National Library of Energy BETA

Sample records for heap overflow lets

  1. V-134: Cisco AnyConnect Secure Mobility Client Heap Overflow Lets Local

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Users Gain Elevated Privileges | Department of Energy 4: Cisco AnyConnect Secure Mobility Client Heap Overflow Lets Local Users Gain Elevated Privileges V-134: Cisco AnyConnect Secure Mobility Client Heap Overflow Lets Local Users Gain Elevated Privileges April 15, 2013 - 1:30am Addthis PROBLEM: Cisco AnyConnect Secure Mobility Client Heap Overflow Lets Local Users Gain Elevated Privileges PLATFORM: Cisco AnyConnect Secure Mobility Client Cisco Secure Desktop ABSTRACT: Some vulnerabilities

  2. V-134: Cisco AnyConnect Secure Mobility Client Heap Overflow...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    4: Cisco AnyConnect Secure Mobility Client Heap Overflow Lets Local Users Gain Elevated Privileges V-134: Cisco AnyConnect Secure Mobility Client Heap Overflow Lets Local Users ...

  3. V-093: Symantec PGP Desktop Buffer Overflows Let Local Users...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Secure Mobility Client Heap Overflow Lets Local Users Gain Elevated Privileges V-066: Adobe AcrobatReader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users...

  4. T-545: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets Remote Users

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Execute Arbitrary Code | Department of Energy 5: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets Remote Users Execute Arbitrary Code T-545: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets Remote Users Execute Arbitrary Code January 28, 2011 - 7:21am Addthis PROBLEM: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets Remote Users Execute Arbitrary Code. PLATFORM: RealPlayer 14.0.1 and prior versions ABSTRACT: A vulnerability was reported in RealPlayer. A remote user can

  5. U-056: Linux Kernel HFS Buffer Overflow Lets Local Users Gain...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    6: Linux Kernel HFS Buffer Overflow Lets Local Users Gain Root Privileges U-056: Linux Kernel HFS Buffer Overflow Lets Local Users Gain Root Privileges December 9, 2011 - 8:00am...

  6. T-583: Linux Kernel OSF Partition Table Buffer Overflow Lets Local Users Obtain Information

    Energy.gov [DOE]

    A local user can create a storage device with specially crafted OSF partition tables. When the kernel automatically evaluates the partition tables, a buffer overflow may occur and data from kernel heap space may leak to user-space.

  7. T-695: Avaya Aura Application Server Buffer Overflow in 'cstore.exe' Lets Remote Users Execute Arbitrary Code

    Energy.gov [DOE]

    Avaya Aura Application Server Buffer Overflow in 'cstore.exe' Lets Remote Users Execute Arbitrary Code.

  8. V-049: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Execute Arbitrary Code | Department of Energy 9: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users Execute Arbitrary Code V-049: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users Execute Arbitrary Code December 18, 2012 - 1:30am Addthis PROBLEM: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users Execute Arbitrary Code PLATFORM: Windows RealPlayer 15.0.6.14 and prior. ABSTRACT: Two vulnerabilities were reported in RealPlayer. REFERENCE

  9. V-049: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    V-049: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users Execute ... The vendor has issued a fix (16.0.0.282). Addthis Related Articles V-228: RealPlayer ...

  10. V-228: RealPlayer Buffer Overflow and Memory Corruption Error Let Remote

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Users Execute Arbitrary Code | Department of Energy 8: RealPlayer Buffer Overflow and Memory Corruption Error Let Remote Users Execute Arbitrary Code V-228: RealPlayer Buffer Overflow and Memory Corruption Error Let Remote Users Execute Arbitrary Code August 27, 2013 - 6:00am Addthis PROBLEM: Two vulnerabilities were reported in RealPlayer PLATFORM: RealPlayer 16.0.2.32 and prior ABSTRACT: A remote user can cause arbitrary code to be executed on the target user's system REFERENCE LINKS:

  11. U-080: Linux Kernel XFS Heap Overflow May Let Remote Users Execute Arbitrary Code

    Energy.gov [DOE]

    A vulnerability was reported in the Linux Kernel. A remote user can cause arbitrary code to be executed on the target user's system.

  12. T-664: Apache Santuario Buffer Overflow Lets Remote Users Deny Service

    Energy.gov [DOE]

    A buffer overflow exists when creating or verifying XML signatures with RSA keys of sizes on the order of 8192 or more bits. This typically results in a crash and denial of service in applications that verify signatures using keys that could be supplied by an attacker.

  13. Colton Heaps | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Colton Heaps About Us Colton Heaps - Project Leader at NREL Colton Heaps Colton Heaps is a project leader at NREL specializing in renewable energy project development, energy ...

  14. T-567: Linux Kernel Buffer Overflow in ldm_frag_add() May Let Local Users Gain Elevated Privileges

    Energy.gov [DOE]

    A vulnerability was reported in the Linux Kernel. A local user may be able to obtain elevated privileges on the target system. A physically local user can connect a storage device with a specially crafted LDM partition table to trigger a buffer overflow in the ldm_frag_add() function in 'fs/partitions/ldm.c' and potentially execute arbitrary code with elevated privileges.

  15. V-228: RealPlayer Buffer Overflow and Memory Corruption Error...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    V-228: RealPlayer Buffer Overflow and Memory Corruption Error Let Remote Users Execute ... Lets Remote Users Execute Arbitrary Code V-049: RealPlayer Buffer Overflow and Invalid ...

  16. U-115: Novell GroupWise Client Address Book Processing Buffer Overflow Vulnerability

    Energy.gov [DOE]

    The vulnerability is caused due to an error when processing Novell Address Book (".nab") files and can be exploited to cause a heap-based buffer overflow via an overly long email address.

  17. T-548: Novell ZENworks Handheld Management (ZHM) ZfHIPCnd.exe buffer overflow

    Energy.gov [DOE]

    Novell ZENworks Handheld Management (ZHM) is vulnerable to a heap-based buffer overflow, caused by improper bounds checking by the ZfHIPCnd.exe Access Point process. By sending a specially-crafted request to TCP port 2400, a remote attacker could overflow a buffer and execute arbitrary code on the system with SYSTEM privileges or cause the application to crash.

  18. U-154: IBM Rational ClearQuest ActiveX Control Buffer Overflow...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code U-126: Cisco Adaptive Security Appliances Port Forwarder ActiveX Control Buffer Overflow ...

  19. Nuclear reactor overflow line

    DOEpatents

    Severson, Wayne J.

    1976-01-01

    The overflow line for the reactor vessel of a liquid-metal-cooled nuclear reactor includes means for establishing and maintaining a continuous bleed flow of coolant amounting to 5 to 10% of the total coolant flow through the overflow line to prevent thermal shock to the overflow line when the reactor is restarted following a trip. Preferably a tube is disposed concentrically just inside the overflow line extending from a point just inside the reactor vessel to an overflow tank and a suction line is provided opening into the body of liquid metal in the reactor vessel and into the annulus between the overflow line and the inner tube.

  20. U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic...

    Office of Environmental Management (EM)

    59: RSA BSAFE SSL-C Lets Remote Users Decrypt SSLTLS Traffic and SSL Buffer Overflow Lets Remote Users Execute Arbitrary Code U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL...

  1. U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Buffer Overflow Lets Remote Users Execute Arbitrary Code | Department of Energy 59: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL Buffer Overflow Lets Remote Users Execute Arbitrary Code U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL Buffer Overflow Lets Remote Users Execute Arbitrary Code September 13, 2012 - 6:00am Addthis PROBLEM: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL Buffer Overflow Lets Remote Users Execute

  2. U-048: HP LaserJet Printers Unspecified Flaw Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    T-699: EMC AutoStart Buffer Overflows Let Remote Users Execute Arbitrary Code U-049: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users Inject Commands on the Target System...

  3. T-562: Novell ZENworks Configuration Management novell-tftp.exe Buffer Overflow

    Energy.gov [DOE]

    A vulnerability has been reported in Novell ZENworks Configuration Management, which can be exploited by malicious people to compromise a vulnerable system. The vulnerability is caused due to a boundary error in novell-tftp.exe when parsing requests. This can be exploited to cause a heap-based buffer overflow via a specially crafted request sent to UDP port 69. The vulnerability is reported in versions 10.3.1, 10.3.2, and 11.0.

  4. Overflow control valve

    DOEpatents

    Hundal, Rolv; Kessinger, Boyd A.; Parlak, Edward A.

    1984-07-24

    An overflow control valve for use in a liquid sodium coolant pump tank which valve can be extended to create a seal with the pump tank wall or retracted to break the seal thereby accommodating valve removal. An actuating shaft which controls valve disc position also has cams which bear on roller surfaces to force retraction of a sliding cylinder against spring tension to retract the cylinder from sealing contact with the pump tank.

  5. T-626: Xen Multiple Buffer Overflow and Integer Overflow Vulnerabilities

    Energy.gov [DOE]

    It was found that the xc_try_bzip2_decode() and xc_try_lzma_decode() decode routines did not correctly check for a possible buffer size overflow in the decoding loop. As well, several integer overflow flaws and missing error/range checking were found that could lead to an infinite loop. A privileged guest user could use these flaws to crash the guest or, possibly, execute arbitrary code in the privileged management domain (Dom0). (CVE-2011-1583)

  6. V-182: Symantec Endpoint Protection Manager Buffer Overflow Vulnerabil...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    2: Symantec Endpoint Protection Manager Buffer Overflow Vulnerability V-182: Symantec Endpoint Protection Manager Buffer Overflow Vulnerability June 20, 2013 - 6:00am Addthis...

  7. T-545: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    A remote user can cause arbitrary code to be executed on the target user's system. reference LINKS: Security Tracker Alert CVE-2010-4393 IMPACT ASSESSMENT: Medium Discussion: A ...

  8. Power-law connections: From Zipf to Heaps and beyond

    SciTech Connect

    Eliazar, Iddo I.; Cohen, Morrel H.

    2013-05-15

    In this paper we explore the asymptotic statistics of a general model of rank distributions in the large-ensemble limit; the construction of the general model is motivated by recent empirical studies of rank distributions. Applying Lorenzian, oligarchic, and Heapsian asymptotic analyses we establish a comprehensive set of closed-form results linking together rank distributions, probability distributions, oligarchy sizes, and innovation rates. In particular, the general results reveal the fundamental underlying connections between Zipfs law, Paretos law, and Heaps lawthree elemental empirical power-laws that are ubiquitously observed in the sciences. -- Highlights: ? The large-ensemble asymptotic statistics of rank distributions are explored. ? Lorenzian, oligarchic, and Heapsian asymptotic analyses are applied. ? Associated oligarchy sizes and induced innovation rates are analyzed. ? General elemental statistical connections are established. ? The underlying connections between Zipfs, Paretos and Heaps laws are unveiled.

  9. V-074: IBM Informix Genero libpng Integer Overflow Vulnerability |

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Department of Energy 74: IBM Informix Genero libpng Integer Overflow Vulnerability V-074: IBM Informix Genero libpng Integer Overflow Vulnerability January 22, 2013 - 12:11am Addthis PROBLEM: IBM Informix Genero libpng Integer Overflow Vulnerability PLATFORM: IBM Informix Genero releases prior to 2.41 - all platforms ABSTRACT: A vulnerability has been reported in libpng. REFERENCE LINKS: IBM Security Bulletin: 1620982 Secunia Advisory SA51905 Secunia Advisory SA48026 CVE-2011-3026 IMPACT

  10. V-182: Symantec Endpoint Protection Manager Buffer Overflow Vulnerability

    Energy.gov [DOE]

    Symantec was notified of a pre-authentication buffer overflow found in the Symantec Endpoint Protection Manager (SEPM) and Symantec Endpoint Protection Center (SPC)

  11. Event heap: a coordination infrastructure for dynamic heterogeneous application interactions in ubiquitous computing environments

    DOEpatents

    Johanson, Bradley E.; Fox, Armando; Winograd, Terry A.; Hanrahan, Patrick M.

    2010-04-20

    An efficient and adaptive middleware infrastructure called the Event Heap system dynamically coordinates application interactions and communications in a ubiquitous computing environment, e.g., an interactive workspace, having heterogeneous software applications running on various machines and devices across different platforms. Applications exchange events via the Event Heap. Each event is characterized by a set of unordered, named fields. Events are routed by matching certain attributes in the fields. The source and target versions of each field are automatically set when an event is posted or used as a template. The Event Heap system implements a unique combination of features, both intrinsic to tuplespaces and specific to the Event Heap, including content based addressing, support for routing patterns, standard routing fields, limited data persistence, query persistence/registration, transparent communication, self-description, flexible typing, logical/physical centralization, portable client API, at most once per source first-in-first-out ordering, and modular restartability.

  12. U-236: Microsoft JScript and VBScript Engine Integer Overflow Lets Remote Users Execute Arbitrary Code

    Energy.gov [DOE]

    Execution of arbitrary code via network A remote user can cause arbitrary code to be executed on the target

  13. Urban runoff and combined sewer overflow. [Wastewater treatment

    SciTech Connect

    Moffa, P.E.; Freedman, S.D.; Owens, E.M.; Field, R.; Cibik, C.

    1982-06-01

    The control, treatment and management of urban runoff and sewer overflow are reviewed. Simplified modeling and monitoring techniques are used to characterize urban runoff and to assess control alternatives. (KRM)

  14. V-219: Kingsoft Writer 2012 WPS Font Names Buffer Overflow Vulnerabili...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    9: Kingsoft Writer 2012 WPS Font Names Buffer Overflow Vulnerability V-219: Kingsoft Writer 2012 WPS Font Names Buffer Overflow Vulnerability August 16, 2013 - 5:52am Addthis...

  15. U-128: VMware ESX/ESXi Buffer Overflow and Null Pointer Dereference Lets Local Users Gain Elevated Privileges

    Energy.gov [DOE]

    A vulnerability was reported in VMware ESX. A local user can obtain elevated privileges on the target system.

  16. U-177: Lotus Quickr for Domino ActiveX Control Buffer Overflow Lets Remote Users Execute Arbitrary Code

    Energy.gov [DOE]

    A vulnerability was reported in Lotus Quickr for Domino. A remote user can cause arbitrary code to be executed on the target user's system.

  17. V-114: RealPlayer MP4 Processing Buffer Overflow Vulnerability | Department

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    of Energy 14: RealPlayer MP4 Processing Buffer Overflow Vulnerability V-114: RealPlayer MP4 Processing Buffer Overflow Vulnerability March 19, 2013 - 12:01am Addthis PROBLEM: RealPlayer MP4 Processing Buffer Overflow Vulnerability PLATFORM: Versions prior to 16.0.1.18. ABSTRACT: A vulnerability has been reported in RealPlayer REFERENCE LINKS: RealNetworks, Inc Secunia Advisory SA52692 CVE-2013-1750 IMPACT ASSESSMENT: High DISCUSSION: The vulnerability is caused due to an error when

  18. V-086: IntegraXor ActiveX Control Buffer Overflow Vulnerability

    Energy.gov [DOE]

    The vulnerability is caused due to an error in the PE3DO32A.ocx ActiveX control and can be exploited to cause a buffer overflow.

  19. Spotlight on Austin, Texas: Let Your Contractor Be Your Guide...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Let Your Contractor Be Your Guide for Big Rewards Spotlight on Austin, Texas: Let Your Contractor Be Your Guide for Big Rewards Spotlight on Austin, Texas: Let Your Contractor Be ...

  20. T-728: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    8: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let Remote Users Conduct Bypass Attacks T-728: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let Remote Users Conduct...

  1. V-202: Cisco Video Surveillance Manager Bugs Let Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Video Surveillance Manager Bugs Let Remote Users Obtain Potentially Sensitive Information V-202: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain Potentially Sensitive...

  2. V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Apache VCL Input Validation Flaw Lets Remote Authenticated Users Gain Elevated Privileges V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated Users Gain Elevated...

  3. V-155: Apache Tomcat FORM Authenticator Lets Remote Users Conduct...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    5: Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks V-155: Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks...

  4. V-220: Juniper Security Threat Response Manager Lets Remote Authentica...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Threat Response Manager Lets Remote Authenticated Users Execute Arbitrary Commands V-220: Juniper Security Threat Response Manager Lets Remote Authenticated Users Execute...

  5. V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    6: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code June...

  6. U-047: Siemens Automation License Manager Bugs Let Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    7: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or...

  7. V-149: Microsoft Internet Explorer Object Access Bug Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    9: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code V-149: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary...

  8. U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    2: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code September 18, 2012 -...

  9. T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    AJP Protocol Processing Bug Lets Remote Users Bypass Authentication or Obtain Information T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass Authentication...

  10. T-663: Cisco Content Services Gateway ICMP Processing Flaw Lets...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    3: Cisco Content Services Gateway ICMP Processing Flaw Lets Remote Users Deny Service T-663: Cisco Content Services Gateway ICMP Processing Flaw Lets Remote Users Deny Service July...

  11. Defining a Possible Low LET Bystander Effect

    SciTech Connect

    Charles R. Geard

    2009-05-04

    Current radiation protection guidelines assume a linear response to ionizing radiations down through doses where epidemiological studies provide very limited to no information as to the propriety of such assumptions. The bystander response is a non-targeted effect which might impact such guidelines. These studies while clearly affirming a bystander response for high LET radiations, do not provide such affirmation for environmentally relevant low dose, low LET radiations. Caution and further study are necessary before making judgements that could impact on current standards.

  12. T-527: OpenSC Smart Card Serial Number Multiple Buffer Overflow Vulnerabilities

    Energy.gov [DOE]

    OpenSC is prone to multiple buffer-overflow vulnerabilities because the application fails to perform adequate boundary checks on user-supplied input. Attackers may leverage these issues to execute arbitrary code in the context of the application. Failed attacks will cause denial-of-service conditions.

