity Manager and IBM Tivoli Federated Identity Manager Business Gateway, where some have an unknown impact while one can be exploited by malicious people to cause a DoS (Denial of Service). PLATFORM: IBM Tivoli Federated Identity Manager 6.x, IBM Tivoli Federated Identity Manager Business Gateway 6.x ABSTRACT: This Security Alert addresses a serious security issue CVE-2010-4476 (Java Runtime Environment hangs when converting "2.2250738585072012e-308" to a binary floating-point number). This vulnerability might cause the Java

416

Multiple time scale based reduction scheme for nonlinear chemical dynamics  

Science Journals Connector (OSTI)

A chemical reaction is often characterized by multiple time scales governing the kinetics of reactants, products and intermediates. We eliminate the fast relaxing intermediates in autocatalytic reaction by tra...

D. Das; D. S. Ray

2013-07-01T23:59:59.000Z

417

Probabilistic Multiple-Linear Regression Modeling for Tropical Cyclone Intensity  

Science Journals Connector (OSTI)

The authors describe the development and verification of a statistical model relating tropical cyclone intensity to the local large-scale environment. A multiple linear regression framework is used to estimate the expected intensity of a tropical ...

Chia-Ying Lee; Michael K. Tippett; Suzana J. Camargo; Adam H. Sobel

418

The Effects of Multiple Green Factors on Condominium Prices  

Science Journals Connector (OSTI)

This paper analyzes the transaction prices of green buildings assessed on the basis of multiple green factors. Our theoretical model demonstrates that the initial green premium can be negative but becomes positiv...

Jiro Yoshida; Ayako Sugiura

2014-04-01T23:59:59.000Z

419

Development of neutron multiplicity counters for safeguards assay  

SciTech Connect (OSTI)

This paper reports on the development of a new generation of neutron multiplicity counters for assaying impure plutonium. The new counters will be able to obtain three measured parameters from the neutron multiplicity distribution and will be able to determine sample mass, multiplication, and (..cap alpha..,n) reaction rate, making it possible to obtain a more matrix-independent assay of moist or impure materials. This paper describes the existing prototype multiplicity counters and evaluates their performance using assay variance as a figure of merit. The best performance to date is obtained with a high-efficiency, low die-away-time thermal neutron counter with shift-register electronics. 10 refs., 2 figs., 4 tabs.

Ensslin, N.

1989-01-01T23:59:59.000Z

420

Depression during exacerbations in multiple sclerosis: the importance of uncertainty  

E-Print Network [OSTI]

The following correlates of depression were examined in a sample of 166 patients with clinically definite relapsing-remitting (n=140) or secondary progressive (n=26) multiple sclerosis: (a) the present state of the patients' ...

Kroencke, Dawn C.; Denney, Douglas R.; Lynch, Sharon G.

2001-08-01T23:59:59.000Z

Note: This page contains sample records for the topic "wireshark multiple bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Energy and Isotope Dependence of Neutron Multiplicity Distributions  

E-Print Network [OSTI]

Fission neutron multiplicity distributions are known to be well reproduced by simple Gaussian distributions. Many previous evaluations of multiplicity distributions have adjusted the widths of Gaussian distributions to best fit the measured multiplicity distributions Pn. However, many observables do not depend on the detailed shape of Pn, but depend on the first three factorial moments of the distributions. In the present evaluation, the widths of Gaussians are adjusted to fit the measured 2nd and 3rd factorial moments. The relationships between the first three factorial moments are estimated assuming that the widths of the multiplicity distributions are independent of the initial excitation energy of the fissioning system. These simple calculations are in good agreement with experimental neutron induced fission data up to an incoming neutron energy of 10 MeV.

Lestone, J P

2014-01-01T23:59:59.000Z

422

Identification of critical locations across multiple infrastructures for terrorist actions  

E-Print Network [OSTI]

This paper discusses a possible approach to ranking geographic regions that can influence multiple infrastructures. Once ranked, decision makers can determine whether these regions are critical locations based on their ...

Patterson, Sean A. (Sean Albert), 1981-

2005-01-01T23:59:59.000Z

423

Robust Optimization with Multiple Ranges: Theory and Application ...  

E-Print Network [OSTI]

While Metan and Thiele [25] introduces multiple ranges for product demand in a simple two-stage robust ..... the market response to the new product. ...... certainty sets. Technical report, Massachusetts Institute of Technology, Cambridge, MA,.

2010-09-23T23:59:59.000Z

424

Competitive behavior of airlines at multiple airport systems  

E-Print Network [OSTI]

The way passenger traffic is distributed at multiple airport systems continues to intrigue air transportation planners, urban planners, and policy-makers as researchers attempt to unravel how airlines, air travelers and ...

Chen, Edmund

1995-01-01T23:59:59.000Z

425

A simulation environment for multiple project resource optimization  

E-Print Network [OSTI]

This thesis develops a numerical simulation environment as a management support tool applicable to the selection and scheduling of multiple, concurrent research and development projects under conditions of constrained ...

Sharkey, John Patrick, 1954-

2004-01-01T23:59:59.000Z

426

Correspondence Clustering: An Approach to Cluster Multiple Related Spatial Datasets  

E-Print Network [OSTI]

Correspondence Clustering: An Approach to Cluster Multiple Related Spatial Datasets Vadeerat spatial datasets. This capability is important for change analysis and contrast mining. In this paper spatial datasets by maximizing cluster interestingness and correspondence between clusters derived from

Eick, Christoph F.

427

A Bayesian hierarchical method for multiple-event seismic location  

Science Journals Connector (OSTI)

......demonstrate BAYHLoc using the set of Nevada Test Site nuclear explosions, for which...location|multiple-event|Nevada Test Site|seismic|stochastic| INTRODUCTION...The Walter (2004) data set of Nevada Test Site (NTS) explosions (Fig. 2a......

Stephen C. Myers; Gardar Johannesson; William Hanley

2007-12-01T23:59:59.000Z

428

Energy and Isotope Dependence of Neutron Multiplicity Distributions  

E-Print Network [OSTI]

Fission neutron multiplicity distributions are known to be well reproduced by simple Gaussian distributions. Many previous evaluations of multiplicity distributions have adjusted the widths of Gaussian distributions to best fit the measured multiplicity distributions Pn. However, many observables do not depend on the detailed shape of Pn, but depend on the first three factorial moments of the distributions. In the present evaluation, the widths of Gaussians are adjusted to fit the measured 2nd and 3rd factorial moments. The relationships between the first three factorial moments are estimated assuming that the widths of the multiplicity distributions are independent of the initial excitation energy of the fissioning system. These simple calculations are in good agreement with experimental neutron induced fission data up to an incoming neutron energy of 10 MeV.

J. P. Lestone

2014-09-17T23:59:59.000Z

429

Effects of Single versus Multiple Warnings on Driver Performance  

E-Print Network [OSTI]

Objective: To explore how a single master alarm system affects drivers’ responses when compared to multiple, distinct warnings. Background: Advanced driver warning systems are intended to improve safety, yet inappropriate ...

Cummings, M. L.

2007-01-01T23:59:59.000Z

430

Wind Power Forecasting Error Distributions over Multiple Timescales: Preprint  

SciTech Connect (OSTI)

In this paper, we examine the shape of the persistence model error distribution for ten different wind plants in the ERCOT system over multiple timescales. Comparisons are made between the experimental distribution shape and that of the normal distribution.

Hodge, B. M.; Milligan, M.

2011-03-01T23:59:59.000Z

431

Volume Visualization of Multiple Alignment of Large Genomic DNA  

E-Print Network [OSTI]

. Another approach to understanding genetic code is through comparison of genomes, or parts of genomes/conservation between positions (http://www.cryst.bbk.ac.uk/BCD/bcdgloss.html). Figure 1 shows an example of a multiple

Utah, University of

432

An instruction issue mechanism for superscalar processors supporting multiple threads  

E-Print Network [OSTI]

An instruction issue mechanism for superscalar processors supporting multiple threads is presented. This mechanism offers the advantages of two of the most popular dynamic scheduling mechanisms: Tomasulo's algorithm and the Dispatch Stack scheme...

Kumar, Salil

1994-01-01T23:59:59.000Z

433

T-694: IBM Tivoli Federated Identity Manager Products Multiple  

Broader source: Energy.gov (indexed) [DOE]

94: IBM Tivoli Federated Identity Manager Products Multiple 94: IBM Tivoli Federated Identity Manager Products Multiple Vulnerabilities T-694: IBM Tivoli Federated Identity Manager Products Multiple Vulnerabilities August 16, 2011 - 3:30pm Addthis PROBLEM: Multiple vulnerabilities have been reported in IBM Tivoli Federated Identity Manager and IBM Tivoli Federated Identity Manager Business Gateway, where some have an unknown impact while one can be exploited by malicious people to cause a DoS (Denial of Service). PLATFORM: IBM Tivoli Federated Identity Manager 6.x, IBM Tivoli Federated Identity Manager Business Gateway 6.x ABSTRACT: This Security Alert addresses a serious security issue CVE-2010-4476 (Java Runtime Environment hangs when converting "2.2250738585072012e-308" to a binary floating-point number). This vulnerability might cause the Java

434

V-145: IBM Tivoli Federated Identity Manager Products Java Multiple  

Broader source: Energy.gov (indexed) [DOE]

5: IBM Tivoli Federated Identity Manager Products Java Multiple 5: IBM Tivoli Federated Identity Manager Products Java Multiple Vulnerabilities V-145: IBM Tivoli Federated Identity Manager Products Java Multiple Vulnerabilities April 30, 2013 - 12:09am Addthis PROBLEM: IBM Tivoli Federated Identity Manager Products Java Multiple Vulnerabilities PLATFORM: IBM Tivoli Federated Identity Manager versions 6.1, 6.2.0, 6.2.1, and 6.2.2. IBM Tivoli Federated Identity Manager Business Gateway versions 6.1.1, 6.2.0, 6.2.1 and 6.2.2. ABSTRACT: IBM has acknowledged a weakness and two vulnerabilities in IBM Tivoli Federated Identity Manager and IBM Tivoli Federated Identity Manager Business Gateway REFERENCE LINKS: IBM Reference #:1634544 Secunia Advisory SA53233 CVE-2013-0169 CVE-2013-0440 CVE-2013-0443 IMPACT ASSESSMENT: Medium DISCUSSION: CVE-2013-0440 - Unspecified vulnerability in IBM Java

435

Multiple Motivations Institutional Change Principle | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Multiple Motivations Institutional Change Principle Multiple Motivations Institutional Change Principle Multiple Motivations Institutional Change Principle October 8, 2013 - 11:02am Addthis The multiple motivations principle suggests that a portfolio approach-rather than a single strategy-may be required to achieve change. Research demonstrates that people and institutions adopt new behaviors for many reasons. They likely need more than one reason for changing their current behavior. Therefore, people may shift to more sustainable, energy-efficient behaviors in the workplace because those actions are part of the agency's mission, lower costs, make work life easier or healthier, and are the "right thing to do." Methods Because individuals have different motivations, a variety of approaches should be used to change behavior. Such approaches can range widely, from

436

Lenalidomide plus Dexamethasone for High-Risk Smoldering Multiple Myeloma  

Science Journals Connector (OSTI)

...with lenalidomide, in patients with high-risk smoldering multiple myeloma significantly delayed the time to progression to symptomatic disease and resulted in an overall survival benefit. The orally administered treatment regimen was associated with an acceptable toxicity profile. Certain clinical features predict progression from smoldering to overt multiple myeloma. Patients with high-risk features who were treated with lenalidomide and dexamethasone were less likely to have disease progression and had a higher rate of survival than untreated patients.

Mateos M.-V.; Hernández M.-T.; Giraldo P.

2013-08-01T23:59:59.000Z

437

Jaloro': A New Multiple Virus Resistant Hot Yellow Jalapeno Pepper.  

E-Print Network [OSTI]

, with four replications, separated by Duncan's Multiple Range Test, 5% level. 2 Pungency rating: 10 = super hot,S = mild, 1 = nonpungent. Table 7. Comparative performance test of 'Jaloro' compared with other jalapenos, spring 1990, TAES-Weslaco, Texas..., with four replications, separated by Duncan's Multiple Range Test, 5% level. 2 Pungency rating: 10 = super hot,S = mild, 1 = nonpungent. Table 7. Comparative performance test of 'Jaloro' compared with other jalapenos, spring 1990, TAES-Weslaco, Texas...

Villalon, Benigno

1992-01-01T23:59:59.000Z

438

Analysis of Wind Power and Load Data at Multiple Time Scales  

E-Print Network [OSTI]

Analysis of Wind Power and Load Data at Multiple Time ScalesAnalysis of Wind Power and Load Data at Multiple Time ScalesAnalysis of Wind Power and Load Data at Multiple Time Scales

Coughlin, Katie

2011-01-01T23:59:59.000Z

439

Analysis of Wind Power and Load Data at Multiple Time Scales  

E-Print Network [OSTI]

2007. Analysis of Wind Power and Load Data at Multiple Timesd- Analysis of Wind Power and Load Data at Multiple Time35   v Analysis of Wind Power and Load Data at Multiple Time

Coughlin, Katie

2011-01-01T23:59:59.000Z

440

T-528: Mozilla Firefox/Thunderbird/SeaMonkey Multiple HTML Injection...  