  13. V-218: HP Service Manager Unspecified Flaw Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    U-010:HP Onboard Administrator Unspecified Flaw Lets Remote Users Gain Access U-029: TCPIP Services for OpenVMS POPIMAP Service Bug Lets Remote Users Gain Unauthorized Access...

  14. V-127: Samba Bug Lets Remote Authenticated Users Modify Files...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    7: Samba Bug Lets Remote Authenticated Users Modify Files V-127: Samba Bug Lets Remote Authenticated Users Modify Files April 5, 2013 - 6:00am Addthis PROBLEM: A vulnerability was...

  15. INFOGRAPHIC: Let's Get to Work on Solar Soft Costs | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Let's Get to Work on Solar Soft Costs INFOGRAPHIC: Let's Get to Work on Solar Soft Costs December 2, 2013 - 1:00pm Addthis Learn how soft costs are contributing to the price of ...

  16. U-010:HP Onboard Administrator Unspecified Flaw Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    0:HP Onboard Administrator Unspecified Flaw Lets Remote Users Gain Access U-010:HP Onboard Administrator Unspecified Flaw Lets Remote Users Gain Access October 13, 2011 - 8:15am...

  17. T-574: Google Chrome Multiple Flaws Let Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    4: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code T-574: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code March 10, 2011 - 3:05pm Addthis...

  18. T-660: OpenSSH on FreeBSD Has Buffer Overflow in pam_thread() That Lets Remote Users Execute Arbitrary Code

    Energy.gov [DOE]

    The module does not adequately validate user input leading to an cross-site scripting (XSS) possibility in certain circumstances.

  19. U-277: Google Chrome Multiple Flaws Let Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 22.0.1229.92 ABSTRACT: Several vulnerabilities were...

  20. T-556: BMC PATROL Agent Service Daemon stack-based buffer overflow

    Energy.gov [DOE]

    Stack-based buffer overflow in BMC PATROL Agent Service Daemon for in Performance Analysis for Servers, Performance Assurance for Servers, and Performance Assurance for Virtual Servers 7.4.00 through 7.5.10; Performance Analyzer and Performance Predictor for Servers 7.4.00 through 7.5.10; and Capacity Management Essentials 1.2.00 (7.4.15) allows remote attackers to execute arbitrary code via a crafted length value in a BGS_MULTIPLE_READS command to TCP port 6768.

  1. Task QA plan for Modified Prototypic Hydragard{trademark} Sampler Overflow System Demonstration at TNX

    SciTech Connect

    Snyder, T.K.

    1993-10-04

    The primary objective of this task is to evaluate the proposed design modifications to the sample system, including the adequacy of the recommended eductor and the quality of samples obtained from the modified system. Presently, the sample streams are circulated from the originating tank, through a Hydragard{trademark} sampler system, and back to the originating tank. The overflow from the Hydragard{trademark} sampler flows to the Recycle Collection Tank (RCT). This report outlines the planned quality assurance controls for the design modification task, including organization and personnel, surveillances, and records package.

  2. Gene conversion in yeast as a function of linear energy transfer (LET) for low-LET radiation

    SciTech Connect

    Unrau, P.; Morrison, D.P. ); Johnson, J.R. . Chalk River Nuclear Labs.)

    1992-05-01

    The relative biological effectiveness (RBE) for low-LET radiation is known to depend on such factors as LET and dose rate. Microdosimetric calculations indicate that the biological target size could also be an important parameter, and calculations predict that the RBE for effects produced by hits in target sizes below about 100 nm should be unity for all low LET radiation. We have measured that RBE for gene conversion in yeast (a small target) for five different low LET photon sources, and the results were consistent with an RBE of unity, which agrees with microdosimetric predictions. 4 refs.

  3. V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload...

    Energy Saver

    Users Upload Files and Let Remote Users Conduct Cross-Site Scripting Attacks V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and Let Remote Users ...

  4. U-242: Linux Kernel Netlink SCM_CREDENTIALS Processing Flaw Lets...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    2: Linux Kernel Netlink SCMCREDENTIALS Processing Flaw Lets Local Users Gain Elevated Privileges U-242: Linux Kernel Netlink SCMCREDENTIALS Processing Flaw Lets Local Users Gain...

  5. T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    7:Microsoft Windows SSLTLS Protocol Flaw Lets Remote Users Decryption Sessions T-727:Microsoft Windows SSLTLS Protocol Flaw Lets Remote Users Decryption Sessions September 27, ...

  6. V-156: Linux Kernel Array Bounds Checking Flaw Lets Local Users...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    6: Linux Kernel Array Bounds Checking Flaw Lets Local Users Gain Elevated Privileges V-156: Linux Kernel Array Bounds Checking Flaw Lets Local Users Gain Elevated Privileges May...

  7. V-195: RSA Authentication Manager Lets Local Users View the Administra...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    5: RSA Authentication Manager Lets Local Users View the Administrative Account Password V-195: RSA Authentication Manager Lets Local Users View the Administrative Account Password...

  8. V-172: ISC BIND RUNTIME_CHECK Error Lets Remote Users Deny Service...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    ISC BIND RUNTIMECHECK Error Lets Remote Users Deny Service Against Recursive Resolvers V-172: ISC BIND RUNTIMECHECK Error Lets Remote Users Deny Service Against Recursive...

  9. U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    79: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code ...

  10. U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    9: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass...

  11. U-005: Apache mod_proxy Pattern Matching Bug Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    5: Apache modproxy Pattern Matching Bug Lets Remote Users Access Internal Servers U-005: Apache modproxy Pattern Matching Bug Lets Remote Users Access Internal Servers October 6,...

  12. U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    2: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks U-142: HP Onboard Administrator Bugs Let Remote Users Gain...

  13. U-046: Apache mod_proxy/mod_rewrite Bug Lets Remote Users Access...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    6: Apache modproxymodrewrite Bug Lets Remote Users Access Internal Servers U-046: Apache modproxymodrewrite Bug Lets Remote Users Access Internal Servers November 28, 2011 -...

  14. U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    1: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain...

  15. U-049: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    LaserJet Printers Unspecified Flaw Lets Remote Users Update Firmware with Arbitrary Code U-053: Linux kexec Bugs Let Local and Remote Users Obtain Potentially Sensitive Information

  16. Solar Decathlon 2015: Let the Competition Begin | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Let the Competition Begin Solar Decathlon 2015: Let the Competition Begin February 13, 2014 - 1:00pm Addthis The Solar Decathlon competition has provided more than 17,000 college students with the training and hands-on experience. This video highlights how the competition is shaping the careers of the students involved and making sustainable home design popular. | Video by Matty Greene, Energy Department. Richard King Richard King Director, Solar Decathlon Solar Decathlon 2015 Team Facts: This

  17. New equipment let researchers simulate industrial materials processing |

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    The Ames Laboratory New equipment let researchers simulate industrial materials processing Researchers at Iowa State University and Ames Laboratory have a new tool to help understand and fine-tune the processing of materials in a variety of commercial techniques. The Gleeble 3800 thermomechanical system was purchased by Iowa State University and recently installed in Ames Laboratory's Metals Development building. It lets researchers precisely control and measure what happens to materials

  18. T-703: Cisco Unified Communications Manager Open Query Interface Lets

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Remote Users Obtain Database Contents | Department of Energy 703: Cisco Unified Communications Manager Open Query Interface Lets Remote Users Obtain Database Contents T-703: Cisco Unified Communications Manager Open Query Interface Lets Remote Users Obtain Database Contents August 26, 2011 - 3:45pm Addthis PROBLEM: A vulnerability was reported in Cisco Unified Communications Manager. A remote user can obtain database contents PLATFORM: Cisco Unified Communications Manager 6.x, 7.x, 8.0, 8.5

  19. Shrinking the trash heap

    SciTech Connect

    Gillis, A.M.

    1992-02-01

    This article evaluates uses of composted solid wastes. Uses are described for agriculture, horticulture, silviculture, for soil amendments and for land reclamation projects. Researchers are exploring problems related to the availability and toxicity of metals in the compost and the effects of these metals in the food supply. Consumer acceptance has been the major drawback to successful marketing of the product.

  20. T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass Authentication or Obtain Information

    Energy.gov [DOE]

    Apache Tomcat AJP protocol processing bug lets remote users bypass authentication or obtain information.

  1. V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Let Remote Users Conduct Cross-Site Scripting Attacks | Department of Energy 51: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and Let Remote Users Conduct Cross-Site Scripting Attacks V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and Let Remote Users Conduct Cross-Site Scripting Attacks May 8, 2013 - 12:06am Addthis PROBLEM: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and Let Remote Users Conduct Cross-Site Scripting Attacks

  2. Influence of carrier overflow on the forward-voltage characteristics of InGaN-based light-emitting diodes

    SciTech Connect

    Han, Dong-Pyo; Kim, Hyunsung; Shim, Jong-In; Shin, Dong-Soo; Kim, Kyu-Sang

    2014-11-10

    We investigate the influence of carrier overflow on the forward-voltage characteristics of the InGaN-based blue light-emitting-diode (LED) by comparing the temperature-dependent characteristics of the electroluminescence (EL) efficiency, the EL spectra, and the current-voltage relation over a wide range of temperature (50–300 K). Based on these experimental results, we demonstrate that the simple ohmic potential drop in the Shockley diode equation is not sufficient to explain the experimental data when the severe carrier overflow to the p-(Al)GaN layer induces the efficiency droop in the LED device. The anomalous relation between current and voltage at cryogenic temperatures is explained by the space-charge-limited current formed by the overflown electrons, rather than by the increase of a constant series resistance in the p-(Al)GaN layer.

  3. T-559: Stack-based buffer overflow in oninit in IBM Informix Dynamic Server (IDS) 11.50 allows remote execution

    Energy.gov [DOE]

    Stack-based buffer overflow in oninit in IBM Informix Dynamic Server (IDS) 11.50 allows remote execution attackers to execute arbitrary code via crafted arguments in the USELASTCOMMITTED session environment option in a SQL SET ENVIRONMENT statement

  4. A directed-overflow and damage-control N -glycosidase in riboflavin biosynthesis

    SciTech Connect

    Frelin, Océane; Huang, Lili; Hasnain, Ghulam; Jeffryes, James G.; Ziemak, Michael J.; Rocca, James R.; Wang, Bing; Rice, Jennifer; Roje, Sanja; Yurgel, Svetlana N.; Gregory, Jesse F.; Edison, Arthur S.; Henry, Christopher  S.; de Crécy-Lagard, Valérie; Hanson, Andrew D.

    2015-02-15

    Plants and bacteria synthesize the essential human micronutrient riboflavin (vitamin B2) via the same multistep pathway. The early intermediates of this pathway are notoriously reactive, and may be overproduced in vivo because riboflavin biosynthesis enzymes lack feedback controls. Here we demonstrate disposal of riboflavin intermediates by COG3236 (DUF1768), a protein of previously unknown function that is fused to two different riboflavin pathway enzymes in plants and bacteria (RIBR and RibA, respectively). We present cheminformatic, biochemical, genetic, and genomic evidence to show that: (i) plant and bacterial COG3236 proteins cleave the N-glycosidic bond of the first two intermediates of riboflavin biosynthesis, yielding relatively innocuous products; (ii) certain COG3236 proteins are in a multienzyme riboflavin biosynthesis complex that gives them privileged access to riboflavin intermediates; and (iii) COG3236 action in Arabidopsis thaliana and Escherichia coli helps maintain flavin levels. We find COG3236 proteins thus illustrate two emerging principles in chemical biology: directed overflow metabolism, in which excess flux is diverted out of a pathway, and the pre-emption of damage from reactive metabolites.

  5. A directed-overflow and damage-control N -glycosidase in riboflavin biosynthesis

    DOE PAGES [OSTI]

    Frelin, Océane; Huang, Lili; Hasnain, Ghulam; Jeffryes, James G.; Ziemak, Michael J.; Rocca, James R.; Wang, Bing; Rice, Jennifer; Roje, Sanja; Yurgel, Svetlana N.; et al

    2015-02-15

    Plants and bacteria synthesize the essential human micronutrient riboflavin (vitamin B2) via the same multistep pathway. The early intermediates of this pathway are notoriously reactive, and may be overproduced in vivo because riboflavin biosynthesis enzymes lack feedback controls. Here we demonstrate disposal of riboflavin intermediates by COG3236 (DUF1768), a protein of previously unknown function that is fused to two different riboflavin pathway enzymes in plants and bacteria (RIBR and RibA, respectively). We present cheminformatic, biochemical, genetic, and genomic evidence to show that: (i) plant and bacterial COG3236 proteins cleave the N-glycosidic bond of the first two intermediates of riboflavin biosynthesis,more » yielding relatively innocuous products; (ii) certain COG3236 proteins are in a multienzyme riboflavin biosynthesis complex that gives them privileged access to riboflavin intermediates; and (iii) COG3236 action in Arabidopsis thaliana and Escherichia coli helps maintain flavin levels. We find COG3236 proteins thus illustrate two emerging principles in chemical biology: directed overflow metabolism, in which excess flux is diverted out of a pathway, and the pre-emption of damage from reactive metabolites.« less

  6. FROM HOT JUPITERS TO SUPER-EARTHS VIA ROCHE LOBE OVERFLOW

    SciTech Connect

    Valsecchi, Francesca; Rasio, Frederic A.; Steffen, Jason H.

    2014-09-20

    Through tidal dissipation in a slowly spinning host star, the orbits of many hot Jupiters may decay down to the Roche limit. We expect that the ensuing mass transfer will be stable in most cases. Using detailed numerical calculations, we find that this evolution is quite rapid, potentially leading to the complete removal of the gaseous envelope in a few gigayears, and leaving behind an exposed rocky core (a {sup h}ot super-Earth{sup )}. Final orbital periods are quite sensitive to the details of the planet's mass-radius relation and to the effects of irradiation and photo-evaporation, but could be as short as a few hours or as long as several days. Our scenario predicts the existence of planets with intermediate masses ({sup h}ot Neptunes{sup )} that should be found precisely at their Roche limit and in the process of losing mass through Roche lobe overflow. The observed excess of small single-planet candidate systems observed by Kepler may also be the result of this process. If so, the properties of their host stars should track those of the hot Jupiters. Moreover, the number of systems that produced hot Jupiters could be two to three times larger than one would infer from contemporary observations.

  7. Solar Decathlon 2013: Let the Building Begin | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Let the Building Begin Solar Decathlon 2013: Let the Building Begin September 30, 2013 - 10:45am Addthis Day 7 Construction 1 of 22 Day 7 Construction During the 7th day of construction, the Solar Decathlon village has started to take shape. The houses open to the public on October 3, 2013 at 11 am. Image: Stefano Paltera, Energy Department Day 7 Construction 2 of 22 Day 7 Construction The University of North Carolina at Charlotte team members assemble their Solar Decathlon entry. Image: Eric

  8. T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    execute arbitrary code. 4) An error within the internal memory mapping of non-local JavaScript variables can be exploited to cause a buffer overflow and potentially execute...

  9. U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    overflow CVE-2012-0670. A specially crafted '.pict' file can trigger a memory corruption error CVE-2012-0671. Impact: A remote user can create a file that, when loaded by...

  10. The exometabolome of Clostridium thermocellum reveals overflow metabolism at high cellulose loading

    DOE PAGES [OSTI]

    Holwerda, Evert K.; Thorne, Philip G.; Olson, Daniel G.; Amador-Noguez, Daniel; Engle, Nancy L.; Tschaplinski, Timothy J.; van Dijken, Johannes P.; Lynd, Lee R.

    2014-10-21

    Background: Clostridium thermocellum is a model thermophilic organism for the production of biofuels from lignocellulosic substrates. The majority of publications studying the physiology of this organism use substrate concentrations of ≤10 g/L. However, industrially relevant concentrations of substrate start at 100 g/L carbohydrate, which corresponds to approximately 150 g/L solids. To gain insight into the physiology of fermentation of high substrate concentrations, we studied the growth on, and utilization of high concentrations of crystalline cellulose varying from 50 to 100 g/L by C. thermocellum. Results: Using a defined medium, batch cultures of C. thermocellum achieved 93% conversion of cellulose (Avicel)more » initially present at 100 g/L. The maximum rate of substrate utilization increased with increasing substrate loading. During fermentation of 100 g/L cellulose, growth ceased when about half of the substrate had been solubilized. However, fermentation continued in an uncoupled mode until substrate utilization was almost complete. In addition to commonly reported fermentation products, amino acids - predominantly L-valine and L-alanine - were secreted at concentrations up to 7.5 g/L. Uncoupled metabolism was also accompanied by products not documented previously for C. thermocellum, including isobutanol, meso- and RR/SS-2,3-butanediol and trace amounts of 3-methyl-1-butanol, 2-methyl-1-butanol and 1-propanol. We hypothesize that C. thermocellum uses overflow metabolism to balance its metabolism around the pyruvate node in glycolysis. In conclusion: C. thermocellum is able to utilize industrially relevant concentrations of cellulose, up to 93 g/L. We report here one of the highest degrees of crystalline cellulose utilization observed thus far for a pure culture of C. thermocellum, the highest maximum substrate utilization rate and the highest amount of isobutanol produced by a wild-type organism.« less

  11. The exometabolome of Clostridium thermocellum reveals overflow metabolism at high cellulose loading

    SciTech Connect

    Holwerda, Evert K.; Thorne, Philip G.; Olson, Daniel G.; Amador-Noguez, Daniel; Engle, Nancy L.; Tschaplinski, Timothy J.; van Dijken, Johannes P.; Lynd, Lee R.

    2014-10-21

    Background: Clostridium thermocellum is a model thermophilic organism for the production of biofuels from lignocellulosic substrates. The majority of publications studying the physiology of this organism use substrate concentrations of ≤10 g/L. However, industrially relevant concentrations of substrate start at 100 g/L carbohydrate, which corresponds to approximately 150 g/L solids. To gain insight into the physiology of fermentation of high substrate concentrations, we studied the growth on, and utilization of high concentrations of crystalline cellulose varying from 50 to 100 g/L by C. thermocellum. Results: Using a defined medium, batch cultures of C. thermocellum achieved 93% conversion of cellulose (Avicel) initially present at 100 g/L. The maximum rate of substrate utilization increased with increasing substrate loading. During fermentation of 100 g/L cellulose, growth ceased when about half of the substrate had been solubilized. However, fermentation continued in an uncoupled mode until substrate utilization was almost complete. In addition to commonly reported fermentation products, amino acids - predominantly L-valine and L-alanine - were secreted at concentrations up to 7.5 g/L. Uncoupled metabolism was also accompanied by products not documented previously for C. thermocellum, including isobutanol, meso- and RR/SS-2,3-butanediol and trace amounts of 3-methyl-1-butanol, 2-methyl-1-butanol and 1-propanol. We hypothesize that C. thermocellum uses overflow metabolism to balance its metabolism around the pyruvate node in glycolysis. In conclusion: C. thermocellum is able to utilize industrially relevant concentrations of cellulose, up to 93 g/L. We report here one of the highest degrees of crystalline cellulose utilization observed thus far for a pure culture of C. thermocellum, the highest maximum substrate utilization rate and the highest amount of isobutanol produced by a wild-type organism.

  12. U-029: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    9: TCPIP Services for OpenVMS POPIMAP Service Bug Lets Remote Users Gain Unauthorized Access U-029: TCPIP Services for OpenVMS POPIMAP Service Bug Lets Remote Users Gain...

  13. U-239: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof...

    Office of Environmental Management (EM)

    URLs T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or Modify SSLTLS Sessions U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code

  14. U-091: cURL Lets Remote Users Decrypt SSL/TLS Traffic | Department...

    Office of Environmental Management (EM)

    91: cURL Lets Remote Users Decrypt SSLTLS Traffic U-091: cURL Lets Remote Users Decrypt SSLTLS Traffic January 30, 2012 - 6:45am Addthis PROBLEM: A vulnerability was reported in ...

  15. V-189: Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users Deny Service on the Target Host V-189: Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users Deny Service on the Target...

  16. V-115: Apple iOS Bugs Let Local Users Gain Elevated Privileges...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    5: Apple iOS Bugs Let Local Users Gain Elevated Privileges V-115: Apple iOS Bugs Let Local Users Gain Elevated Privileges March 20, 2013 - 12:08am Addthis PROBLEM: Apple iOS Bugs...

  17. V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code March 18, 2013 - 1:53am Addthis PROBLEM: Apple Safari...

  18. V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    0: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code November 9, 2012 - 6:00am...

  19. V-184: Google Chrome Flash Plug-in Lets Remote Users Conduct...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    4: Google Chrome Flash Plug-in Lets Remote Users Conduct Clickjacking Attacks V-184: Google Chrome Flash Plug-in Lets Remote Users Conduct Clickjacking Attacks June 24, 2013 -...

  20. V-225: McAfee Email Gateway SMTP Processing Flaw Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    5: McAfee Email Gateway SMTP Processing Flaw Lets Remote Users Deny Service V-225: McAfee Email Gateway SMTP Processing Flaw Lets Remote Users Deny Service August 23, 2013 - 1:26am...

  1. V-212: Samba smbd CPU Processing Loop Lets Remote Users Deny...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    2: Samba smbd CPU Processing Loop Lets Remote Users Deny Service V-212: Samba smbd CPU Processing Loop Lets Remote Users Deny Service August 6, 2013 - 6:00am Addthis PROBLEM: A...

  2. V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    1: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems April...

  3. V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    0: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information V-140: Apache ActiveMQ Bugs Let Remote...

  4. V-095: Oracle Java Flaws Let Remote Users Execute Arbitrary Code...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    5: Oracle Java Flaws Let Remote Users Execute Arbitrary Code V-095: Oracle Java Flaws Let Remote Users Execute Arbitrary Code February 20, 2013 - 12:38am Addthis PROBLEM: Oracle...

  5. V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    2: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code April 25, 2013 - 12:14am...

  6. V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    7: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets May 2, 2013 - 6:00am Addthis...

  7. U-107: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    07: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny Service U-107: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny Service February 21, 2012 - 6:00am ...

  8. V-144: HP Printers Let Remote Users Access Files on the Printer...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    4: HP Printers Let Remote Users Access Files on the Printer V-144: HP Printers Let Remote Users Access Files on the Printer April 29, 2013 - 12:27am Addthis PROBLEM: HP Printers...

  9. V-179: Blackberry Z10 Flaw Lets Physically Local Users Access...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    9: Blackberry Z10 Flaw Lets Physically Local Users Access the Device V-179: Blackberry Z10 Flaw Lets Physically Local Users Access the Device June 17, 2013 - 1:09am Addthis...

  10. V-194: Citrix XenServer Memory Management Error Lets Local Administrat...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    XenServer Memory Management Error Lets Local Administrative Users on the Guest Gain Access on the Host V-194: Citrix XenServer Memory Management Error Lets Local Administrative...

  11. V-066: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    6: Adobe AcrobatReader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges V-066: Adobe AcrobatReader Multiple Flaws Lets Remote...

  12. V-045: Adobe ColdFusion Lets Local Users Bypass Sandbox Restrictions...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    5: Adobe ColdFusion Lets Local Users Bypass Sandbox Restrictions V-045: Adobe ColdFusion Lets Local Users Bypass Sandbox Restrictions December 12, 2012 - 2:00am Addthis PROBLEM:...

  13. U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    7: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service September 12, 2012 - 6:00am Addthis...

  14. V-203: HP LoadRunner Multiple Bugs Let Remote Users Deny Service...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code...

  15. V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    0: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code March 13, 2013 - 12:04am Addthis PROBLEM:...

  16. V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    1: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service ...

  17. Let's Try That Again: Selling the Teapot Dome Oil Field | Department...

    Office of Environmental Management (EM)

    Let's Try That Again: Selling the Teapot Dome Oil Field Let's Try That Again: Selling the Teapot Dome Oil Field January 30, 2015 - 11:28am Addthis A solitary oil pump at the Teapot ...

  18. T-621: Citrix XenServer Lets Local Administrative Users on the...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    1: Citrix XenServer Lets Local Administrative Users on the Guest OS Deny Service T-621: Citrix XenServer Lets Local Administrative Users on the Guest OS Deny Service May 12, 2011 -...

  19. T-704: RSA enVision Lets Remote Users View Files and Remote Authentica...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain...

  20. U-082: McAfee SaaS 'myCIOScn.dll' ActiveX Control Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Lets Remote Users Execute Arbitrary Code January 17, 2012 - 1:00pm Addthis PROBLEM: PHP Null Pointer Dereference in zendstrndup() Lets Local Users Deny Service PLATFORM: PHP...

  1. T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks

    Energy.gov [DOE]

    Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks

  2. U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Arbitrary Code and Deny Service | Department of Energy 79: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service October 11, 2012 - 6:00am Addthis PROBLEM: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service PLATFORM: Version(s): prior to 4.1(9) ABSTRACT: Several vulnerabilities were reported in Cisco Firewall

  3. Spotlight on Austin, Texas: Let Your Contractor Be Your Guide for Big

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Rewards | Department of Energy Let Your Contractor Be Your Guide for Big Rewards Spotlight on Austin, Texas: Let Your Contractor Be Your Guide for Big Rewards Spotlight on Austin, Texas: Let Your Contractor Be Your Guide for Big Rewards, as posted on the U.S. Department of Energy's Better Buildings Neighborhood Program website. Spotlight on Austin, Texas (444.88 KB) More Documents & Publications Spotlight on Austin, Texas: Best Offer Ever Produces Upgrades in Record Time Spotlight on

  4. T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Security Controls | Department of Energy 36: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls January 18, 2011 - 2:30pm Addthis PROBLEM: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls. PLATFORM: Cisco 5500 Series Adaptive Security Appliances (ASA) ABSTRACT: Cisco ASA 5500 Series Adaptive Security Appliances are affected by multiple

  5. V-135: Cisco ASA Multiple Bugs Let Remote Users Deny Service | Department

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    of Energy 5: Cisco ASA Multiple Bugs Let Remote Users Deny Service V-135: Cisco ASA Multiple Bugs Let Remote Users Deny Service April 16, 2013 - 12:21am Addthis PROBLEM: Cisco ASA Multiple Bugs Let Remote Users Deny Service PLATFORM: Cisco ASA Software for Cisco ASA 5500 Series Adaptive Security Appliances, Cisco ASA Services Module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers, and Cisco ASA 1000V Cloud Firewall are affected by multiple vulnerabilities. Affected

  6. V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code V-076: Cisco Wireless LAN ...

  7. U-053: Linux kexec Bugs Let Local and Remote Users Obtain Potentially...

    Office of Environmental Management (EM)

    Linux kexec Bugs Let Local and Remote Users Obtain Potentially Sensitive Information . PLATFORM: Red Hat Enterprise Linux Desktop (v. 6) Red Hat Enterprise Linux HPC Node (v. 6) ...

  8. U-233: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Articles U-083:Oracle Critical Patch Update Advisory - January 2012 V-067: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code T-576: Oracle Solaris Adobe Flash Player...

  9. Debate response: Which rate designs provide revenue stability and efficient price signals? Let the debate continue.

    SciTech Connect

    Boonin, David Magnus

    2009-11-15

    Let's engage in further discussion that provides solutions and details, not just criticisms and assertions. Let's engage in a meaningful dialogue about the conditions where real-time pricing or critical peak pricing with decoupling or the SFV rate design with a feebate is most effective. (author)

  10. Let7a involves in neural stem cell differentiation relating with TLX level

    SciTech Connect

    Song, Juhyun; Cho, Kyoung Joo; Oh, Yumi; Lee, Jong Eun

    2015-07-10

    Neural stem cells (NSCs) have the potential for differentiation into neurons known as a groundbreaking therapeutic solution for central nervous system (CNS) diseases. To resolve the therapeutic efficiency of NSCs, recent researchers have focused on the study on microRNA's role in CNS. Some micro RNAs have been reported significant functions in NSC self-renewal and differentiation through the post-transcriptional regulation of neurogenesis genes. MicroRNA-Let7a (Let7a) has known as the regulator of diverse cellular mechanisms including cell differentiation and proliferation. In present study, we investigated whether Let7a regulates NSC differentiation by targeting the nuclear receptor TLX, which is an essential regulator of NSC self-renewal, proliferation and differentiation. We performed the following experiments: western blot analysis, TaqMan assay, RT-PCR, and immunocytochemistry to confirm the alteration of NSCs. Our data showed that let7a play important roles in controlling NSC fate determination. Thus, manipulating Let-7A and TLX could be a novel strategy to enhance the efficiency of NSC's neuronal differentiation for CNS disorders. - Highlights: • Let7a influences on NSC differentiation and proliferation. • Let7a involves in mainly NSC differentiation rather than proliferation. • Let7a positively regulates the TLX expression.

  11. Don't Let Your Money and Hot Water Go Down the Drain | Department...

    Energy Saver

    Don't Let Your Money and Hot Water Go Down the Drain Don't Let Your Money and Hot Water Go Down the Drain December 9, 2008 - 4:00am Addthis John Lippert Do you look at your ...

  12. T-606: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data

    Energy.gov [DOE]

    Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data.

  13. U-049: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users Inject

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Commands on the Target System | Department of Energy 49: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users Inject Commands on the Target System U-049: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users Inject Commands on the Target System December 1, 2011 - 9:00am Addthis PROBLEM: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users Inject Commands on the Target System. PLATFORM: IBM Tivoli Netcool Reporter prior to 2.2.0.8 ABSTRACT: A vulnerability was reported in IBM Tivoli Netcool

  14. U-239: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Addresses | Department of Energy 39: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source Addresses U-239: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source Addresses August 20, 2012 - 7:00am Addthis PROBLEM: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source Addresses PLATFORM: Version(s): 6 beta 4 and prior versions ABSTRACT: A remote user can spoof SMS source addresses. Reference LINKS: SecurityTracker Alert ID: 1027410 Apple.com PCMag.com

  15. V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Users Deny Service | Department of Energy 1: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service January 17, 2013 - 12:00am Addthis PROBLEM: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service PLATFORM: The vulnerability is reported in versions 8.7.1 and 8.7.1.1. ABSTRACT: A vulnerability has been reported in Cisco ASA 1000V Cloud Firewall

  16. V-165: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote Users

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Spoof the Server | Department of Energy 65: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote Users Spoof the Server V-165: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote Users Spoof the Server May 28, 2013 - 12:46am Addthis PROBLEM: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote Users Spoof the Server PLATFORM: Cisco WebEx for iOS 4.1, Other versions may also be affected. ABSTRACT: A vulnerability was reported in Cisco WebEx for iOS. REFERENCE LINKS:

  17. T-575: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Password | Department of Energy 5: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid Password T-575: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid Password March 11, 2011 - 3:05pm Addthis PROBLEM: A vulnerability was reported in OpenLDAP. A remote user can authenticate without a valid password. PLATFORM: Open LDAP version(s) 2.4.12 - 2.2.24 ABSTRACT: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid Password. reference LINKS: SecurityTracker

  18. T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Sessions | Department of Energy 7:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions September 27, 2011 - 8:00am Addthis PROBLEM: Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions. PLATFORM: Windows XP Service Pack 3 Windows XP Professional x64 Edition Service Pack 2 Windows Server 2003 Service Pack 2 Windows Server 2003 x64 Edition Service Pack 2 Windows

  19. MicroRNAs let-7b/i suppress human glioma cell invasion and migration by targeting IKBKE directly

    SciTech Connect

    Tian, Yuan; Hao, Shaobo; Ye, Minhua; Zhang, Anling; Nan, Yang; Wang, Guangxiu; Jia, Zhifan; Yu, Kai; Guo, Lianmei; Pu, Peiyu; Huang, Qiang; Zhong, Yue

    2015-03-06

    We demonstrated that IKBKE is overexpressed in human gliomas and that the downregulation of IKBKE markedly inhibits the proliferative and invasive abilities of glioma cells, which is consistent with the results reported by several different research groups. Therefore, IKBKE represents a promising therapeutic target for the treatment of glioma. In the present study, we verified that the microRNAs let-7b and let-7i target IKBKE through luciferase assays and found that let-7b/i mimics can knock down IKBKE and upregulate E-cadherin through western blot analysis. Moreover, the expression levels of let-7b/i were significantly lower in glioma cell lines than that in normal brain tissues, as determined by quantitative real-time PCR. Furthermore, let-7b/i inhibit the invasion and migration of glioma cells, as determined through wound healing and Transwell assays. The above-mentioned data suggest that let-7b/i inhibit the invasive ability of glioma cells by directly downregulating IKBKE and indirectly upregulating E-cadherin. - Highlights: • Let-7b and let-7i are downregulated in glioma cell lines. • IKBKE is a target gene of let-7b/i. • Let-7b/i inhibit the invasion and migration of glioma cells. • Let-7b/i upregulate E-cadherin by downregulating IKBKE.

  20. U-111: IBM AIX ICMP Processing Flaw Lets Remote Users Deny Service...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    aixefixessecurityicmpfix.tar Addthis Related Articles U-096: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny Service V-031: IBM WebSphere DataPower...

  1. T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Remote Users Access or Modify SSLTLS Sessions T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or Modify SSLTLS Sessions July 26, 2011 - ...

  2. V-183: Cisco TelePresence TC and TE Bugs Let Remote Users Deny...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Remote Users Deny Service and Remote Adjacent Authenticated Users Gain Root Shell Access V-183: Cisco TelePresence TC and TE Bugs Let Remote Users Deny Service and Remote Adjacent...

  3. T-563: Red Hat Directory Server Bugs Let Local Users Gain Elevated...

    Energy.gov [DOE] (indexed site)

    server and command line utilities for server administration. Addthis Related Articles T-671: Red Hat system-config-firewall Lets Local Users Gain Root Privileges V-041: Red Hat...

  4. U-068:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Linux Kernel SGIO ioctl Bug Lets Local Users Gain Elevated Privileges PLATFORM: Red Hat Enterprise Linux Desktop (v. 6) Red Hat Enterprise Linux HPC Node (v. 6) Red Hat...

  5. U-247: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    CTA 7.3.1 and later with Hotfix ESA-2012-034 Addthis Related Articles V-045: Adobe ColdFusion Lets Local Users Bypass Sandbox Restrictions V-036: EMC Smarts Network...

  6. U-089:Apache Struts ParameterInterceptor() Flaw Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Apache Struts ParameterInterceptor() Flaw Lets Remote Users Execute Arbitrary Commands PLATFORM: Struts 2.0.0 - Struts 2.3.1.1 ABSTRACT: A remote user can execute arbitrary code...

  7. V-109: Google Chrome WebKit Type Confusion Error Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Google Chrome WebKit Type Confusion Error Lets Remote Users Execute Arbitrary Code PLATFORM: Google Chrome prior to 25.0.1364.160 ABSTRACT: A vulnerability was reported in...

  8. T-575: OpenLDAP back-ndb Lets Remote Users Authenticate Without...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Remote Users Authenticate Without a Valid Password T-575: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid Password March 11, 2011 - 3:05pm Addthis PROBLEM: A ...