Broader source: Energy.gov (indexed) [DOE]

28: Mozilla FirefoxThunderbirdSeaMonkey Multiple HTML Injection Vulnerabilities T-528: Mozilla FirefoxThunderbirdSeaMonkey Multiple HTML Injection Vulnerabilities January 5,...

Note: This page contains sample records for the topic "wireshark multiple bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Combining frequency and time domain approaches to systems with multiple spike train input and output  

E-Print Network [OSTI]

between neuronal spike trains. Prog Biophys Mol Biol Vapnikto systems with multiple spike train input and output D. R.Keywords Multiple spike trains · Neural coding · Maximum

Brillinger, D. R.; Lindsay, K. A.; Rosenberg, J. R.

2009-01-01T23:59:59.000Z

442

V-099: Honeywell Multiple Products ActiveX Control Remote Code...  

Broader source: Energy.gov (indexed) [DOE]

9: Honeywell Multiple Products ActiveX Control Remote Code Execution Vulnerability V-099: Honeywell Multiple Products ActiveX Control Remote Code Execution Vulnerability February...

443

V-083: Oracle Java Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

3: Oracle Java Multiple Vulnerabilities 3: Oracle Java Multiple Vulnerabilities V-083: Oracle Java Multiple Vulnerabilities February 4, 2013 - 12:42am Addthis PROBLEM: Oracle Java Multiple Vulnerabilities PLATFORM: Oracle Java JDK 1.5.x / 5.x Oracle Java JDK 1.7.x / 7.x Oracle Java JRE 1.7.x / 7.x Oracle Java SDK 1.4.x / 4.x Sun Java JDK 1.4.x Sun Java JDK 1.6.x / 6.x Sun Java JRE 1.4.x / 4.x Sun Java JRE 1.5.x / 5.x Sun Java JRE 1.6.x / 6.x ABSTRACT: A Critical Patch Update is a collection of patches for multiple security vulnerabilities. The Critical Patch Update for Java SE also includes non-security fixes. Critical Patch Updates are cumulative and each advisory describes only the security fixes added since the previous Critical Patch Update and Security Alert. REFERENCE LINKS: Oracle Security Advisory February 2013

444

V-083: Oracle Java Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

3: Oracle Java Multiple Vulnerabilities 3: Oracle Java Multiple Vulnerabilities V-083: Oracle Java Multiple Vulnerabilities February 4, 2013 - 12:42am Addthis PROBLEM: Oracle Java Multiple Vulnerabilities PLATFORM: Oracle Java JDK 1.5.x / 5.x Oracle Java JDK 1.7.x / 7.x Oracle Java JRE 1.7.x / 7.x Oracle Java SDK 1.4.x / 4.x Sun Java JDK 1.4.x Sun Java JDK 1.6.x / 6.x Sun Java JRE 1.4.x / 4.x Sun Java JRE 1.5.x / 5.x Sun Java JRE 1.6.x / 6.x ABSTRACT: A Critical Patch Update is a collection of patches for multiple security vulnerabilities. The Critical Patch Update for Java SE also includes non-security fixes. Critical Patch Updates are cumulative and each advisory describes only the security fixes added since the previous Critical Patch Update and Security Alert. REFERENCE LINKS: Oracle Security Advisory February 2013

445

V-051: Oracle Solaris Java Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

1: Oracle Solaris Java Multiple Vulnerabilities 1: Oracle Solaris Java Multiple Vulnerabilities V-051: Oracle Solaris Java Multiple Vulnerabilities December 20, 2012 - 12:15am Addthis PROBLEM: Oracle Solaris Java Multiple Vulnerabilities PLATFORM: Oracle Solaris 11.x ABSTRACT: Oracle has acknowledged multiple vulnerabilities in Java included in Solaris REFERENCE LINKS: Secunia Advisory: SA51618 Secunia Advisory: SA50949 Third Party Vulnerability Resolution Blog in Java 7U9 Third Party Vulnerability Resolution Blog in Java 6U37 CVE-2012-1531 CVE-2012-1532 CVE-2012-1533 CVE-2012-3143 CVE-2012-3159 CVE-2012-3216 CVE-2012-4416 CVE-2012-5067 CVE-2012-5068 CVE-2012-5069 CVE-2012-5070 CVE-2012-5071 CVE-2012-5072 CVE-2012-5073 CVE-2012-5074 CVE-2012-5075 CVE-2012-5076 CVE-2012-5077 CVE-2012-5079 CVE-2012-5081 CVE-2012-5083 CVE-2012-5084

446

JC3 Low Impact Assessment Bulletins | Department of Energy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Low Impact Low Impact Assessment Bulletins JC3 Low Impact Assessment Bulletins RSS July 31, 2013 V-207: Wireshark Multiple Denial of Service Vulnerabilities Successful exploitation of this vulnerability may allow execution of arbitrary code. July 30, 2013 V-206: Apache HTTP Server mod_rewrite and "httpOnly" Cookie Disclosure Vulnerabilities Two vulnerabilities have been reported in Apache HTTP Server July 29, 2013 V-205: IBM Tivoli System Automation for Multiplatforms Java Multiple Vulnerabilities The weakness and the vulnerabilities are caused due to a bundled vulnerable version of Java. November 30, 2011 U-048: HP LaserJet Printers Unspecified Flaw Lets Remote Users Update Firmware with Arbitrary Code A remote user can upgrade the printer's firmware with arbitrary code

447

CHOS in Production - Multiple Linux Environments on PDSF at NERSC  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

CHOS CHOS in Production Multiple Linux Environments on PDSF at NERSC Larry Pezzaglia National Energy Research Scientific Computing Center Lawrence Berkeley National Laboratory April 2012 A commodity Linux cluster at NERSC serving HEP and NS projects 1GbE and 10GbE interconnect In continuous operation since 1996 ~1500 compute cores on ~200 nodes Over 750 TB shared GPFS storage in 17 filesystems Over 650 TB of XRootD storage Supports SL5 and SL6 environments Projects "buy in" to PDSF and the UGE share tree is adjusted accordingly PDSF at NERSC 2 PDSF has a broad user base (including non-CERN and non-LHC projects) Current projects include ALICE, ATLAS, CUORE, Daya Bay, IceCube, KamLAND, Majorana, and STAR Prior projects include BaBaR, CDF, Planck, SNO, and SNFactory PDSF Workloads 3 PDSF must support multiple applications for multiple projects Many are only tested

448

Chesapeake Bay Preservation Programs (Multiple States) | Department of  

Broader source: Energy.gov (indexed) [DOE]