  9. V-235: Cisco Mobility Services Engine Configuration Error Lets Remote Users

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Login Anonymously | Department of Energy 5: Cisco Mobility Services Engine Configuration Error Lets Remote Users Login Anonymously V-235: Cisco Mobility Services Engine Configuration Error Lets Remote Users Login Anonymously September 5, 2013 - 12:33am Addthis PROBLEM: A vulnerability was reported in Cisco Mobility Services Engine. A remote user can login anonymously. PLATFORM: Cisco Mobility Services Engine ABSTRACT: A vulnerability in Cisco Mobility Services Engine could allow an

  10. V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code | Department of Energy 6: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code January 24, 2013 - 6:00am Addthis PROBLEM: Several vulnerabilities were reported in

  11. U-107: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny Service

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    | Department of Energy 07: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny Service U-107: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny Service February 21, 2012 - 6:00am Addthis PROBLEM: A vulnerability was reported in Cisco NX-OS. A remote user can cause denial of service conditions. PLATFORM: Nexus 1000v, 5000, and 7000 Series Switches ABSTRACT: A remote user can send a specially crafted IP packet to cause the target device to reload. reference LINKS: Cisco

  12. T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Users Access or Modify SSL/TLS Sessions | Department of Energy 6: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or Modify SSL/TLS Sessions T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or Modify SSL/TLS Sessions July 26, 2011 - 1:06am Addthis PROBLEM: A vulnerability was reported in Apple iOS. A remote user with the ability to conduct a man-in-the-middle attack can access or modify SSL/TLS sessions. PLATFORM: iOS 4.2.5

  13. T-692: VMware vFabric tc Server Lets Remote Users Login Using Obfuscated

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Passwords | Department of Energy 92: VMware vFabric tc Server Lets Remote Users Login Using Obfuscated Passwords T-692: VMware vFabric tc Server Lets Remote Users Login Using Obfuscated Passwords August 12, 2011 - 3:47pm Addthis PROBLEM: A vulnerability was reported in VMware vFabric tc Server. A remote user can login using an obfuscated version of their password. PLATFORM: Version(s): vFabric tc Server 2.0.0.RELEASE to 2.0.5.SR01, 2.1.0.RELEASE to 2.1.1.SR01 ABSTRACT: VMware vFabric tc

  14. U-152: OpenSSL "asn1_d2i_read_bio()" DER Format Data Processing Vulnerability

    Energy.gov [DOE]

    The vulnerability is caused due to a type casting error in the "asn1_d2i_read_bio()" function when processing DER format data and can be exploited to cause a heap-based buffer overflow.

  15. Effects of estrogen and gender on cataractogenesis induced by high-LET radiation

    SciTech Connect

    Henderson, M.A.; Rusek, A.; Valluri, S.; Garrett, J.; Lopez, J.; Caperell-Grant, A.; Mendonca, M.; Bigsby, R.; Dynlacht, J.

    2010-02-01

    Planning for long-duration manned lunar and interplanetary missions requires an understanding of radiation-induced cataractogenesis. Previously, it was demonstrated that low-linear energy transfer (LET) irradiation with 10 Gy of {sup 60}Co {gamma} rays resulted in an increased incidence of cataracts in male rats compared to female rats. This gender difference was not due to differences in estrogen, since male rats treated with the major secreted estrogen 17-{beta}-estradiol (E2) showed an identical increase compared to untreated males. We now compare the incidence and rate of progression of cataracts induced by high-LET radiation in male and female Sprague-Dawley rats. Rats received a single dose of 1 Gy of 600 MeV {sup 56}Fe ions. Lens opacification was measured at 2-4 week intervals with a slit lamp. The incidence and rate of progression of radiation-induced cataracts was significantly increased in the animals in which estrogen was available from endogenous or exogenous sources. Male rats with E2 capsules implanted had significantly higher rates of progression compared to male rats with empty capsules implanted (P = 0.025) but not compared to the intact female rats. These results contrast with data obtained after low-LET irradiation and suggest the possibility that the different types of damage caused by high- and low-LET radiation may be influenced differentially by steroid sex hormones.

  16. SU-E-T-555: A Protontherapy Inverse Treatment Planning System Prototype with Linear Energy Transfer (LET) Optimization

    SciTech Connect

    Sanchez-Parcerisa, D; Carabe-Fernandez, A

    2014-06-01

    Purpose: Develop and benchmark an inverse treatment planning system (TPS) for proton radiotherapy integrating fast analytical dose and LET calculations in patient geometries and a dual objective function with both dose and LET components, enabling us to apply optimization techniques to improve the predicted outcome of treatments based on radiobiological models. Methods: The software package was developed in MATLAB and implements a fluence-dose calculation technique based on a pencil beam model for dose calculations and a 3D LET model based on the extension of the LET in the radial direction as a function of the predicted radiological pathway. Both models were benchmarked against commissioning data from our institution, dose calculations performed with a commercial treatment planning system and Monte Carlo simulations. The optimization is based on the adaptive simulated annealing approach . Results: The dose and LET calculations were tested in a water phantom and several real patient treatments. The pass rate for the gamma index analysis (3%/3mm) test was above 90% for all test cases analyzed, and the calculation time was of the order of seconds. The inverse planning module produced plans with a significantly higher mean LET in the target compared to traditional plans, without any loss of target coverage. The clinical relevance of this improvement is under consideration . Conclusion: The developed treatment planning system is a valuable clinical and research tool that enables us to incorporate LET effects into proton radiotherapy planning in a streamlined fashion.

  17. Research Highlight: Let the Good Times Flow - Joint Center for Energy

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Storage Research October 1, 2015, News Articles Research Highlight: Let the Good Times Flow There are two electrodes in every battery. One electrode, called the cathode, connects to the positive end of the battery and is where the electric current leaves the battery. The other electrode, the anode, connects to the negative end of the battery and is where the electric current enters the battery. The flow of these electrons through an external circuit is what produces the electric current.

  18. SU-E-T-581: On the Value of LET as a Radiation Quality Descriptor for RBE

    SciTech Connect

    Pater, P; Backstrom, G; Enger, S; Seuntjens, J; Naqa, I El; Villegas, F; Ahnesjo, A

    2015-06-15

    Purpose: To investigate the relationship between linear energy transfer (LET) and relative biological effectiveness (RBE) for protons and light ions, and the corresponding role of LET as a descriptor of radiation quality of hadron therapy. Methods: Monte Carlo (MC) proton and light ion (He, Li, C) tracks with LET < 30 eV nm{sup -1} were generated in an event-by-event mode. They were overlaid on a cell nucleus model containing 6×10{sup 9} nucleotide base pairs using an isotropic irradiation procedure that provides electronic equilibrium. Strand breaks (sbs) were scored in the DNA sugar-phosphate groups and further sub-classified into single or double sbs (ssbs or dsbs). Distributions of ssbs and dsbs for 2 Gy fractions were calculated to estimate RBE for the induction of initial dsbs with reference to {sup 60}Co. Additionally, sbs were classified based on their complexity (i.e. the number of sbs in each cluster). Results: An increase in LET for light ions of the same atomic number or a decrease in atomic number for ions of the same LET resulted in a lower kinetic energy of emitted secondary electrons. The clustering of DNA damage was more pronounced as reflected by the increase in proton RBE from ∼ 1.75 to 4 for LET values of 7 to 28 eV nm{sup -1}. A significant RBE decrease between protons, He, Li and C ions of the same LET was also noticed as function of the atomic number. Significant differences in ssbs and dsbs complexities were also seen for particles with the same LET, potentially supporting a clustering-based radiation quality descriptor. Conclusion: The LET-RBE relationships were simulated for proton and light ions and exhibited expected trends, including different RBEs for particles with the same LET but different atomic numbers. A complexity based radiation quality descriptor may allow better differentiation of RBE between radiation fields of similar LET. We would like to acknowledge support from the Fonds de recherche du Quebec Sante (FRQS), from the

  19. V-234: EMC RSA Archer GRC Open Redirection Weakness and Security...

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Let Remote Users Conduct Cross-Site Scripting Attacks U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSLTLS Traffic and SSL Buffer Overflow Lets Remote Users Execute Arbitrary ...

  20. NNSA team members don't let neighbors go hungry | National Nuclear

    National Nuclear Security Administration (NNSA)

    Security Administration | (NNSA) team members don't let neighbors go hungry Friday, September 30, 2016 - 10:25am NNSA team members in Albuquerque, New Mexico, filled a large box with several hundred pounds of food for hungry kids and families in the state. Volunteers representing NNSA near Albuquerque gathered more than 650 pounds of grapes for the Roadrunner Food Bank. NNSA team members from all corners of the enterprise came together this summer to supply local food kitchens and pantries

  1. V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code

    Energy.gov [DOE]

    PROBLEM: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code

  2. TEC Evaluation_PNNL11300_1996.pdf

    Office of Environmental Management (EM)

    Execute Arbitrary Code | Department of Energy 5: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets Remote Users Execute Arbitrary Code T-545: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets Remote Users Execute Arbitrary Code January 28, 2011 - 7:21am Addthis PROBLEM: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets Remote Users Execute Arbitrary Code. PLATFORM: RealPlayer 14.0.1 and prior versions ABSTRACT: A vulnerability was reported in RealPlayer. A remote user can

  3. V-123: VMware ESX / ESXi libxml2 Buffer Underflow Vulnerability...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    (2044373) Addthis Related Articles U-128: VMware ESXESXi Buffer Overflow and Null Pointer Dereference Lets Local Users Gain Elevated Privileges T-552: Cisco Nexus 1000V...

  4. SU-E-T-354: Peak Temperature Ratio of TLD Glow Curves to Investigate the Spatial Dependence of LET in a Clinical Proton Beam

    SciTech Connect

    Reft, C [UniversityChicago, Chicago, IL (United States); Pankuch, M; Ramirez, H [ProCure Treatment Centers, Warrenville, IL (United States)

    2014-06-01

    Purpose: Use the ratio of the two high temperature peaks (HTR) in TLD 700 glow curves to investigate spatial dependence of the linear energy transfer (LET) in proton beams. Studies show that the relative biological effectiveness (RBE) depends upon the physical dose as well as its spatial distribution. Although proton therapy uses a spatially invariant RBE of 1.1, studies suggest that the RBE increases in the distal edge of a spread out Bragg peak (SOBP) due to the increased LET. Methods: Glow curve studies in TLD 700 show that the 280 C temperature peak is more sensitive to LET radiation than the 210 C temperature peak. Therefore, the areas under the individual temperature peaks for TLDs irradiated in a proton beam normalized to the peak ratio for 6 MV photons are used to determine the HTR to obtain information on its LET. TLD 700 chips with dimensions 0.310.310.038 cc are irradiated with 90 MeV protons at varying depths in a specially designed blue wax phantom to investigate LET spatial dependence. Results: Five TLDs were placed at five different depths of the percent depth dose curve (PDD) of range 16.2 cm: center of the SOPB and approximately at the 99% distal edge, 90%, 75% and 25% of the PDD, respectively. HTR was 1.3 at the center of the SOBP and varied from 2.2 to 3.9 which can be related to an LET variation from 0.5 to 18 KeV/? via calibration with radiation beams of varying LET. Conclusion: HTR data show a spatially invariant LET slightly greater than the 6 MV radiations in the SOBP, but a rapidly increasing LET at the end of the proton range. These results indicate a spatial variation in RBE with potential treatment consequences when selecting treatment margins to minimize the uncertainties in proton RBE.

  5. Movement and Injury Rates for Three Life Stages of Spring Chinook Salmon Oncorhynchus Tshawytscha : A Comparison of Submerged Orifices and an Overflow Weir for Fish Bypass in a Modular Rotary Drum Fish Screen : Annual Report 1995.

    SciTech Connect

    Abernethy, C. Scott; Neitzel, Duane A.; Mavros, William V.

    1996-03-01

    The Pacific Northwest National Laboratory (PNNL) evaluated the effectiveness of 6-in. and 2-in. submerged orifices, and an overflow weir for fish bypass at a rotary drum fish screening facility. A modular drum screen built by the Washington Department of Fish and Wildlife (WDFW) was installed at PNNL`s Aquatic Ecology research laboratory in Richland, Washington. Fry, subyearlings, and smolts of spring chinook salmon (Oncorhynchus tshawyacha) were introduced into the test system, and their movement and injury rates were monitored. A total of 33 tests (100 fish per test) that lasted from 24 to 48 hr were completed from 1994 through 1995. Passage rate depended on both fish size and bypass configuration. For fry/fingerling spring chinook salmon, there was no difference in passage rate through the three bypass configurations (2-in. orifice, 6-in. orifice, or overflow weir). Subyearlings moved sooner when the 6-in. orifice was used, with more than 50% exiting through the fish bypass in the first 8 hr. Smolts exited quickly and preferred the 6-in. orifice, with over 90% of the smolts exiting through the bypass in less than 2 hr. Passage was slightly slower when a weir was used, with 90% of the smolts exiting in about 4 hr. When the 2-in. orifice was used in the bypass, 90% of the smolts did not exit until after 8 hr. In addition, about 7% of the smolts failed to migrate from the forebay within 24 hr, indicating that smolts were significantly delayed when the 2-in. orifice was used. Few significant injuries were detected for any of the life stages. However, light descaling occurred on about 15% of chinook salmon smolts passing through the 2-in. orifice. Although a single passage through the orifice did not appear to cause significant scale loss or other damage, passing through several screening facilities with 2-in. orifices could cause cumulative injuries.

  6. MOLECULAR MECHANISM OF SUPPRESSION OF NEOPLASTIC TRANSFORMATION BY LOW DOSES OF LOW LET RADIATION

    SciTech Connect

    J.LESIE REDPATH, PH.D.

    2011-03-29

    We are currently funded (9/01-8/04) by the DOE Low Dose Radiation Research Program to examine mechanisms underlying the suppression of neoplastic transformation in vitro by low doses of low LET radiation. For the new studies proposed under Notice 04-21, we intend to follow up on our observation that upregulation of DNA repair may be an important factor and that its importance is dose-dependent. The experimental system will be the human hybrid cell neoplastic transformation assay that we are currently using. We propose to test the following hypothesis: Down-regulation of DNA dsb repair will abrogate the low dose suppression of neoplastic transformation. Using the technique of RNA silencing, it is proposed to test the effect of down-regulation of the two major DNA dsb repair pathways, homologous recombination (HR) and non-homologous end-joining (NHEJ), on the dose response relationship for neoplastic transformation. Based on prior studies, we predict that this will result in abrogation of the suppressive effect at doses in the range 1 to 10 cGy, but not at lower doses. The proposed experiments will also help address the question as to which of the two DNA repair pathways may be the most important in causing suppression of transformation. HR is a pathway that is predominant in S and G2 phase cells and is known to be less error-prone than the NHEJ pathway that is predominant in G1 phase. We hypothesize that down-regulation of HR will result in the most effective abrogation of suppression. An important component of this study will be the determination of the how abrogation of DNA dsb repair impacts the spontaneous transformation frequency, presumably a consequence of endogeneous DNA damage. Experiments will be carried out using partially synchronized populations of cells enriched for G1 and S/G2 respectively. In addition to the endpoint of neoplastic transformation the impact of down-regulation of HR and NHEJ on the formation and disappearance of the DNA dsb marker

  7. Heap/stack guard pages using a wakeup unit

    SciTech Connect

    Gooding, Thomas M; Satterfield, David L; Steinmacher-Burow, Burkhard

    2014-04-29

    A method and system for providing a memory access check on a processor including the steps of detecting accesses to a memory device including level-1 cache using a wakeup unit. The method includes invalidating level-1 cache ranges corresponding to a guard page, and configuring a plurality of wakeup address compare (WAC) registers to allow access to selected WAC registers. The method selects one of the plurality of WAC registers, and sets up a WAC register related to the guard page. The method configures the wakeup unit to interrupt on access of the selected WAC register. The method detects access of the memory device using the wakeup unit when a guard page is violated. The method generates an interrupt to the core using the wakeup unit, and determines the source of the interrupt. The method detects the activated WAC registers assigned to the violated guard page, and initiates a response.

  8. Global garbage collection for distributed heap storage systems

    SciTech Connect

    Ali, K.A.M.; Haridi, S.

    1986-10-01

    The authors present a garbage-collection algorithm, suitable for loosely-coupled multi-processor systems, in which the processing elements (PEs) share only the communication medium. The algorithm is global, i.e., it involves all the PEs in the system. It allows space compaction, and it uses a system-wide marking phase to mark all accessible objects where a combination of parallel breadth-first/depth-first strategies is used for tracing the object-graphs according to a decentralized credit mechanism that regulates the number of garbage collections messages in the system. The credit mechanism is crucial for determining the space requirement of the garbage-collection messages. Also a variation of this algorithm is presented for systems with high locality of reference. It allows each PE to perform first its local garbage collection and only invokes the global garbage collection when the freed space by the local collector is insufficient.

  9. Oxidative Stress and Skeletal Health with Low-Dose, Low-LET (Linear Energy Transfer) Ionizing Radiation

    SciTech Connect

    Globus, Ruth K.