Chesapeake Bay Preservation Programs (Multiple States) Chesapeake Bay Preservation Programs (Multiple States) Chesapeake Bay Preservation Programs (Multiple States) < Back Eligibility Agricultural Commercial Construction Developer Fed. Government Fuel Distributor General Public/Consumer Industrial Installer/Contractor Institutional Investor-Owned Utility Local Government Low-Income Residential Multi-Family Residential Municipal/Public Utility Nonprofit Residential Retail Supplier Rural Electric Cooperative Schools State/Provincial Govt Systems Integrator Transportation Tribal Government Utility Savings Category Alternative Fuel Vehicles Hydrogen & Fuel Cells Buying & Making Electricity Water Home Weatherization Solar Wind Program Info State Maryland Program Type Siting and Permitting Provider Chesapeake Bay Program The Chesapeake Bay Program is a unique regional partnership that has led

449

Multiple Ruptures For Long Valley Microearthquakes- A Link To Volcanic  

Open Energy Info (EERE)

Multiple Ruptures For Long Valley Microearthquakes- A Link To Volcanic Multiple Ruptures For Long Valley Microearthquakes- A Link To Volcanic Tremor(Question) Jump to: navigation, search GEOTHERMAL ENERGYGeothermal Home Journal Article: Multiple Ruptures For Long Valley Microearthquakes- A Link To Volcanic Tremor(Question) Details Activities (1) Areas (1) Regions (0) Abstract: Despite several episodes of ground deformation and intense seismic activity starting in 1978, the Long Valley, California, volcanic area has not produced clearly recognized volcanic tremor. Instead, a variety of atypical microearthquakes have been recorded during these episodes, including events dominated by low-frequency (long-period) or mixed high and low-frequency (hybrid) signals. During a 1997 episode, a number of unusual microearthquakes occurred within a temporary 40-station

450

New England Power Pool (Multiple States) | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

England Power Pool (Multiple States) England Power Pool (Multiple States) New England Power Pool (Multiple States) < Back Eligibility Developer Savings Category Alternative Fuel Vehicles Hydrogen & Fuel Cells Buying & Making Electricity Water Home Weatherization Solar Wind Program Info State Maine Program Type Interconnection Independent System Operator (ISO) New England helps protect the health of New England's economy and the well-being of its people by ensuring the constant availability of electricity, today and for future generations. ISO New England meets this obligation in three ways: by ensuring the day-to-day reliable operation of New England's bulk power generation and transmission system, by overseeing and ensuring the fair administration of the region's wholesale electricity markets, and by managing comprehensive, regional

451

T-657: Drupal Prepopulate - Multiple vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

7: Drupal Prepopulate - Multiple vulnerabilities 7: Drupal Prepopulate - Multiple vulnerabilities T-657: Drupal Prepopulate - Multiple vulnerabilities June 29, 2011 - 3:34pm Addthis PROBLEM: Prepopulate module enables pre-populating forms in Drupal using the $_REQUEST vairable. PLATFORM: Prepopulate module for Drupal 6.x versions prior to 6.x-2.2 ABSTRACT: The module does not adequately validate user input leading to an cross-site scripting (XSS) possibility in certain circumstances. reference LINKS: Advisory ID: DRUPAL-SA-CONTRIB-2011-023 Prepopulate module Prepopulate 6.x-2.2 Update IMPACT ASSESSMENT: High Discussion: The Prepopulate module enables pre-populating forms in Drupal using the $_REQUEST vairable. The module does not adequately validate user input leading to an cross-site scripting (XSS) possibility in certain circumstances. Users privileged to

452

North American Renewables Registry (Multiple States) | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

American Renewables Registry (Multiple States) American Renewables Registry (Multiple States) North American Renewables Registry (Multiple States) < Back Eligibility Developer Savings Category Alternative Fuel Vehicles Hydrogen & Fuel Cells Buying & Making Electricity Water Home Weatherization Solar Wind Program Info State North Carolina Program Type Green Power Purchasing Provider APX The North American Renewables Registry (NAR) provides a Web-based platform trusted to create, track, and manage renewable energy certificate (REC) origination for clean generation facilities and states not covered by one of the existing APX-powered, regional systems. All market participants are able to take advantage of a trusted infrastructure to help manage their role in the market. With the ability to create unique, serialized records

453

Interstate Oil and Gas Conservation Compact (Multiple States) | Department  

Broader source: Energy.gov (indexed) [DOE]

Interstate Oil and Gas Conservation Compact (Multiple States) Interstate Oil and Gas Conservation Compact (Multiple States) Interstate Oil and Gas Conservation Compact (Multiple States) < Back Eligibility Commercial Developer Industrial Investor-Owned Utility Municipal/Public Utility Utility Program Info State Alabama Program Type Environmental Regulations Provider Interstate Oil and Gas Compact Commission The Interstate Oil and Gas Compact Commission assists member states efficiently maximize oil and natural gas resources through sound regulatory practices while protecting the nation's health, safety and the environment. The Commission serves as the collective voice of member governors on oil and gas issues and advocates states' rights to govern petroleum resources within their borders. The Commission formed the Geological CO2 Sequestration Task Force, which

454

Midwest Renewable Energy Tracking System (Multiple States) | Department of  

Broader source: Energy.gov (indexed) [DOE]

Renewable Energy Tracking System (Multiple States) Renewable Energy Tracking System (Multiple States) Midwest Renewable Energy Tracking System (Multiple States) < Back Eligibility Developer Savings Category Alternative Fuel Vehicles Hydrogen & Fuel Cells Buying & Making Electricity Water Home Weatherization Solar Wind Program Info State Illinois Program Type Green Power Purchasing Provider MidWest ISO The Midwest Renewable Energy Tracking System (M-RETS®) tracks renewable energy generation in participating States and Provinces and assists in verifying compliance with individual state/provincial or voluntary Renewable Portfolio Standards (RPS) and objectives. M-RETS® is a tool to keep track of all relevant information about renewable energy produced and delivered in the region. Currently, several States and Provinces participate in M-RETS®: Illinois,

455

Sabine River Compact (Multiple States) | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Sabine River Compact (Multiple States) Sabine River Compact (Multiple States) Sabine River Compact (Multiple States) < Back Eligibility Utility Fed. Government Commercial Agricultural Investor-Owned Utility State/Provincial Govt Industrial Construction Municipal/Public Utility Local Government Residential Installer/Contractor Rural Electric Cooperative Tribal Government Low-Income Residential Schools Retail Supplier Institutional Multi-Family Residential Systems Integrator Fuel Distributor Nonprofit General Public/Consumer Transportation Savings Category Water Buying & Making Electricity Home Weatherization Program Info State Texas Program Type Siting and Permitting Provider Sabine River Compact Commission The Sabine River Compact Commission administers the Sabine River Compact to ensure that Texas receives its equitable share of quality water from the

456

V-205: IBM Tivoli System Automation for Multiplatforms Java Multiple  

Broader source: Energy.gov (indexed) [DOE]

V-205: IBM Tivoli System Automation for Multiplatforms Java V-205: IBM Tivoli System Automation for Multiplatforms Java Multiple Vulnerabilities V-205: IBM Tivoli System Automation for Multiplatforms Java Multiple Vulnerabilities July 29, 2013 - 4:20am Addthis PROBLEM: IBM has acknowledged a weakness and multiple vulnerabilities in IBM Tivoli System Automation for Multiplatforms, which can be exploited by malicious, local users to disclose certain sensitive information and gain escalated privileges and by malicious people to disclose certain sensitive information, manipulate certain data, bypass certain security restrictions, cause a DoS (Denial of Service), and compromise a vulnerable system. PLATFORM: The weakness and the vulnerabilities are reported in versions 3.1 through 3.2.2 running on AIX, Linux, Solaris, and Windows.