    2014-11-03

    We performed in vivo and in vitro experiments to accomplish the following specific aims of this project: 1) determine if low dose, low LET radiation affects skeletal remodeling at structural, cellular and molecular levels and 2) determine if low dose, low LET radiation modulates skeletal health during aging via oxidative mechanisms. A third aim is supported by NASA supplement to this DOE grant focusing on the influence of high LET radiation on bone. A series of experiments were conducted at the NASA Space Radiation Laboratory at Brookhaven, NSRL-BNL, using iron (56Fe) or a sequential exposure to protons / iron / protons, and separate experiments at NASA Ames Research Center (ARC) using 137Cs. The following provides a summary of key findings. (1) Exposure of nine-week old female mice to priming doses of gamma radiation (10cGy x 5) did not significantly affect bone volume/total volume (BV/TV) or microarchitecture as analyzed by 3D microcomputed tomography. As expected, exposure to the challenge dose of 2 Gy gamma irradiation resulted in significant decreases in BV/TV. The priming dose combined with the 2Gy challenge dose had no further effect on BV/TV compared to challenge dose alone, with the sole exception of the Structural Model Index (SMI). SMI reflects the ratio of rods-to-plates in cancellous bone tissue, such that higher SMI values indicate a tendency toward a weaker structure compared to lower SMI values. Mice treated with both priming and challenge dose had 25% higher SMI values compared to sham-irradiated controls and 7% higher values compared to mice treated with the challenge dose alone. Thus, although this priming regimen had relatively modest effects on cancellous tissue, the difference in SMI suggests this fractionated priming doses have adverse, rather than beneficial, effects on bone structure. (2) In 10-week old male mice, a single exposure to 100cGy of 137Cs reduces trabecular bone number and connectivity density by 20% and 36% respectively one

  10. Real-time Molecular Study of Bystander Effects of Low dose Low LET radiation Using Living Cell Imaging and Nanoparticale Optics

    SciTech Connect

    Natarajan, Mohan; Xu, Nancy R; Mohan, Sumathy

    2013-06-03

    In this study two novel approaches are proposed to investigate precisely the low dose low LET radiation damage and its effect on bystander cells in real time. First, a flow shear model system, which would provide us a near in vivo situation where endothelial cells in the presence of extra cellular matrix experiencing continuous flow shear stress, will be used. Endothelial cells on matri-gel (simulated extra cellular matrix) will be subjected to physiological flow shear (that occurs in normal blood vessels). Second, a unique tool (Single nano particle/single live cell/single molecule microscopy and spectroscopy; Figure A) will be used to track the molecular trafficking by single live cell imaging. Single molecule chemical microscopy allows one to single out and study rare events that otherwise might be lost in assembled average measurement, and monitor many target single molecules simultaneously in real-time. Multi color single novel metal nanoparticle probes allow one to prepare multicolor probes (Figure B) to monitor many single components (events) simultaneously and perform multi-complex analysis in real-time. These nano-particles resist to photo bleaching and hence serve as probes for unlimited timeframe of analysis. Single live cell microscopy allows one to image many single cells simultaneously in real-time. With the combination of these unique tools, we will be able to study under near-physiological conditions the cellular and sub-cellular responses (even subtle changes at one molecule level) to low and very low doses of low LET radiation in real time (milli-second or nano-second) at sub-10 nanometer spatial resolution. This would allow us to precisely identify, at least in part, the molecular mediators that are responsible of radiation damage in the irradiated cells and the mediators that are responsible for initiating the signaling in the neighboring cells. Endothelial cells subjected to flow shear (2 dynes/cm2 or 16 dynes/cm2) and exposed to 0.1, 1 and 10

  11. T-604: Google Chrome updated version of the Adobe Flash player

    Energy.gov [DOE]

    The Chrome Stable channel has been updated to 10.0.648.205 for Windows, Mac, Linux and Chrome Frame. This release contains a new version of Adobe Flash 0-Day CVE-2011-0611. Update also includes a fix for a security vulnerability Critical CVE-2011-1300: Off-by-three in GPU process, CVE-2011-1301: Use-after-free in the GPU process, and CVE-2011-1302: Heap overflow in the GPU process.

  12. T-629: Avaya WinPDM Multiple Buffer Overflow Vulnerabilities

    Energy.gov [DOE]

    Vulnerabilities where malicious people are able to gain system access and execute arbitrary code with the privileges of a local user.

  13. U-202: Apple QuickTime Multiple Stack Overflow Vulnerabilities

    Energy.gov [DOE]

    Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution.

  14. T-588: HP Virtual SAN Appliance Stack Overflow

    Office of Energy Efficiency and Renewable Energy (EERE)

    A vulnerability has been reported in HP StorageWorks P4000 Virtual SAN Appliance Software, which can be exploited by malicious people to compromise a vulnerable system.

  15. V-213: PuTTY SSH Handshake Integer Overflow Vulnerabilities ...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    source code repository Addthis Related Articles V-222: SUSE update for Filezilla V-157: Adobe Reader Acrobat Multiple Vulnerabilities V-066: Adobe AcrobatReader Multiple Flaws...

  16. Let the private sector handle energy conservation

    SciTech Connect

    Bajer, E.R.

    1982-08-23

    Mr. Bajer feels that elimination of many federal conservation programs will have no effect on the US goal of reducing oil imports because the private sector can do a better job of providing these efforts. He notes that many government programs were the result of overreaction to the 1973 oil embargo, when Congress misread the public's willingness to respond. The American people have taken the initiative, however, and have reduced their energy consumption and import rates. Mr. Bajer further notes that, according to the DOE Office of Policy, Planning and Analysis, DOE's conservation programs accounted for less than 5% of reduction of energy use per unit of GNP. He thinks that new policies will allow market forces to continue providing conservation incentives and will remove government intervention and competition with the private sector. (DCK)

  17. U-126: Cisco Adaptive Security Appliances Port Forwarder ActiveX Control Buffer Overflow Vulnerability

    Energy.gov [DOE]

    A vulnerability was reported in Cisco ASA. A remote user can cause arbitrary code to be executed on the target user's system.

  18. U-154: IBM Rational ClearQuest ActiveX Control Buffer Overflow Vulnerability

    Energy.gov [DOE]

    A vulnerability was reported in IBM Rational ClearQuest. A remote user can cause arbitrary code to be executed on the target user's system.

  19. V-148: Novell iPrint Client Unspecified Buffer Overflow Vulnerability

    Energy.gov [DOE]

    A vulnerability has been reported in Novell iPrint Client, which can be exploited by malicious people to compromise a user's system

  20. T-559: Stack-based buffer overflow in oninit in IBM Informix...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    exploit this vulnerability. The specific flaw exists within the oninit process bound to TCP port 9088 when processing the arguments to the USELASTCOMMITTED option in a SQL query....

  1. V-219: Kingsoft Writer 2012 WPS Font Names Buffer Overflow Vulnerability

    Energy.gov [DOE]

    Kaveh Ghaemmaghami has discovered a vulnerability in Kingsoft Writer 2012, which can be exploited by malicious people to compromise a user's system.

  2. U-108: Net4Switch ipswcom ActiveX Control Buffer Overflow Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE)

    The vulnerability is caused due to a boundary error within the "CxDbgPrint()" function (cxcmrt.dll) when creating a debug message string.

  3. V-056: FreeType BDF Glyph Processing Buffer Overflow Vulnerability

    Energy.gov [DOE]

    Several vulnerabilities were reported in FreeType. A remote user can cause arbitrary code to be executed on the target user's system.

  4. Storm and combined sewer overflow: An overview of EPA's Research Program. Book chapter

    SciTech Connect

    Field, R.

    1993-01-01

    The report represents an overview of the EPA's Storm and Combined Sewer Pollution Control Research Program performed over a 20-year period beginning with the mid-1960s. It covers Program involvements in the development of a diverse technology including pollution-problem assessment/solution methodology and associated instrumentation and stormwater management models, best management practices, erosion control, infiltration/inflow, control, control-treatment technology and the associated sludge and solids residuals handling and many others.

  5. U-114: IBM Personal Communications WS File Processing Buffer Overflow Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE)

    A vulnerability in WorkStation files (.ws) by IBM Personal Communications could allow a remote attacker to cause a denial of service (application crash) or potentially execute arbitrary code on vulnerable installations of IBM Personal Communications.

  6. Spotlight on Austin, Texas: Let Your Contractor Be Your Guide...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    efficiency goals-including co-marketing the utility's programs to help drive demand. ... The program devised a strategy to meet regularly with contractors, address their concerns, ...

  7. Going completely renewable: is it possible (let alone desirable)?

    SciTech Connect

    Sovacool, Benjamin K.; Watts, Charmaine

    2009-05-15

    With the right mix of leadership and policy, a completely renewable electricity sector for New Zealand and the United States is feasible, achievable, and desirable. (author)

  8. U-137: HP Performance Manager Unspecified Bug Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    vulnerability has been identified with HP Performance Manager running on HP-UX, Linux, Solaris, and Windows. The vulnerability could be exploited remotely to execute...

  9. U-203: HP Photosmart Bug Lets Remote Users Deny Service

    Energy.gov [DOE]

    A vulnerability was reported in HP Photosmart. A remote user can cause denial of service conditions.

  10. U-084: Cisco Digital Media Manager Lets Remote Authenticated...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Show and Share. Impact: A remote authenticated user can send a specially crafted URL via TCP port 8443 to access administrative resources and gain administrative privileges....

  11. Solar Decathlon 2013: Let the Building Begin | Department of Energy

    Energy Saver

    Topic Areas Smart Grid Investment Grant Topic Areas A description of the topic areas for projects selected for award under the Smart Grid Investment Grant project of the American Recovery and Reinvestment Act. Smart Grid Investment Grant Topic Areas (25.19 KB) More Documents & Publications Smart Grid Investment Grant Program - Progress Report (July 2012) SGIG and SGDP Highlights: Jumpstarting a Modern Grid (October 2014) Smart Grid R&D Multi-Year Program Plan (2010-2014) - September 2011

  12. V-160: Wireshark Multiple Bugs Let Remote Users Deny Service...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    can be exploited to cause a crash via specially crafted packets. 6) An error in the MPEG DSM-CC dissector (dissectorspacket-mpeg-dsmcc.c) can be exploited to cause a crash via...

  13. V-103: RSA Authentication Agent Lets Remote Users Bypass Authenticatio...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    issued a fix (7.1.2). Addthis Related Articles U-267: RSA Authentication Agent 7.1 for Microsoft Windows and RSA Authentication Client 3.5 Access Control Vulnerability...

  14. V-235: Cisco Mobility Services Engine Configuration Error Lets...

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    (SSL). REFERENCE LINKS: SecurityTracker Alert ID: 1028972 CVE-2013-3469 IMPACT ASSESSMENT: Medium DISCUSSION: The vulnerability is due to the misconfiguration of the Oracle SSL ...

  15. T-636: Wireshark Multiple Flaws Let Remote Users Deny Service

    Energy.gov [DOE]

    Multiple vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions.

  16. U-176: Wireshark Multiple Bugs Let Remote Users Deny Service

    Energy.gov [DOE]

    Several vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions.

  17. V-098: Linux Kernel Extended Verification Module Bug Lets Local...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    reported in the Linux Kernel. REFERENCE LINKS: The Linux Kernel Archives Linux Kernel Red Hat Bugzilla - Bug 913266 SecurityTracker Alert ID: 1028196 CVE-2013-0313 IMPACT...

  18. Let's Compare Tritium Design Practices Across The DOE Complex

    Energy.gov [DOE]

    Presentation from the 32nd Tritium Focus Group Meeting held in Germantown, Maryland on April 23-25, 2013.

  19. U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    SDK and JRE 1.4.233 and prior ABSTRACT: A remote user can create a Java applet or Java Web Start application that, when loaded by the target user, will access or modify data or...

  20. 2nd Quarter 2016 Domestic Uranium Production Report

    Energy Information Administration (EIA) (indexed site)

    3. U.S. uranium mills and heap leach facilities by owner, location, capacity, and operating status" "Owner","Mill and Heap Leach1 Facility name","County, state (existing and ...

  1. T-574: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact while others can be exploited by malicious people bypass certain security restrictions, disclose system information, and compromise a user's system.

  2. T-591: VMware vmrun Utility Lets Local Users Gain Elevated Privileges...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    the target system. PLATFORM: VMware Workstation 6.5.5 and 7.1.3 and prior; VIX API for Linux 1.10.2 and prior ABSTRACT: The VMware vmrun utility is susceptible to a local...

  3. T-601: Windows Kernel win32k.sys Lets Local Users Gain Elevated Privileges

    Energy.gov [DOE]

    Multiple vulnerabilities were reported in the Windows Kernel. A local user can obtain elevated privileges on the target system. A local user can trigger a use-after free or null pointer dereference to execute arbitrary commands on the target system with kernel level privileges.

  4. T-654: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary

    Energy.gov [DOE]

    A remote user can create a specially crafted file that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user.

  5. U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code

    Energy.gov [DOE]

    A remote user can create content that, when loaded by the target user, will execute arbitrary code on or obtain potentially sensitive information from the target user's system.

  6. V-006: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service

    Energy.gov [DOE]

    Two vulnerabilities were reported in CA ARCserve Backup. A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions.

  7. U-153: EMC Data Protection Advisor Server and Collector Bugs Let Remote Users Deny Service

    Energy.gov [DOE]

    Two vulnerabilities were reported in EMC Data Protection Advisor. A remote user can cause denial of service conditions.

  8. U-096: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny Service

    Energy.gov [DOE]

    A remote user can send a series of specially crafted TCP packets to trigger a kernel panic on the target system.

  9. U-055: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code

    Energy.gov [DOE]

    Two vulnerabilities exploited by the Intevydis vd_adobe_fp module in VulnDisco Step Ahead were reported in Adobe Flash Player.

  10. U-118: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information

    Energy.gov [DOE]

    Two vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can obtain potentially information.

  11. U-134: Apache Traffic Server Host Header Processing Flaw Lets Remote Users Deny Service

    Energy.gov [DOE]

    A vulnerability was reported in Apache Traffic Server. A remote user can cause denial of service conditions.

  12. U-231: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service

    Energy.gov [DOE]

    Two vulnerabilities were reported in Cisco ASA. A remote or remote authenticated user can cause denial of service conditions.

  13. U-210: Linux Kernel epoll_ctl() Bug Lets Local Users Deny Service

    Energy.gov [DOE]

    A vulnerability was reported in the Linux Kernel. A local user can cause denial of service conditions.

  14. T-662: ISC BIND Packet Processing Flaw Lets Remote Users Deny Service

    Energy.gov [DOE]

    A defect in the affected BIND 9 versions allows an attacker to remotely cause the "named" process to exit using a specially crafted packet. This defect affects both recursive and authoritative servers. The code location of the defect makes it impossible to protect BIND using ACLs configured within named.conf or by disabling any features at compile-time or run-time. A remote attacker would need to be able to send a specially crafted packet directly to a server running a vulnerable version of BIND. There is also the potential for an indirect attack via malware that is inadvertently installed and run, where infected machines have direct access to an organization's nameservers.

  15. T-617: BIND RPZ Processing Flaw Lets Remote Users Deny Service

    Energy.gov [DOE]

    When a name server is configured with a response policy zone (RPZ), queries for type RRSIG can trigger a server crash.

  16. U-227: bind-dyndb-ldap DN Escaping Flaw Lets Remote Users Deny Service

    Energy.gov [DOE]

    A vulnerability has been reported in bind-dyndb-ldap, which can be exploited by malicious people to cause a DoS (Denial of Service).

  17. T-621: Citrix XenServer Lets Local Administrative Users on the Guest OS Deny Service

    Energy.gov [DOE]

    A local administrative user on a guest operating system can interrupt the normal operation of the target hypervisor.

  18. U-161: Citrix Provisioning Services Unspecified Flaw Lets Remote Users Execute Arbitrary Code

    Energy.gov [DOE]

    A vulnerability was reported in Citrix Provisioning Services. A remote user can execute arbitrary code on the target system.

  19. T-573: Windows Remote Desktop Client DLL Loading Error Lets Remote Users Execute Arbitrary Code

    Energy.gov [DOE]

    A vulnerability was reported in Windows Remote Desktop Client. A remote user can cause arbitrary code to be executed on the target user's system.

  20. U-045: Windows Win32k.sys Keyboard Layout Bug Lets Local Users...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    ID: SA46919 IMPACT ASSESSMENT: Low Discussion: A vulnerability has been discovered in Microsoft Windows, which can be exploited by malicious, local users to cause a DoS (Denial...

  1. U-119: Blackberry PlayBook Unspecified WebKit Bug Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    7.1, and BlackBerry PlayBook tablet software ABSTRACT: A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's...

  2. @let@token Direct s-CO2 Receiver Development @tempd *@tempc

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Design objectives and features * Develop, characterize, and experimentally demonstrate a novel high-temperature direct s-CO 2 receiver * Operate with >90% thermal efficiency at 650 ◦ C outlet temperature, 10,000 thermal cycles * Unique use of geometry to improve performance and lifetime, reduce cost * Use modeling techniques and tools help understand and optimize the entire technology * Absorber is a tubular panel set arranged in a gridded geometry * Absorber is partially absorptive to

  3. T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service...

    Office of Environmental Management (EM)

    Appliances that are running versions 7.1.x, 7.2.x, 8.0.x, 8.1.x, and 8.2.x are affected when they are configured for any of the following features: * SSL VPNs * Cisco Adaptive ...

  4. T-635: Cisco AnyConnect Secure Mobility Client Lets Remote Users...

    Office of Environmental Management (EM)

    remote users with secure IPsec (IKEv2) or SSL Virtual Private Network (VPN) connections ... When the Cisco AnyConnect Secure Mobility Client is deployed from the VPN headend, an SSL ...

  5. V-165: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote...

    Office of Environmental Management (EM)

    The security issue is caused due to the application not properly verifying the server SSL certificate. This can be exploited to e.g. spoof the server via a MitM (Man-in-the-Middle) ...

  6. U-136: Adobe Flash Player Lets Remote Users Execute Arbitrary Code

    Energy.gov [DOE]

    Two vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system.