457

V-178: IBM Data Studio Web Console Java Multiple Vulnerabilities |  

Broader source: Energy.gov (indexed) [DOE]

8: IBM Data Studio Web Console Java Multiple Vulnerabilities 8: IBM Data Studio Web Console Java Multiple Vulnerabilities V-178: IBM Data Studio Web Console Java Multiple Vulnerabilities June 14, 2013 - 6:00am Addthis PROBLEM: IBM has acknowledged a weakness and two vulnerabilities in IBM Data Studio PLATFORM: IBM Data Studio 3.x ABSTRACT: IBM Data Studio Web Console uses the IBM Java Runtime Environment (JRE) and might be affected by vulnerabilities in the IBM JRE REFERENCE LINKS: Secunia Advisory SA53778 IBM Flash Alert 1640533 CVE-2013-0169 CVE-2013-0440 CVE-2013-0443 IMPACT ASSESSMENT: High DISCUSSION: An unspecified vulnerability within the JSSE component could allow: 1) A remote attacker to cause a denial of service 2) To statistically observe the time necessary to generate/receive error messages and deduce the plaintext after a relatively small number of

458

Tunable Multiple Layered Dirac Cones in Optical Lattices  

SciTech Connect (OSTI)

We show that multiple layered Dirac cones can emerge in the band structure of properly addressed multicomponent cold fermionic gases in optical lattices. The layered Dirac cones contain multiple copies of massless spin-1/2 Dirac fermions at the same location in momentum space, whose different Fermi velocity can be tuned at will. On-site microwave Raman transitions can further be used to mix the different Dirac species, resulting in either splitting of or preserving the Dirac point (depending on the symmetry of the on-site term). The tunability of the multiple layered Dirac cones allows us to simulate a number of fundamental phenomena in modern physics, such as neutrino oscillations and exotic particle dispersions with E{approx}p{sup N} for arbitrary integer N.

Lan, Z.; Lu, W.; Oehberg, P. [SUPA, Department of Physics, Heriot-Watt University, EH14 4AS, Edinburgh (United Kingdom); Celi, A. [ICFO - Institute of Photonic Sciences Av. Carl Friedrich Gauss, num. 3, E-08860 Castelldefels, Barcelona (Spain); Lewenstein, M. [ICFO - The Institute of Photonic Sciences Av. Carl Friedrich Gauss, num. 3, E-08860 Castelldefels, Barcelona (Spain); ICREA-Institucio Catalana de Recerca i Estudis Avancats, 08010 Barcelona (Spain)

2011-12-16T23:59:59.000Z

459

Multiple X-ray reflection from ionized slabs  

E-Print Network [OSTI]

Multiple reflection of X-rays may be important when an accretion disc and its hot corona have a complicated geometry, or if returning radiation due to gravitational light bending is important, or in emission from a funnel such as proposed in some gamma-ray burst models. We simulate the effects of multiple reflection by modifying the boundary condition for an X-ray illuminated slab. Multiple reflection makes the soft X-ray spectrum steeper (softer) and strengthens broad emission and absorption features, especially the K-shell features of iron. This may be important in explaining the spectra of sources such as the Narrow-Line Seyfert 1 galaxy 1H0707-495.

R. R. Ross; A. C. Fabian; D. R. Ballantyne

2002-06-11T23:59:59.000Z

460

Multiple mobile robots system with network-based subsumption architecture  

Science Journals Connector (OSTI)

In this paper, a unique multiple mobile robots system is proposed to enable engineering students and engineers in the field to efficiently learn subsumption architecture and develop swarm intelligence. The subsumption architecture is known as one of the behaviour-based artificial intelligence. Each of multiple mobile robots within the system has three wheels driven by DC motors and six position sensitive detector (PSD) sensors. Network-based subsumption architecture is considered to realise a schooling behaviour by using only information from the PSD sensors. Further, a server supervisory control is introduced for poor hardware platforms with limitations of software development, i.e., the mobile robots can only behave based on the most simply subdivided reaction behaviours, i.e., reflex actions, generated from agents. Experimental results show interesting behaviour among the multiple mobile robots, such as following, avoidance and schooling.

Fusaomi Nagata; Akimasa Otsuka; Keigo Watanabe; Maki K. Habib

2013-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "wireshark multiple bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Effect of multiple scattering on Cerenkov radiation from energetic electrons  

SciTech Connect (OSTI)

Cerenkov radiation can be used as a diagnostic tool to study energetic electrons generated in ultra-intense laser matter interactions. However, electrons suffer scattering with nuclei as they move in a medium. In this article, we theoretically study the effect of multiple scattering on Cerenkov radiation, and obtain analytical formulas under some circumstances. The results show that when the speed of an energetic electron is not close to the light speed in the medium, Cerenkov radiation is just slightly decreased due to multiple scattering. In the case that the electron speed is very close to the light speed in the medium, the effect of multiple scattering becomes significant, and the radiation is dominated by bremsstrahlung.

Zheng Jian [CAS Key Laboratory of Basic Plasma Physics and Department of Modern Physics, University of Science and Technology of China, Hefei, Anhui 230026 (China)

2013-01-15T23:59:59.000Z

462

Dynamic force spectroscopy on multiple bonds: experiments and model  

E-Print Network [OSTI]

We probe the dynamic strength of multiple biotin-streptavidin adhesion bonds under linear loading using the biomembrane force probe setup for dynamic force spectroscopy. Measured rupture force histograms are compared to results from a master equation model for the stochastic dynamics of bond rupture under load. This allows us to extract the distribution of the number of initially closed bonds. We also extract the molecular parameters of the adhesion bonds, in good agreement with earlier results from single bond experiments. Our analysis shows that the peaks in the measured histograms are not simple multiples of the single bond values, but follow from a superposition procedure which generates different peak positions.

T. Erdmann; S. Pierrat; P. Nassoy; U. S. Schwarz

2007-12-18T23:59:59.000Z

463

RECORD OF CATEGORICAL EXCLUSION DETERMINATION Project ID No. Multiple  

Broader source: Energy.gov (indexed) [DOE]

Multiple Multiple Title: Third Party Services for SPR Workovers Description: Subcontractor shall furnish all labor, supervision, tools, materials, equipment, supplies, transportation and facilities required to perform remediation workovers of SPR cavern wellbores and brine disposal wells. Typical remediation workovers include cementing a steel liner inside existing cased wellbore, and permanently plugging and abandoning wells. Regulatory Requirements: NEPA Implementing Procedures (10 CFR 1021) 10 CFR 1021.410 (Application of Categorical Exclusions) (a) The actions listed in Appendices A and B of Subpart D are classes of actions that DOE has determined do not individually or cumulatively have a significant effect on the human environment ( categorical exclusions).

464

JC3 Bulletin Archive | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

14, 2012 V-047: IBM Lotus Foundation Multiple Cross Site Scripting Two vulnerabilities have been reported in IBM Lotus Foundations. December 13, 2012 V-046: Adobe Flash Player Bugs...

465

U-200: Red Hat Directory Server Information Disclosure Security...  

Broader source: Energy.gov (indexed) [DOE]

Passwords to Remote Authenticated and Local Users V-041: Red Hat CloudForms Multiple Vulnerabilities T-712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update...

466

V-165: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote...  

Office of Environmental Management (EM)

T-551: Cisco Security Advisory: Multiple Cisco WebEx Player Vulnerabilities U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs U-239:...

467

Influence of Multiple Scattering on High-energy Deuteron Quasi-optical Birefringence Effect  

E-Print Network [OSTI]

Influence of multiple scattering on high-energy deuteron quasi-optical birefringence effect is discussed.

V. G. Baryshevsky; A. R. Shyrvel

2011-01-12T23:59:59.000Z

468

T-626: Xen Multiple Buffer Overflow and Integer Overflow Vulnerabilities |  

Broader source: Energy.gov (indexed) [DOE]

6: Xen Multiple Buffer Overflow and Integer Overflow 6: Xen Multiple Buffer Overflow and Integer Overflow Vulnerabilities T-626: Xen Multiple Buffer Overflow and Integer Overflow Vulnerabilities May 19, 2011 - 3:05pm Addthis PROBLEM: Xen Multiple Buffer Overflow and Integer Overflow Vulnerabilities PLATFORM: XenSource Xen 3.3.1, XenSource Xen 3.3, XenSource Xen 3.2, XenSource Xen 3.1.2, XenSource Xen 3.1.1, XenSource Xen 3.0.3, XenSource Xen 4.0, XenSource Xen 3.0, RedHat Enterprise Linux Virtualization 5 server, RedHat Enterprise Linux Desktop Multi OS 5 client ,RedHat Enterprise Linux 5 server, Red Hat Fedora 15 ,and Red Hat Enterprise Linux Desktop 5 client ABSTRACT: It was found that the xc_try_bzip2_decode() and xc_try_lzma_decode() decode routines did not correctly check for a possible buffer size overflow in the

469

Acceleration of the matrix multiplication of Radiance three phase  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Acceleration of the matrix multiplication of Radiance three phase Acceleration of the matrix multiplication of Radiance three phase daylighting simulations with parallel computing on heterogeneous hardware of personal computer Title Acceleration of the matrix multiplication of Radiance three phase daylighting simulations with parallel computing on heterogeneous hardware of personal computer Publication Type Journal Article LBNL Report Number LBNL-6461E Year of Publication 2013 Authors Zuo, Wangda, Andrew McNeil, Michael Wetter, and Eleanor S. Lee Journal Journal of Building Performance Simulation Keywords daylighting simulation, graphics processing unit, multicore central processing unit, OpenCL, parallel computing Abstract Building designers are increasingly relying on complex fenestration systems to reduce energy consumed for lighting and HVAC in low energy buildings. Radiance, a lighting simulation program, has been used to conduct daylighting simulations for complex fenestration systems. Depending on the configurations, the simulation can take hours or even days using a personal computer. This paper describes how to accelerate the matrix multiplication portion of a Radiance three-phase daylight simulation by conducting parallel computing on heterogeneous hardware of a personal computer. The algorithm was optimized and the computational part was implemented in parallel using OpenCL. The speed of new approach was evaluated using various daylighting simulation cases on a multicore central processing unit and a graphics processing unit. Based on the measurements and analysis of the time usage for the Radiance daylighting simulation, further speedups can be achieved by using fast I/O devices and storing the data in a binary format.

470

SIC (MUltiple SIgnal Classification) CSP (Cross-power Spectrum Phase)  

E-Print Network [OSTI]

2ch CSP ( ) 1 MU- SIC (MUltiple SIgnal Classification) CSP (Cross- power Spectrum Phase) [1, 2, 3, 4] [5, 6] [7, 8, 9, 10] [7] CSP CSP [8] [9] CSP [10] Estimation of talker's head orientation based (Kobe univ.) [11] 2ch CSP CSP CSP CSP 2 CSP GCC-PHAT (Generalized Cross- Correlation PHAse Transform

Takiguchi, Tetsuya

471

RESEARCH PAPER RACK1 mediates multiple hormone responsiveness and  

E-Print Network [OSTI]

RESEARCH PAPER RACK1 mediates multiple hormone responsiveness and developmental processes China Received 26 January 2006; Accepted 20 April 2006 Abstract The scaffold protein RACK1 (Receptor. The Arabidopsis ge- nome contains three RACK1 orthologues, however, little is known about their functions

Jones, Alan M.

472

MULTIPLE CLASSIFIERS FOR ELECTRONIC NOSE DATA M. Pardo, G. Sberveglieri  

E-Print Network [OSTI]

of two groups of coffees (blends and monovarieties). The main idea of boosting is to produce a sequence for combining the predictions of multiple classifiers (briefly called ensembles) to produce a single classifier Certified Espresso (ICE)) and of 6 single varieties (SV) plus the ICE. The food manufacturing sector is one

Masulli, Francesco

473

Multiple Non-Thermal Reaction Steps for the Photooxidation CO...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Non-Thermal Reaction Steps for the Photooxidation CO to CO2 on Reduced TiO2(110). Multiple Non-Thermal Reaction Steps for the Photooxidation CO to CO2 on Reduced TiO2(110)....