  7. T-718:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code

    Energy.gov [DOE]

    A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system.

  8. U-064: Adobe Acrobat/Reader PRC Memory Corruption Error Lets Remote Users Execute Arbitrary Code

    Energy.gov [DOE]

    A vulnerability was reported in Adobe Acrobat/Reader, this vulnerability is being actively exploited against Windows-based systems.

  9. U-079: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code

    Energy.gov [DOE]

    A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system.

  10. T-648: Avaya IP Office Manager TFTP Server Lets Remote Users Traverse the Directory

    Energy.gov [DOE]

    The software does not properly validate user-supplied input. A remote user can supply a specially crafted request to view files on target system running the IP Office Manager software.

  11. U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    in certain cases. reference LINKS: Vendor Advisory Security Tracker ID 1026744 CVE-2012-0866 IMPACT ASSESSMENT: Medium Discussion: For trigger functions marked SECURITY...

  12. U-244: McAfee Email Gateway Lets Remote Users Bypass Authentication...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    McAfee Security Bulletin ID: SB10026 SecurityTracker Alert ID: 1027444 Bugtraq ID: 55184 CVE-2012-4595, CVE-2012-4596, CVE-2012-4597 IMPACT ASSESSMENT: Medium Discussion A remote...

  13. U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    ID: 1026774 Apple Security Updates About the security content of iOS 5.1 Software Update CVE-2012-0641, CVE-2012-0642, CVE-2012-0643, CVE-2011-3453, CVE-2012-0644, CVE-2012-0585,...

  14. U-110: Samba Bug Lets Remote Users Execute Arbitrary Code | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    code on the target system. reference LINKS: Vendor Advisory Security Tracker ID 1026739 CVE-2012-0870 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Samba....

  15. U-092: Sudo Format String Bug Lets Local Users Gain Elevated Privileges

    Energy.gov [DOE]

    A local user can supply a specially crafted command line argument to trigger a format string flaw and execute arbitrary commands on the target system with root privileges.

  16. U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System

    Energy.gov [DOE]

    A vulnerability was reported in RSA Access Manager. A remote user can gain access to the target system.

  17. U-168: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service

    Energy.gov [DOE]

    Two vulnerabilities were reported in EMC Documentum Information Rights Management Server. A remote authenticated user can cause denial of service conditions.

  18. U-166: Adobe Shockwave Player Memory Corruption Flaws Let Remote Users Execute Arbitrary Code

    Energy.gov [DOE]

    Multiple vulnerabilities were reported in Adobe Shockwave Player. A remote user can cause arbitrary code to be executed on the target user's system.

  19. U-017: HP MFP Digital Sending Software Lets Local Users Obtain Potentially Sensitive Information

    Energy.gov [DOE]

    A vulnerability was reported in HP MFP Digital Sending Software. A local user can obtain potentially sensitive information.

  20. U-053: Linux kexec Bugs Let Local and Remote Users Obtain Potentially Sensitive Information

    Energy.gov [DOE]

    Several vulnerabilities were reported in Linux kexec. A remote or local user can obtain potentially sensitive information.

  1. T-653: Linux Kernel sigqueueinfo() Process Lets Local Users Send Spoofed Signals

    Energy.gov [DOE]

    A vulnerability was reported in the Linux Kernel. A local user can send spoofed signals to other processes in certain cases.

  2. T-538: HP OpenView Storage Data Protector Bug Lets Remote Users Execute Arbitrary Code

    Energy.gov [DOE]

    A vulnerability was reported in HP OpenView Storage Data Protector. A remote user can execute arbitrary code on the target system.

  3. V-199: Solaris Bugs Let Local Users Gain Root Privileges, Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    recommends applying July Critical Patch Update Addthis Related Articles V-181: Oracle Java SE Critical Patch Update Advisory - June 2013 V-051: Oracle Solaris Java Multiple...

  4. U-201: HP System Management Homepage Bugs Let Remote Users Deny Service

    Energy.gov [DOE]

    The vulnerabilities could be exploited remotely resulting in unauthorized access, disclosure of information, data modification, Denial of Service (DoS), and execution of arbitrary code.

  5. U-233: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote Authenticated Users Gain Elevated Privileges

    Office of Energy Efficiency and Renewable Energy (EERE)

    A remote authenticated user with 'Create Table' privileges can gain 'SYS' privileges on the target system.

  6. Let us count the ways. We've built programs that reflect

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    We develop computational tools, algorithms and strategies to analyze, understand, create, design and build complex engineered, natural or human systems. Contact Mark Bryden,...

  7. U-133: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Energy.gov [DOE]

    Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system.

  8. U-143: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Energy.gov [DOE]

    Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system.

  9. T-579: BlackBerry Device Software Bug in WebKit Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    or instant messages. BlackBerry has described a workaround (disabling the use of JavaScript in the BlackBerry Browser) in their advisory. BlackBerry Device storage space...

  10. U-041: Google Chrome Out-of-Bounds Write Error Lets Remote Users Execute Arbitrary Code

    Energy.gov [DOE]

    A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

  11. U-140: HP-UX Unspecified Flaw in DCE Lets Remote Users Execute Arbitrary Code

    Energy.gov [DOE]

    A remote user can execute arbitrary code on the target system. A remote user can send specially crafted data to execute arbitrary code on the target system. The code will run with the privileges of the target service.

  12. U-208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code

    Energy.gov [DOE]

    Two vulnerabilities were reported in HP Operations Agent. A remote user can execute arbitrary code on the target system

  13. T-591: VMware vmrun Utility Lets Local Users Gain Elevated Privileges

    Energy.gov [DOE]

    The VMware vmrun utility is susceptible to a local privilege escalation in non-standard configurations.

  14. U-026: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject Commands

    Energy.gov [DOE]

    A remote user can create a URL that, when loaded by the target authenticated administrative user, will execute arbitrary commands on the target system.

  15. T-652: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and Execute Arbitrary Code

    Energy.gov [DOE]

    Multiple vulnerabilities were reported in Mozilla Thunderbird. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can obtain cookies from another domain in certain cases.

  16. V-172: ISC BIND RUNTIME_CHECK Error Lets Remote Users Deny Service Against Recursive Resolvers

    Energy.gov [DOE]

    A defect exists which allows an attacker to crash a BIND 9 recursive resolver with a RUNTIME_CHECK error in resolver.c

  17. U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication

    Energy.gov [DOE]

    A vulnerability was reported in Red Hat Enterprise MRG Messaging. A remote user can access cluster messages and view the internal configuration.

  18. U-068:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated Privileges

    Energy.gov [DOE]

    Vulnerability was reported in FreeBSD Telnet. A remote user can execute arbitrary code on the target system.

  19. U-094: EMC Documentum Content Server Lets Local Administrative Users Gain Elevated Privileges

    Energy.gov [DOE]

    EMC Documentum Content Server contains a privilege elevation vulnerability that may allow an unauthorized user to obtain highest administrative privileges on the system.

  20. V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system CVE-2013-1009,...

  1. V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    1) An unspecified error when handling TeXML files can be exploited to cause memory corruption. 2) A boundary error when handling H.263 encoded movie files can be exploited to...

  2. T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system - CVE-2010-1823,...

  3. U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system CVE-2011-3016, CVE-2011-3021,...

  4. T-541: Citrix Provisioning Services Unspecified Flaw Let's Remote Users Execute Arbitrary Code

    Energy.gov [DOE]

    A vulnerability has been identified in Citrix Provisioning Services that could result in arbitrary code execution. This vulnerability can be triggered by an attacker sending a specially crafted packet to the Provisioning Services server. This vulnerability is present in all supported versions of Citrix Provisioning Services up to and including version 5.6.

  5. U-088: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary Code

    Energy.gov [DOE]

    Two vulnerabilities were reported in Symantec pcAnywhere. A remote user can execute arbitrary code on the target system. A local user can obtain elevated privileges on the target system.

  6. U-232: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny...

    Energy.gov [DOE] (indexed site)

    unavailable and may cause the domain 0 kernel to panic. There is no requirement for memory sharing to be in use. Impact: A guest kernel can cause the host to become unresponsive...

  7. T-663: Cisco Content Services Gateway ICMP Processing Flaw Lets Remote Users Deny Service

    Office of Energy Efficiency and Renewable Energy (EERE)

    The Cisco Content Services Gateway: Second Generation provides intelligent network capabilities such as flexible policy management and billing based on deep-packet inspection, as well as subscriber and application awareness capabilities that enable mobile operators to quickly and easily offer value-added, differentiated services over their mobile data networks. A DoS vulnerability exists in the Cisco Content Services Gateway: Second Generation could allow an unauthenticated attacker to cause a device reload by sending crafted ICMP messages to the affected device. Note: The Cisco Gateway GPRS Support Node (GGSN), the Cisco Mobile Wireless Home Agent (HA), the Cisco Wireless Security Gateway (WSG), the Cisco Broadband Wireless Gateway and Cisco IP Transfer Point (ITP), and the Cisco Long Term Evolution (LTE) Gateway are not affected. This vulnerability is documented in Cisco bug ID CSCtl79577 ( registered customers only) and has been assigned CVE ID CVE-2011-2064.

  8. T-647: PHP File Upload Bug May Let Remote Users Overwrite Files on the Target System

    Office of Energy Efficiency and Renewable Energy (EERE)

    PHP is prone to a security-bypass vulnerability.Successful exploits will allow an attacker to delete files from the root directory, which may aid in further attacks. PHP 5.3.6 is vulnerable; other versions may also be affected.

  9. Letting the Sun Shine on Solar Costs: An Empirical Investigation of Photovoltaic Cost Trends in California

    SciTech Connect

    Wiser, R.; Bolinger, M.; Cappers, P.; Margolis, R.

    2006-01-01

    This report provides a comprehensive analysis of grid-connected solar photovoltaic (PV) cost trends in California, which is by far the largest PV market in the United States. The findings of this work may help stakeholders to understand important trends in the California PV market, and policymakers to design more effective solar incentive programs--a particularly important objective given the recent announcement from the California Public Utilities Commission (CPUC) to establish an 11-year, $3.2 billion incentive program for customer-sited solar. The study statistically analyzes the installed cost of grid-connected PV systems funded by the state's two largest solar rebate programs, overseen by the California Energy Commission (CEC) [operating since 1998] and the CPUC [operating since 2001].

  10. U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code

    Energy.gov [DOE]

    A remote user can cause arbitrary code to be executed on the target user's system. A remote user can conduct cross-site scripting attacks. A remote user can obtain potentially sensitive information.

  11. U-160: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Energy.gov [DOE]

    Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system

  12. U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code

    Energy.gov [DOE]

    Multiple vulnerabilities were reported in Apple QuickTime. A remote user can cause arbitrary code to be executed on the target user's system.

  13. U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...

    Energy Saver

    iOS. A remote user can cause arbitrary code to be executed on the target user's system. ... A remote user can create a specially crafted file that, when loaded by the target user, ...

  14. V-210: HP LaserJet Pro Printer Bug Lets Remote Users Access Data

    Energy.gov [DOE]

    A potential security vulnerability has been identified with certain HP LaserJet Pro printers. The vulnerability could be exploited remotely to gain unauthorized access to data.

  15. Turn Down the Temp, But Don't Let Your Pipes Freeze! | Department of Energy

    Energy Saver

    of Energy Turbines in U.S. Waters Will Soon Spin Wind into Electricity Turbines in U.S. Waters Will Soon Spin Wind into Electricity February 24, 2012 - 10:23am Addthis This is an excerpt from the First Quarter 2012 edition of the Wind Program R&D Newsletter. DOE releases Offshore Demonstration Project Solicitation Approximately 75,000 Americans are currently employed by the U.S. wind energy industry, and that's solely for projects on land. Imagine what will happen to job growth in this

  16. U-192: VMware Workstation/Player VM Remote Device Bug Lets Local...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    aBSTRACT: A local or remote user can cause denial of service conditions on the target virtual system. reference LINKS: Vendor Advisory Security Tracker ID 1027173 CVE-2012-3289...

  17. V-218: HP Service Manager Unspecified Flaw Lets Remote Users Gain Unauthorized Access

    Energy.gov [DOE]

    This security update resolves a vulnerability in the HP Service Manager which allows people to have access to unauthorized information

  18. T-571: Linux Kernel dns_resolver Key Processing Error Lets Local Users Deny Services

    Energy.gov [DOE]

    A vulnerability was reported in the Linux Kernel. A local user can cause denial of service conditions.

  19. T-719:Apache mod_proxy_ajp HTTP Processing Error Lets Remote Users Deny Service

    Energy.gov [DOE]

    A remote user can cause the backend server to remain in an error state until the retry timeout expires.

  20. BLM and NEPA: Lets`s get back to the future

    SciTech Connect

    Meridith, D.P.

    1995-12-01

    This talk is a personalized account of the relationship between The National Environmental Policy Act (NEPA) and the Bureau of Land Management (BLM) and the challenges the BLM faces in the future.

  1. T-692: VMware vFabric tc Server Lets Remote Users Login Using...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    A remote user can login using an obfuscated version of their password. PLATFORM: ... user can use the password in obfuscated form (or in plain text form) to authenticate. ...

  2. U-130: JBoss Operations Network LDAP Authentication Bug Lets Remote Users Bypass Authentication

    Office of Energy Efficiency and Renewable Energy (EERE)

    A vulnerability was reported in JBoss Operations Network. A remote user can login with an arbitrary password in certain cases.

  3. U-004:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Energy.gov [DOE]

    A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

  4. Let's Keep Talking: Women in STEM Tweet Up | Department of Energy

    Office of Environmental Management (EM)

    file photo Gloria B. Smith Deputy Director, Office of Diversity & Inclusion We recently held a Tweet Up about women in science, technology, engineering, and mathematics (STEM). ...

  5. T-608: HP Virtual Server Environment Lets Remote Authenticated Users Gain Elevated Privileges

    Energy.gov [DOE]

    A potential security vulnerability has been identified in HP Virtual Server Environment for Windows. The vulnerability could be exploited remotely to elevate privileges.

  6. V-188: Apache XML Security XPointer Expressions Processing Buffer...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    8: Apache XML Security XPointer Expressions Processing Buffer Overflow Vulnerability V-188: Apache XML Security XPointer Expressions Processing Buffer Overflow Vulnerability June...

  7. 2015 Domestic Uranium Production Report

    Energy Information Administration (EIA) (indexed site)

    Prior editions of this report may be found: http:www.eia.govnuclearreports.cfm ... U.S. uranium mills and heap leach facilities by owner, location, capacity, and ...

  8. Beijing Jike Energy New Technology Development Co Ltd | Open...

    OpenEI (Open Energy Information) [EERE & EIA]

    China Zip: 100080 Sector: Geothermal energy, Wind energy Product: Focuses on photovoltaics (PV), windPV hybrid power systems and Geothermal heap pump systems. References:...

  9. Using High Performance Libraries and Tools

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    High Performance Libraries and Tools Using High Performance Libraries and Tools Memkind Library on Edison The memkind library is a user extensible heap manager built on top of ...

  10. T-615: IBM Rational System Architect ActiveBar ActiveX Control Lets Remote Users Execute Arbitrary Code

    Energy.gov [DOE]

    There is a high risk security vulnerability with the ActiveBar ActiveX controls used by IBM Rational System Architect.

  11. U-007: IBM Rational AppScan Import/Load Function Flaws Let Remote Users Execute Arbitrary Code

    Energy.gov [DOE]

    Two vulnerabilities were reported in IBM Rational AppScan. A remote user can cause arbitrary code to be executed on the target user's system.

  12. U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs

    Energy.gov [DOE]

    Two vulnerabilities were reported in Apple iOS. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can spoof the address bar URL.

  13. T-633: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets Remote Users Deny Service

    Energy.gov [DOE]

    A remote DNS server can supply very large RRSIG RRsets in a negative response to trigger an off-by-one error in a buffer size check and cause the target requesting named process to crash. A remote user can cause named to crash.

  14. U-232: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the Host OS

    Energy.gov [DOE]

    A vulnerability was reported in Xen. A local user on a guest operating system can cause denial of service conditions on the host.

  15. U-012: BlackBerry Enterprise Server Collaboration Service Bug Lets Remote Users Impersonate Intra-organization Messages

    Office of Energy Efficiency and Renewable Energy (EERE)

    A vulnerability was reported in BlackBerry Enterprise Server. A remote user can impersonate another messaging user within the same organization.

  16. T-609: Adobe Acrobat/Reader Memory Corruption Error in CoolType Library Lets Remote Users Execute Arbitrary Code

    Energy.gov [DOE]

    A remote user can create a specially crafted PDF file that, when loaded by the target user, will trigger a memory corruption error in the CoolType library and execute arbitrary code on the target system. The code will run with the privileges of the target user.

  17. V-058: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code

    Energy.gov [DOE]

    A vulnerability was reported in Microsoft Internet Explorer. A remote user can cause arbitrary code to be executed on the target user's system.

  18. U-015: CiscoWorks Common Services Home Page Input Validation Flaw Lets Remote Users Execute Arbitrary Commands

    Energy.gov [DOE]

    Successful exploitation of this vulnerability may allow an authenticated, remote attacker to execute arbitrary commands on the affected system with the privileges of a system administrator.

  19. U-193: NetBSD System Call Return Value Validation Flaw Lets Local Users Gain Elevated Privileges

    Energy.gov [DOE]

    On Intel CPUs, the sysret instruction can be manipulated into returning to specific non-canonical addresses, which may yield a CPU reset. We cannot currently rule out with utter confidence that this vulnerability could not also be used to execute code with kernel privilege instead of crashing the system.

  20. From ZZ to ZH : How Low Can These Cross Sections Go or Everybody, Let's Cross Section Limbo!

    SciTech Connect

    Strauss, Emanuel Alexandre; /SUNY, Stony Brook

    2009-08-01

    We report on two searches performed at the D0 detector at the Fermi National Laboratory. The first is a search for Z di-boson production with a theoretical cross section of 1.4 pb. The search was performed on 2.6 fb{sup -1} of data and contributed to the first observation of ZZ production at a hadron collider. The second is a search for a low mass Standard Model Higgs in 4.2 fb{sup -1} of data. The Higgs boson is produced in association with a Z boson where the Higgs decays hadronically and the Z decays to two leptons. The ZZ search was performed in both the di-electron and di-muon channels. For the ZH search, we will focus on the muonic decays where we expanded the traditional coverage by considering events in which one of the two muons fails the selection requirement, and is instead reconstructed as an isolated track. We consider Higgs masses between 100 and 150 GeV, with theoretical cross sections ranging from 0.17 to 0.042 pb, and set upper limits on the ZH production cross-section at 95% confidence level.

  1. U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated Privileges, Inject SQL Commands, and Spoof Certificates

    Energy.gov [DOE]

    A remote authenticated user can gain elevated privileges. A remote authenticated user can inject SQL commands. A remote user can spoof connections in certain cases.

  2. T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request Forgery Attacks and Execute Arbitrary Code

    Energy.gov [DOE]

    Mozilla developers identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and Mozilla presume that with enough effort at least some of these could be exploited to run arbitrary code.

  3. U-063: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code

    Energy.gov [DOE]

    A remote user can cause the target application to execute arbitrary code on the target user's system.

  4. U-230: Sudo on Red Hat Enterprise Linux %postun Symlink Flaw Lets Local Users Gain Elevated Privileges

    Office of Energy Efficiency and Renewable Energy (EERE)

    An updated sudo package that fixes one security issue and several bugs is now available for Red Hat Enterprise Linux 5.

  5. T-563: Red Hat Directory Server Bugs Let Local Users Gain Elevated Privileges and Remote and Local Users Deny Service

    Energy.gov [DOE]

    Several vulnerabilities were reported in Red Hat Directory Server. A local user can obtain elevated privileges on the target system. A remote user can cause denial of service conditions. A local user can cause denial of service conditions.

  6. U-217: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site Scripting and Denial of Service Attacks

    Office of Energy Efficiency and Renewable Energy (EERE)

    Two vulnerabilities were reported in Red Hat Certificate System. A remote user can conduct cross-site scripting attacks. A remote authenticated user can revoke the CA certificate.

  7. U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote Users Execute Arbitrary Code and Deny Service

    Energy.gov [DOE]

    A remote user can create a Java applet or Java Web Start application that, when loaded by the target user, will access or modify data or execute arbitrary code on the target user's system.

  8. U-119: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute Arbitrary Code

    Energy.gov [DOE]

    A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system

  9. U-155: WebCalendar Access Control and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code

    Office of Energy Efficiency and Renewable Energy (EERE)

    Two vulnerabilities were reported in WebCalendar. A remote user may be able to execute arbitrary PHP code on the target system.

  10. U-211: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories

    Office of Energy Efficiency and Renewable Energy (EERE)

    A vulnerability was reported in EMC Celerra/VNX/VNXe. A remote authenticated user can access files and directories on the target file system.

  11. U-074: Microsoft.NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users

    Energy.gov [DOE]

    A remote user can execute arbitrary commands on the target system. A remote user can access a target user's account. A remote user can redirect users to arbitrary sites.

  12. U-163: PHP Command Parameter Bug Lets Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code

    Energy.gov [DOE]

    A vulnerability was reported in PHP. A remote user can obtain potentially sensitive information. A remote user can execute arbitrary code on the target system.

  13. U-008: Symantec Data Loss Prevention Bugs in KeyView Filter Lets Remote Users Deny Service

    Energy.gov [DOE]

    A remote user can create a file that, when processed by the target filter, will cause partial denial of service conditions.

  14. V-117: Symantec Enterprise Vault for File System Archiving Unquoted Search Path Lets Local Users Gain Elevated Privileges

    Energy.gov [DOE]

    Symantec Enterprise Vault (EV) for File System Archiving has an unquoted search path in the File Collector and File PlaceHolder services

  15. U-006:Cisco Network Admission Control Manager Directory Traversal Flaw Lets Remote Users Obtain Potentially Sensitive Information

    Office of Energy Efficiency and Renewable Energy (EERE)

    An unauthenticated attacker could exploit this vulnerability to access sensitive information, including password files and system logs, that could be leveraged to launch subsequent attacks.

  16. U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges

    Office of Energy Efficiency and Renewable Energy (EERE)

    Several vulnerabilities were reported in Apple OS X. A remote user can execute arbitrary code on the target system. A remote user can obtain a password hash in certain cases. A local user can obtain elevated privileges on the target system. A local user can obtain password keystrokes.

  17. Sandia National Laboratories: Products and Services

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Gages, Fixtures, Molds Power Sources & Batteries Manufacturing, Shop Overflow through the Manufacturing Processes & Services Department Energy, Security & International Procurement...

  18. memP

    Energy Science and Technology Software Center

    2010-02-05

    The lightweight heap profiling tool memP Version 1 provides a library that can be used with MPI applications that make use of heap memory allocations to provide profile data based on the per-task high-water-mark of heap allocation. The memP output is generated as a text report that can present summary information or specific detail of the allocation call site data for each task The memP library source code is based on teh mpiP MPI profilingmore » library (http://mpip.sourceforge.net), but is substantially different in functionality and organization.« less

  19. T-635: Cisco AnyConnect Secure Mobility Client Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges

    Energy.gov [DOE]

    Cisco AnyConnect Secure Mobility Client contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on a targeted system. The vulnerability exists due to improper validation of program executables downloaded by the Cisco AnyConnect Secure Mobility Client. An unauthenticated, remote attacker could exploit the vulnerability by convincing the targeted user to view a malicious website. If successful, the attacker could execute arbitrary code on the system with the privileges of the user. Cisco confirmed the vulnerability in a security advisory and released software updates.

  20. T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code

    Energy.gov [DOE]

    An attacker can exploit this issue by enticing an unsuspecting victim into visiting a malicious website.

  1. Health effects models for nuclear power plant accident consequence analysis: Low LET radiation: Part 2, Scientific bases for health effects models

    SciTech Connect

    Abrahamson, S.; Bender, M.; Book, S.; Buncher, C.; Denniston, C.; Gilbert, E.; Hahn, F.; Hertzberg, V.; Maxon, H.; Scott, B.

    1989-05-01

    This report provides dose-response models intended to be used in estimating the radiological health effects of nuclear power plant accidents. Models of early and continuing effects, cancers and thyroid nodules, and genetic effects are provided. Two-parameter Weibull hazard functions are recommended for estimating the risks of early and continuing health effects. Three potentially lethal early effects -- the hematopoietic, pulmonary and gastrointestinal syndromes -- are considered. Linear and linear-quadratic models are recommended for estimating cancer risks. Parameters are given for analyzing the risks of seven types of cancer in adults -- leukemia, bone, lung, breast, gastrointestinal, thyroid and ''other''. The category, ''other'' cancers, is intended to reflect the combined risks of multiple myeloma, lymphoma, and cancers of the bladder, kidney, brain, ovary, uterus and cervix. Models of childhood cancers due to in utero exposure are also provided. For most cancers, both incidence and mortality are addressed. Linear and linear-quadratic models are also recommended for assessing genetic risks. Five classes of genetic disease -- dominant, x-linked, aneuploidy, unbalanced translocation and multifactorial diseases --are considered. In addition, the impact of radiation-induced genetic damage on the incidence of peri-implantation embryo losses is discussed. The uncertainty in modeling radiological health risks is addressed by providing central, upper, and lower estimates of all model parameters. Data are provided which should enable analysts to consider the timing and severity of each type of health risk. 22 refs., 14 figs., 51 tabs.

  2. 'Let the phage do the work': Using the phage P22 coat protein structures as a framework to understand its folding and assembly mutants

    SciTech Connect

    Teschke, Carolyn M.; Parent, Kristin N.

    2010-06-05

    The amino acid sequence of viral capsid proteins contains information about their folding, structure and self-assembly processes. While some viruses assemble from small preformed oligomers of coat proteins, other viruses such as phage P22 and herpesvirus assemble from monomeric proteins (Fuller and King, 1980). The subunit assembly process is strictly controlled through protein:protein interactions such that icosahedral structures are formed with specific symmetries, rather than aberrant structures. dsDNA viruses commonly assemble by first forming a precursor capsid that serves as a DNA packaging machine. DNA packaging is accompanied by a conformational transition of the small precursor procapsid into a larger capsid for isometric viruses. Here we highlight the pseudo-atomic structures of phage P22 coat protein and rationalize several decades of data about P22 coat protein folding, assembly and maturation generated from a combination of genetics and biochemistry.

  3. V-183: Cisco TelePresence TC and TE Bugs Let Remote Users Deny Service and Remote Adjacent Authenticated Users Gain Root Shell Access

    Energy.gov [DOE]

    Cisco TelePresence TC and TE Software contain two vulnerabilities in the implementation of the Session Initiation Protocol (SIP) that could allow an unauthenticated remote attacker to cause a denial of service (DoS) condition. Additionally, Cisco TelePresence TC Software contain an adjacent root access vulnerability that could allow an attacker on the same physical or logical Layer-2 network as the affected system to gain an unauthenticated root shell.

  4. Individual variation in p53 and Cip1 expression profiles in normal human fibroblast strains following exposure to high-let radiation

    SciTech Connect

    Carpenter, T.R.; Johnson, N.F.; Gilliland, F.D.

    1995-12-01

    Exposure to {alpha}-particles emitted by radon progeny appears to be the second-leading cause of lung cancer mortality. However, individual susceptibility to the carcinogenic effects of {alpha}-particles remains poorly characterized. Variation in susceptibility to cancer produced by certian classes of DNA-damaging chemicals is suspected to involve differences in metabolic activation and detoxication. Susceptibility to {alpha}-particle-induced cancer may involve variations in capacity or opportunity to repair DNA damage. Subtle variations in DNA repair capacity would more likely explain radon-related lung cancer susceptibility. The p53 tumor suppressor protein accumulates as a cellular response to DNA damage from ionizing radiation and regulates arrest in the G{sub 1} portion of the cell cycle. Arrest in G{sub 1} portion of the cell cycle. While upstream regulation of p53 protein stability is poorly understood, variations in the ability to accumulate p53 following DNA damage represent potential variations in lung cancer susceptibility related to radon progeny. Further, transcription of the cell-cycle regulatory gene Cip1 is regulated by p53 and increases following ionizing radiation. Therefore, variations in the expression of Cip1 following {alpha}-particle exposure may also be a susceptibility factor in radon-related lung cancers. The purpose of the present investigation was to measure p53 and Cip1 protein induction following {alpha}-particle exposure of fibroblast lines from nine individuals to determine if there were significant variations. The expression of Cip1 protein indicates the differences in response are biologically relevant.

  5. U-081: McAfee SaaS 'myCIOScn.dll' ActiveX Control Lets Remote Users Execute Arbitrary Code

    Energy.gov [DOE]

    A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

  6. 2015 Domestic Uranium Production Report

    Energy Information Administration (EIA) (indexed site)

    May 5, 2016" "Next Release Date: May 2017" "Table 4. U.S. uranium mills and heap leach facilities by owner, location, capacity, and operating status at end of the year, 2011-15" ...

  7. 2nd Quarter 2016 Domestic Uranium Production Report

    Energy Information Administration (EIA) (indexed site)

    Source: U.S. Energy Information Administration: Form EIA-851A and Form EIA-851Q, "Domestic Uranium Production Report." Table 3. U.S. uranium mills and heap leach facilities by ...

  8. Programming Tuning Options on Hopper

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    for its internal buffers too. When to Use Huge Pages For MPI applications, map the static data andor heap onto huge pages. For SHMEM applications, map the static data and...

  9. V-003: Suse Update For Mozillafirefox - Critical | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    * MFSA 2012-86CVE-2012-4185CVE-2012-4186CVE-2012-4187 CVE-2012-4188 Heap memory corruption issues found using Address Sanitizer * MFSA 2012-87CVE-2012-3990 (bmo787704)...

  10. U-115: Novell GroupWise Client Address Book Processing Buffer...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    is vulnerable to an exploit where a malformed address book could cause heap memory corruption, which could lead to remote code execution under the privilege of the user that...

  11. Using High Performance Libraries and Tools

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    High Performance Libraries and Tools Using High Performance Libraries and Tools Memkind Library on Edison The memkind library is a user extensible heap manager built on top of jemalloc which enables control of memory characteristics and a partitioning of the heap between kinds of memory (including user defined kinds of memory). This library can be used to simulate the benefit of the high bandwidth memory that will be available on KNL system on the dual socket Edison compute nodes (the two

  12. New York City Transit Hybrid and CNG Transit Buses: Interim Evaluation...

    Alternative Fuels and Advanced Vehicles Data Center

    ... have been: * Radiator baffle-surge tank overflowing * Water in wiringconnectors * Engine grid heater relay * Water in engine from air intake * Issues with the triple pump * ...

  13. U-207: Pidgin 'mxit_show_message()' Function Stack-Based Buffer...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    PROBLEM: Pidgin 'mxitshowmessage()' Function Stack-Based Buffer Overflow Vulnerability. PLATFORM: Versions prior to Pidgin 2.10.5 vulnerable. ABSTRACT: Pidgin is prone to a...

  14. Useful Graphs and Charts - Ion Beams - Radiation Effects Facility...

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Times 15 MeVu LET vs Range Graph 25 MeVu LET vs Range Graph 40 Mevu LET vs Range Graph Radiation Effects Facility Cyclotron Institute Texas A&M University MS 3366 ...

  15. All Beams 2013.xls

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Mass (amu) A MeV Total Energy (MeV) Energy at Bragg Peak (MeV) Range in Si (m) Range at Bragg (m) Range to Bragg Peak (m) Initial LET (vacuum) Initial LET (air) LET at...

  16. V-117: Symantec Enterprise Vault for File System Archiving Unquoted...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    for File System Archiving Unquoted Search Path Lets Local Users Gain Elevated Privileges V-117: Symantec Enterprise Vault for File System Archiving Unquoted Search Path Lets Local...

  17. V-177: VMware vCenter Chargeback Manager File Upload Handling...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Apache modproxymodrewrite Bug Lets Remote Users Access Internal Servers U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code...

  18. Apparatus for controlling coolant level in a liquid-metal-cooled nuclear reactor

    DOEpatents

    Jones, Robert D.

    1978-01-01

    A liquid-metal-cooled fast-breeder reactor which has a thermal liner spaced inwardly of the pressure vessel and includes means for passing bypass coolant through the annulus between the thermal liner and the pressure vessel to insulate the pressure vessel from hot outlet coolant includes control ports in the thermal liner a short distance below the normal operating coolant level in the reactor and an overflow nozzle in the pressure vessel below the control ports connected to an overflow line including a portion at an elevation such that overflow coolant flow is established when the coolant level in the reactor is above the top of the coolant ports. When no makeup coolant is added, bypass flow is inwardly through the control ports and there is no overflow; when makeup coolant is being added, coolant flow through the overflow line will maintain the coolant level.

  19. Domestic Uranium Production Report - Quarterly

    Gasoline and Diesel Fuel Update

    3. U.S. uranium mills and heap leach facilities by owner, location, capacity, and operating status Operating status at the end of Owner Mill and Heap Leach1 Facility name County, state (existing and planned locations) Capacity (short tons of ore per day) 2015 1st Quarter 2016 2nd quarter 2016 Anfield Resources Inc. Shootaring Canyon Uranium Mill Garfield, Utah 750 Standby Standby Standby EFR White Mesa LLC White Mesa Mill San Juan, Utah 2,000 Operating-Processing Alternate Feed

  20. Improving Reuse & Recycling | Critical Materials Institute

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Improving Reuse & Recycling series of images of recycling: trash heap, light bulbs, circuit boards diagram for focus area three, improving reuse and recycling (A click on the org chart image will lead to a pdf version that includes hotlinks for the e-mail addresses of the leaders.)

  1. Parking and Cafe Changes to Accommodate Cyber Summit | Jefferson...

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Parking and Cafe Changes to Accommodate Cyber Summit Sept. 18-23: JLab Road, Parking and ... and the Support Service Center (Rutherford Road) and the ARC building's overflow parking ...

  2. Valve for controlling solids flow

    DOEpatents

    Staiger, M.D.

    1982-09-29

    A valve for controlling the flow of solids comprises a vessel having an overflow point, an inlet line for discharging solids into the vessel positioned within the vessel such that the inlet line's discharge point is lower than the vessel's overflow point, and means for introducing a fluidizing fluid into the vessel. The fluidizing fluid fluidizes the solids within the vessel so that they overflow at the vessel's overflow point. For the removal of nuclear waste product the vessel may be placed within a sealed container having a bottom connected transport line for transporting the solids to storage or other sites. The rate of solids flow is controlled by the flow rate of the fluidizing fluid and by V-notch weirs of different sizes spaced about the top of the vessel.

  3. CX-008279: Categorical Exclusion Determination

    Energy.gov [DOE]

    Building 8 Compressor Aftercooler Rupture Disc Overflow Piping Project CX(s) Applied: B1.3, B1.15 Date: 05/09/2012 Location(s): West Virginia Offices(s): National Energy Technology Laboratory

  4. EECBG Success Story: Georgia County Turning Industrial and Farm Waste Into Big Energy Savings

    Energy.gov [DOE]

    Gwinnett County, Georgia built a "Gas to Energy" system at the city water resources center that will reduce operational costs and sanitary sewer overflows, thanks to an Energy Efficiency and Conservation Block Grant (EECBG). Learn more.