474

MODELING COUNT DATA FROM MULTIPLE SENSORS: A BUILDING OCCUPANCY MODEL  

E-Print Network [OSTI]

MODELING COUNT DATA FROM MULTIPLE SENSORS: A BUILDING OCCUPANCY MODEL Jon Hutchins, Alexander Ihler a probabilistic model for predict- ing the occupancy of a building using networks of people-counting sensors-sensor probabilistic model for building occupancy. Inference for the oc- cupancy model follows in Section 4

Smyth, Padhraic

475

MODELING COUNT DATA FROM MULTIPLE SENSORS: A BUILDING OCCUPANCY MODEL  

E-Print Network [OSTI]

MODELING COUNT DATA FROM MULTIPLE SENSORS: A BUILDING OCCUPANCY MODEL Jon Hutchins, Alexander Ihler a probabilistic model for predict­ ing the occupancy of a building using networks of people­counting sensors­sensor probabilistic model for building occupancy. Inference for the oc­ cupancy model follows in Section 4

Ihler, Alexander

476

Instability of single-phase natural circulation under multiple loops  

SciTech Connect (OSTI)

Natural circulation loop passively conveys heat from heat sources to heat sinks without mechanical pump. Various plants have natural circulation systems, e.g., solar heaters, Light Water Reactor (LWR) and Liquid Metal Fast Breeder Reactor (LMFBR). The core of LMFBR is cooled by forced convection of single-phase liquid sodium in normal operation. After the accident, the decay heat of the core is designed to be cooled by the natural circulation of the liquid sodium. The natural circulation cooling is very important from a viewpoint of passive safety concept. Here, the natural circulation in single loop system had been studied by many researchers. In a multiple loop system, the instability of natural circulation was more complicated because of the interaction between the loops. In this study, the effects of the multiple loop on the natural circulation instability were investigated numerically. The multiple loops system with one heating tube and two cooling tubes were evaluated. The one-dimensional energy and momentum equations were solved using Finite Difference Method. The flow regimes of the instability were evaluated with varying the heat flux. In multiple loop system, the observed flow was classified into five regimes including chaotic regime. The flow regimes were qualitatively explained by the stability of the attractor in the phase space.

Satoh, A.; Okamoto, K.; Madarame, H. [Univ. of Tokyo, Tokai, Ibaraki (Japan). Nuclear Engineering Research Lab.

1996-08-01T23:59:59.000Z

477

Distributed event notification in VANET with multiple service providers  

Science Journals Connector (OSTI)

Many future applications in vehicular networks will be event-driven and will require events generated at different parts of a city to be delivered to moving vehicles in time. We propose a distributed framework for efficient event dissemination with multiple ... Keywords: VANET, distributed event notification, publish-subscribe

Joy Chandra Mukherjee, Saurabh Agarwal, Arobinda Gupta

2014-05-01T23:59:59.000Z

478

Evaluating Energy Efficiency of Floating Point Matrix Multiplication on FPGAs  

E-Print Network [OSTI]

Evaluating Energy Efficiency of Floating Point Matrix Multiplication on FPGAs Kiran Kumar Matam, prasanna}@usc.edu Abstract--Energy efficiency has emerged as one of the key performance metrics in scientific computing. In this work, we evaluate the energy efficiency of floating point matrix multipli

Prasanna, Viktor K.

479

Boredom and Distraction in Multiple Unmanned Vehicle Supervisory Control  

Science Journals Connector (OSTI)

......Officers' Training Corps experience...unmanned vehicle operating environments...multiple personnel responsible...impact of training on boredom...domains, personnel selection is of practical...personnel selection considerations...stimulate personnel, such as...on-the-job training or possibly......

M.L. Cummings; C. Mastracchio; K.M. Thornburg; A. Mkrtchyan

2013-01-01T23:59:59.000Z

480

Tunnel junction multiple wavelength light-emitting diodes  

DOE Patents [OSTI]

A multiple wavelength LED having a monolithic cascade cell structure comprising at least two p-n junctions, wherein each of said at least two p-n junctions have substantially different band gaps, and electrical connector means by which said at least two p-n junctions may be collectively energized; and wherein said diode comprises a tunnel junction or interconnect. 5 figs.

Olson, J.M.; Kurtz, S.R.

1992-11-24T23:59:59.000Z

Note: This page contains sample records for the topic "wireshark multiple bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Multiple Sequence Alignments of Partially Coding Nucleic Acid Sequences  

E-Print Network [OSTI]

Multiple Sequence Alignments of Partially Coding Nucleic Acid Sequences Roman R. Stocsits1 , Ivo L Fe Institute, 1399 Hyde Park Rd., Santa Fe NM 87501, USA Email: Roman R. Stocsits - roman of the available sequence data was pre- sented very recently [12]. SARGLSSTVSLGQFEHWSPR NARNLSDTVS

Stadler, Peter F.

482

Fast Machine Code for Modular Multiplication Michael Scott  

E-Print Network [OSTI]

Fast Machine Code for Modular Multiplication Michael Scott School of Computer Applications Dublin, that is the calculation of a = b e mod n where for acceptable levels of security a, b, e, and n are large multiprecision will be not much larger than the number of bits in the binary representation of e. Therefore fast modular

Bernstein, Daniel

483

Predicting Operator Capacity for Supervisory Control of Multiple UAVs  

E-Print Network [OSTI]

Predicting Operator Capacity for Supervisory Control of Multiple UAVs M.L. Cummings, C. E. Nehme, J, uninhabited (also known as unmanned) ae- rial vehicles (UAVs) have become indispensable assets to militarized forces. UAVs require human guidance to varying degrees and often through several operators. However

Cummings, Mary "Missy"

484

Cooperative Vision Based Estimation and Tracking Using Multiple UAVs  

E-Print Network [OSTI]

Cooperative Vision Based Estimation and Tracking Using Multiple UAVs Brett Bethke, Mario Valenti. Unmanned aerial vehicles (UAVs) are excellent platforms for detecting and tracking objects of interest to give better results than could be achieved with a single UAV, while being robust to failures. In addi

How, Jonathan P.

485

Multiple Field of View MR Fluoroscopy Pelin Aksit,1  

E-Print Network [OSTI]

Multiple Field of View MR Fluoroscopy Pelin Aksit,1 J. Andrew Derbyshire,2 Jean-Michel Serfaty,1 by several investigators (1� 8). Intravascular MR compares favorably with other clini- cal diagnostic methods and Ergin Atalar1* This work describes a real-time imaging and visualization tech- nique that allows

Atalar, Ergin

486

Coordination of multiple appendages in drag-based swimming  

Science Journals Connector (OSTI)

...appendages for multi-oared propulsion. The typical Reynolds number...another example of drag-based propulsion with multiple appendages...of Bill Peterson, Hatfield Marine Center, Newport, OR...of a body with drag-based propulsion. The model provides a quantitative...

2010-01-01T23:59:59.000Z

487

Non-Adaptive Complex Group Testing with Multiple Positive Sets  

E-Print Network [OSTI]

Non-Adaptive Complex Group Testing with Multiple Positive Sets Francis Y.L. Chin, Henry C.M. Leung Given n items with at most d of them having a particular property (referred as positive items), a test-adaptive group testing problem is to design how to group the items to minimize the number of tests required

Chin, Francis Y.L.

488

Demo Abstract: MARVEL: Multiple Antenna based Relative Vehicle Localizer  

E-Print Network [OSTI]

to install especially on existing vehicles and exhibit a tradeoff between accuracy and cost. Similarly, usingDemo Abstract: MARVEL: Multiple Antenna based Relative Vehicle Localizer Dong Li , Tarun Bansal , Zhixue Lu and Prasun Sinha Department of Computer Science and Engineering The Ohio State University

Sinha, Prasun

489

Method and system of integrating information from multiple sources  

DOE Patents [OSTI]

A system and method of integrating information from multiple sources in a document centric application system. A plurality of application systems are connected through an object request broker to a central repository. The information may then be posted on a webpage. An example of an implementation of the method and system is an online procurement system.

Alford, Francine A. (Livermore, CA); Brinkerhoff, David L. (Antioch, CA)

2006-08-15T23:59:59.000Z

490

Multiple copy distillation and purification of phase diffused squeezed states  

E-Print Network [OSTI]

We provide a detailed theoretical analysis of multiple copy purification and distillation protocols for phase diffused squeezed states of light. The standard iterative distillation protocol is generalized to a collective purification of an arbitrary number of N copies. We also derive a semi-analytical expression for the asymptotic limit of the iterative distillation and purification protocol and discuss its properties.

Petr Marek; Jaromir Fiurasek; Boris Hage; Alexander Franzen; James DiGugliemo; Roman Schnabel

2007-08-10T23:59:59.000Z

491

Quantitative crystal structure descriptors from multiplicative congruential generators  

Science Journals Connector (OSTI)

Certain number-theoretic relations, known as multiplicative congruential generators, are developed into quantitative crystal structure descriptors, facilitating a linearization procedure that eventually allows for a concise, fully reconstructable representation of structural information. Potential applications are related to the computational storage, retrieval and analysis of crystal structures, their algorithmic generation in the first place, and their combinatorial enumeration and classification.

Hornfeck, W.

2012-01-12T23:59:59.000Z

492

Multiple Whole Genome Alignments Without a Reference Organism  

SciTech Connect (OSTI)

Multiple sequence alignments have become one of the most commonly used resources in genomics research. Most algorithms for multiple alignment of whole genomes rely either on a reference genome, against which all of the other sequences are laid out, or require a one-to-one mapping between the nucleotides of the genomes, preventing the alignment of recently duplicated regions. Both approaches have drawbacks for whole-genome comparisons. In this paper we present a novel symmetric alignment algorithm. The resulting alignments not only represent all of the genomes equally well, but also include all relevant duplications that occurred since the divergence from the last common ancestor. Our algorithm, implemented as a part of the VISTA Genome Pipeline (VGP), was used to align seven vertebrate and sixDrosophila genomes. The resulting whole-genome alignments demonstrate a higher sensitivity and specificity than the pairwise alignments previously available through the VGP and have higher exon alignment accuracy than comparable public whole-genome alignments. Of the multiple alignment methods tested, ours performed the best at aligning genes from multigene families?perhaps the most challenging test for whole-genome alignments. Our whole-genome multiple alignments are available through the VISTA Browser at http://genome.lbl.gov/vista/index.shtml.

Dubchak, Inna; Poliakov, Alexander; Kislyuk, Andrey; Brudno, Michael

2009-01-16T23:59:59.000Z

493

Robust Retrospective Multiple Change-point for Multivariate Data  

E-Print Network [OSTI]

on a test statistic that generalizes the well- known Kruskal-Wallis procedure to the multivariate setting noise levels and/or high-dimensional data. Keywords: Change-point estimation, multivariate data, Kruskal-Wallis as to deal with multiple change-points (in analogy with the way the classical Kruskal-Wallis test generalizes

Paris-Sud XI, Université de

494

Anatomy of High-Performance Many-Threaded Matrix Multiplication  

Science Journals Connector (OSTI)

BLIS is a new framework for rapid instantiation of the BLAS. We describe how BLIS extends the "GotoBLAS approach" to implementing matrix multiplication (GEMM). While GEMM was previously implemented as three loops around an inner kernel, BLIS exposes ... Keywords: linear algebra, libraries, high-performance, matrix, BLAS, multicore

Tyler M. Smith, Robert van de Geijn, Mikhail Smelyanskiy, Jeff R. Hammond, Field G. Van Zee

2014-05-01T23:59:59.000Z

495

A simple model of multiple climate regimes Kerry Emanuel  

E-Print Network [OSTI]

, and Climate, Massachusetts Institute of Technology, Cambridge, Massachusetts, USA Received 28 June 2001 to a roughly 30% increase in solar insolation over the life of the planet. To this enigma may be added to produce multiple equilibrium states for the same solar forcing. Here we present a simple model

Emanuel, Kerry A.

496

Climate determinism revisited: multiple equilibria in a complex climate model  

E-Print Network [OSTI]

Marshall and Brian Rose Department of Earth, Atmospheric and Planetary Science, Massachusetts Institute of Technology, Cambridge, Massachusetts June 17th, 2010 Submitted to Journal of Climate Corresponding author by incoming solar radiation at the top of the atmosphere. We demonstrate that the multiple equilibria owe

Marshall, John

497

Computationally Efficient Winding Loss Calculation with Multiple Windings, Arbitrary  

E-Print Network [OSTI]

windings occurs at the level of individual turns, the method could be applied, but its advantages are lessComputationally Efficient Winding Loss Calculation with Multiple Windings, Arbitrary Waveforms and Two- or Three-Dimensional Field Geometry C. R. Sullivan From IEEE Transactions on Power Electronics

498

Extending wordnets by learning from multiple resources Benot Sagot+  

E-Print Network [OSTI]

Extending wordnets by learning from multiple resources Benoît Sagot+ , Darja Fiser* + Alpage, INRIA In this paper we present an automatic, language-independent approach to extend an existing wordnet by recycling existing freely available bilingual resources, such as machine-readable dictionaries and on

Paris-Sud XI, Université de

499

A TEMPORAL MODEL FOR PITCH MULTIPLICITY AND TONAL CONSONANCE  

E-Print Network [OSTI]

A TEMPORAL MODEL FOR PITCH MULTIPLICITY AND TONAL CONSONANCE Peter Cariani Eaton Peabody Laboratory@epl.meei.harvard.edu; www.cariani.com ABSTRACT One aspect of tonal consonance relevant to the pitch stability of chords and harmonic tension concerns the degree to which a collection of notes produces a unified, strong low pitch

Cariani, Peter

500

Social Choice Theory Decision Models with Multiple Criteria  

E-Print Network [OSTI]

Social Choice Theory Decision Models with Multiple Criteria Elise Bonzon 2013-2014 LIPADE / 39 Social Choice Theory #12;Social choice theory Social choice theory Research of a mechanism Choice Theory #12;Social choice theory Social choice theory Research of a mechanism (electoral system

Bonzon, Elise