  5. CX-008336: Categorical Exclusion Determination

    Office of Energy Efficiency and Renewable Energy (EERE)

    Pad 90 Overflow Parking Lot Project CX(s) Applied: B1.15 Date: 05/01/2012 Location(s): New York Offices(s): Naval Nuclear Propulsion Program

  6. Stochastic Consequence Analysis for Waste Leaks

    SciTech Connect

    HEY, B.E.

    2000-05-31

    This analysis evaluates the radiological consequences of potential Hanford Tank Farm waste transfer leaks. These include ex-tank leaks into structures, underneath the soil, and exposed to the atmosphere. It also includes potential misroutes, tank overflow

  7. CX-008202: Categorical Exclusion Determination

    Energy.gov [DOE]

    Renewable Energy Ground Mounted Photovoltaic Grid System Overflow CX(s) Applied: B5.16 Date: 03/29/2012 Location(s): Other Location Offices(s): Golden Field Office

  8. 05-05-2010 NNSA-B-10-0144

    National Nuclear Security Administration (NNSA)

    elevated water storage tanks located in Coyote Test Field (CTF). The overflow lines are required to extend to within 18 inches (in.) of ground level by the American Water Workers ...

  9. Valve for controlling solids flow

    DOEpatents

    Staiger, M. Daniel (Idaho Falls, ID)

    1985-01-01

    A valve for controlling the flow of solids comprises a vessel having an overflow point, an inlet line for discharging solids into the vessel positioned within the vessel such that the inlet line's discharge point is lower than the vessel's overflow point, and apparatus for introducing a fluidizing fluid into the vessel. The fluidizing fluid fluidizes the solids within the vessel so that they overflow at the vessel's overflow point. For the removal of nuclear waste product the vessel may be placed within a sealed container having a bottom connected transport line for transporting the solids to storage or other sites. The rate of solids flow is controlled by the flow rate of the fluidizing fluid and by V-notch weirs of different sizes spaced about the top of the vessel.

  10. Subterranean drilling and in situ treatment of wastes using a contamination control system and methods relating thereto

    DOEpatents

    Jessmore, James J.; Loomis, Guy G.; Pettet, Mark C.; Flyckt, Melissa C.

    2004-09-28

    Systems and methods relating to subterranean drilling while maintaining containment of any contaminants released during the drilling. A thrust block installed over a zone of interest provides an overflow space for retaining any contaminants and excess sealant returns. Negative air pressure may be maintained in the overflow space by a ventilation system. Access ports in the thrust block seal the overflow space from the surrounding environment with a membrane seal. A flexible sack seal in the access port may be connected to a drill shroud prior to drilling, providing containment during drilling after the drill bit penetrates the membrane seal. The drill shroud may be adapted to any industry standard drilling rig and includes a connection conduit for connecting to the flexible sack seal and a flexible enclosure surrounding the drill shaft and of a length to accommodate full extension thereof. Upon withdrawal, the sack seal may be closed off and separated, maintaining containment of the overflow space and the drill shroud.

  11. Preparing for a Fun and Energy Efficient Halloween | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Addthis Don't let your energy bill scare you this Halloween, Energy Saver has tips to save money and energy. | Photo courtesy of iStockphoto.comknape Don't let your energy ...

  12. V-227: VMware Workstation and Player vmware-mount Command Flaw...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Workstation and Player vmware-mount Command Flaw Lets Local Users Gain Root Privileges V-227: VMware Workstation and Player vmware-mount Command Flaw Lets Local Users Gain Root...

  13. Microsoft Word - Chicago Transcript 10 07 08 FINAL.doc

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    ... And we have now moved to a solar renewable energy ... So let me ask the panel again for particular data sources, ... Fred Butler: Let me take a crack at it from the policy angle...

  14. V-058: Microsoft Internet Explorer CDwnBindInfo Object Reuse...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    8: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code V-058: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets Remote...

  15. QER- Comment of Xcel Energy

    Office of Energy Efficiency and Renewable Energy (EERE)

    Attached are the comments of Xcel Energy Services Inc. Please let me know if you have any questions.

  16. V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    and Let Local Users Bypass Security Restrictions | Department of Energy 26: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions November 16, 2012 - 6:00am Addthis PROBLEM: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions. PLATFORM: RSA

  17. Desulfurization of coal and petroleum. (Latest citations from the NTIS bibliographic database). Published Search

    SciTech Connect

    1995-02-01

    The bibliography contains citations concerning the desulfurization of coal, coal liquids, and crude oil. Flotation heap leaching, oxydesulfurization, metal oxide, microwave process, and chlorination are among the pre-combustion processes discussed. Coal liquefaction and gasification are only included if sulfur removal is stressed. Flue gas desulfurization and other post-combustion sulfur control processes are excluded. (Contains 250 citations and includes a subject term index and title list.)

  18. Desulfurization of coal and petroleum. (Latest citations from the NTIS bibliographic database). Published Search

    SciTech Connect

    1997-02-01

    The bibliography contains citations concerning the desulfurization of coal, coal liquids, and crude oil. Flotation heap leaching, oxydesulfurization, metal oxide, microwave process, and chlorination are among the pre-combustion processes discussed. Coal liquefaction and gasification are only included if sulfur removal is stressed. Flue gas desulfurization and other post-combustion sulfur control processes are excluded. (Contains 50-250 citations and includes a subject term index and title list.) (Copyright NERAC, Inc. 1995)

  19. Desulfurization of coal and petroleum. (Latest citations from the NTIS bibliographic database). Published Search

    SciTech Connect

    1996-04-01

    The bibliography contains citations concerning the desulfurization of coal, coal liquids, and crude oil. Flotation heap leaching, oxydesulfurization, metal oxide, microwave process, and chlorination are among the pre-combustion processes discussed. Coal liquefaction and gasification are only included if sulfur removal is stressed. Flue gas desulfurization and other post-combustion sulfur control processes are excluded. (Contains 50-250 citations and includes a subject term index and title list.) (Copyright NERAC, Inc. 1995)

  20. Desulfurization of coal and petroleum. (Latest citations from the NTIS bibliographic database). Published Search

    SciTech Connect

    Not Available

    1994-02-01

    The bibliography contains citations concerning the desulfurization of coal, coal liquids, and crude oil. Flotation heap leaching, oxydesulfurization, metal oxide, microwave process, and chlorination are among the pre-combustion processes discussed. Coal liquefaction and gasification are only included if sulfur removal is stressed. Flue gas desulfurization and other post-combustion sulfur control processes are excluded. (Contains 250 citations and includes a subject term index and title list.)

  1. Indian Country Solar Energy Potential Estimates & DOE IE Updates

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Financing Colton Heaps National Renewable Energy Laboratory 1 2 1 Potential 3 Refinement 5 Operations & Maintenance 2 Options 4 Implementation 3 Refinement Potential Options Refinement Implementation Operations & Maintenance 60% Implementation 25% Refinement 10% Design 5% Potential What is a "Project"? A completed project is a business with commercial activity. Parent Entity Project Development Stages - % Resource Inputs, Time/$ Project Entity 3 4 4 Host Electricity Sales (PPA)

  2. The Unobtrusive Memory Allocator

    Energy Science and Technology Software Center

    2003-03-31

    This library implements a memory allocator/manager which ask its host program or library for memory refions to manage rather than requesting them from the operating system. This allocator supports multiple distinct heaps within a single executable, each of which may grow either upward or downward in memory. The GNU mmalloc library has been modified in such a way that its allocation algorithms have been preserved, but the manner in which it obtains regions to managemore » has been changed to request memory from the host program or library. Additional modifications allow the allocator to manage each heap as either upward or downward-growing. By allowing the hosting program or library to determine what memory is managed, this package allows a greater degree of control than other memory allocation/management libraries. Additional distinguishing features include the ability to manage multiple distinct heaps with in a single executable, each of which may grow either upward or downward in memory. The most common use of this library is in conjunction with the Berkeley Unified Parallel C (UPC) Runtime Library. This package is a modified version of the LGPL-licensed "mmalloc" allocator from release 5.2 of the "gdb" debugger's source code.« less

  3. THIRD SUPPLEMENT TO LOAN GUARANTEE SOLICITATION ANNOUNCEMENT

    Energy Saver

    Security Controls | Department of Energy 6: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls January 18, 2011 - 2:30pm Addthis PROBLEM: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls. PLATFORM: Cisco 5500 Series Adaptive Security Appliances (ASA) ABSTRACT: Cisco ASA 5500 Series Adaptive Security Appliances are affected by multiple

  4. T-678: Red Hat Enterprise Virtualization Hypervisor VLAN Packet Processing

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Flaw Lets Remote Users Deny Service | Department of Energy 8: Red Hat Enterprise Virtualization Hypervisor VLAN Packet Processing Flaw Lets Remote Users Deny Service T-678: Red Hat Enterprise Virtualization Hypervisor VLAN Packet Processing Flaw Lets Remote Users Deny Service July 28, 2011 - 3:47pm Addthis PROBLEM: A vulnerability was reported in Red Hat Enterprise Virtualization Hypervisor. A remote user can cause denial of service conditions. PLATFORM: Red Hat Enterprise

  5. Ion Beams - Radiation Effects Facility / Cyclotron Institute...

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Various ion beams have been developed specifically for the Radiation Effects Facility. ... Range Graph 40 Mevu LET vs Range Graph Radiation Effects Facility Cyclotron Institute ...

  6. U.S. Department of Energy Interim E-QIP Procedures | Department...

    Energy.gov [DOE] (indexed site)

    Energy Security Symposium OE Releases Second Issue of Energy Emergency Preparedness Quarterly (April 2012) V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets...

  7. "Title","Creator/Author","Publication Date","OSTI Identifier...

    Office of Scientific and Technical Information (OSTI)

    Genome Wide Evaluation of Normal Human Tissue in Response to Controlled, In vivo Low-Dose Low LET Ionizing Radiation Exposure: Pathways and Mechanisms Final Report, September...

  8. Genome Wide Evaluation of Normal Human Tissue in Response to...

    Office of Scientific and Technical Information (OSTI)

    Wide Evaluation of Normal Human Tissue in Response to Controlled, In vivo Low-Dose Low LET Ionizing Radiation Exposure: Pathways and Mechanisms Final Report, September 2013 Rocke,...

  9. ALSNews Vol. 327

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Beamlines ALS in the News: Keep Up with Our News Releases, and Let Us Keep Up with Yours Winter 2012 Shutdown Update Ring Leaders: Director's Address Announcements: Science...

  10. Country-Fried Biofuels

    Energy.gov [DOE]

    Instead of tossing your grease and used cooking oil, let a clean cities coordinator in your area help recycle it into biodiesel.

  11. Consumer Acceptance and Public Policy Charging Infrastructure...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    availability, energy costsdemand costs * Electrification and automation * Wireless charging, platooning, let the grid be the energy carrier July 30, 2012 Charging ...

  12. Pueblo of Laguna Utility Authority

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    FUNDED) * NATIVE COMMUNITY FINANCE THINGS TO KEEP IN MIND * COST OF SERVICE * O&M ... RECIPE FOR SUSTAINABLE TRIBAL UTILITY KAWAIKA HANU INTERNET LET US GET YOU CONNECTED ...

  13. JC3 | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Configuration Error Lets Remote Users Login Anonymously A vulnerability was reported ... A remote user can cause arbitrary code to be executed on the target user's system previous ...

  14. QER- Comment of National Rural Electric Cooperative Association 4

    Energy.gov [DOE]

    NRECA is submitting additional comments to supplement the one previously filed on October 3rd. Please let me know if you have any questions.

  15. Energy Efficiency Post-2011 Review Scoping Document and Process...

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    workgroups, please let BPA know in your submitted comments. I. Overview and Timeline The "Energy Efficiency Post-2011 Review" (Review) is a public process to review and consider...

  16. Science Careers in Search of Women | Argonne National Laboratory

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    now, and let us make our dreams tomorrow's reality." -Malala Yousafzai, 2014 Nobel Peace Prize Laurate Argonne Education, in conjunction with Women in Science and Technology,...

  17. U-267: RSA Authentication Agent 7.1 for Microsoft Windows...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    RSA Authentication Agent Lets Remote Authenticated Users Bypass an Authentication Step reference LINKS: SecurityTracker Alert ID: 1027559 Bugtraq ID: 55662 CVE-2012-2287...

  18. T-678: Red Hat Enterprise Virtualization Hypervisor VLAN Packet...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    8: Red Hat Enterprise Virtualization Hypervisor VLAN Packet Processing Flaw Lets Remote Users Deny Service T-678: Red Hat Enterprise Virtualization Hypervisor VLAN Packet...

  19. Voluntary Initiative: Designing Incentives Toolkit | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    More Documents & Publications Spotlight on Austin, Texas: Let Your Contractor Be Your Guide for Big Rewards Spotlight on Austin, Texas: Best Offer Ever Produces 564 Upgrades in ...

  20. How to Apply

    Energy.gov [DOE]

    Awards are made through a formal process that has changed dramatically since 2011. So let us walk you through it step by step.

  1. EPA Launches 2014 National Building Competition

    Energy.gov [DOE]

    Let the battle begin! The U.S. Environmental Protection Agency (EPA) in mid-July launched the 2014 National Building Competition.

  2. V-120: EMC Smarts Network Configuration Manager Java RMI Access...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    0: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control V-120: EMC Smarts Network Configuration Manager Java RMI Access Control...

  3. JC3 | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    have been reported in Puppet Puppet Multiple Vulnerabilities March 13, 2013 V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code Several vulnerabilities were...

  4. JC3 Bulletin Archive | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    have been reported in Puppet Puppet Multiple Vulnerabilities March 13, 2013 V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code Several vulnerabilities were...

  5. JC3 Bulletin Archive | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    a critical vulnerability that allows for remote code execution June 12, 2013 V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code A...

  6. JC3 | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    a critical vulnerability that allows for remote code execution June 12, 2013 V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code A...

  7. Microsoft Word - CNMSUG-Meeting_09-25-08_minutes_v2.doc

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    to let CNMS management know what improvements would be most helpful User proposal process improvements: CNMS is moving toward a joint, online, fully electronic submission...

  8. Web Feedback & Questions - Hanford Site

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Web Feedback & Questions Web Feedback & Questions Web Feedback & Questions Email Email Page | Print Print Page |Text Increase Font Size Decrease Font Size Please let us know if you ...

  9. Testimony by

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    ... Halting Yucca Mountain is Wrong Decision First, let me say that the individuals and groups I represent in South Carolina and Georgia continue to believe that the Administration's ...

  10. Fermilab F

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    please let us know. Sincerely, Michael Witherell Attachment cc: K. Stanfield H. Montgomery S. Holmes J. Appel Excerpt from April 2004 PAC Recommendations P-938 MINERA...

  11. Be a Safe and Efficient Winter Driver

    Energy.gov [DOE]

    We've been advising you on ways to make the home more energy smart, so let's talk about your car for a moment.

  12. U-021: Cisco Unified Communications Manager Directory Traversal...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Unified Communications Manager Directory Traversal Flaw Lets Remote Users Obtain Files. PLATFORM: Cisco Unified Communications Manager 6.x, 7.x and 8.x ABSTRACT: A vulnerability...

  13. Gloria B. Smith | Department of Energy

    Energy.gov [DOE] (indexed site)

    Gloria B. Smith - Deputy Director, Office of Diversity & Inclusion Most Recent Let's Keep Talking: Women in STEM Tweet Up April 11 Join the Conversation - Get on STEM on ...

  14. Office of Wastewater Management catalog of publications

    SciTech Connect

    1998-09-01

    The contents include: Introduction; Categories of Documents (Biosolids; Construction Grants; Environmental Impact Statements; Federal Registers; Finance; Needs and Assessments; Operation and Maintenance; Permitting Issues; Pollution Prevention and Control; Pretreatment; Small Communities; Storm Water/Combined Sewer Overflows; Treatment; Water Conservation and Efficiency; Water Quality and Standards; and Miscellaneous); and Document Title Index.

  15. Tailoring Pore Size of Nitrogen-Doped Hollow Carbon Nanospheres for Confi ning Sulfur in LithiumSulfur Batteries

    SciTech Connect

    Zhou, Weidong; Wang, Chong M.; Zhang, Quiglin; Abruna, Hector D.; He, Yang; Wang, Jiangwei; Mao, Scott X.; Xiao, Xingcheng

    2015-08-19

    Three types of nitrogen-doped hollow carbon spheres with different pore sized porous shells are prepared to investigate the performance of sulfur confinement. The reason that why no sulfur is observed in previous research is determined and it is successfully demonstrated that the sulfur/polysulfide will overflow the porous carbon during the lithiation process.

  16. Low latency counter event indication

    DOEpatents

    Gara, Alan G.; Salapura, Valentina

    2010-08-24

    A hybrid counter array device for counting events with interrupt indication includes a first counter portion comprising N counter devices, each for counting signals representing event occurrences and providing a first count value representing lower order bits. An overflow bit device associated with each respective counter device is additionally set in response to an overflow condition. The hybrid counter array includes a second counter portion comprising a memory array device having N addressable memory locations in correspondence with the N counter devices, each addressable memory location for storing a second count value representing higher order bits. An operatively coupled control device monitors each associated overflow bit device and initiates incrementing a second count value stored at a corresponding memory location in response to a respective overflow bit being set. The incremented second count value is compared to an interrupt threshold value stored in a threshold register, and, when the second counter value is equal to the interrupt threshold value, a corresponding "interrupt arm" bit is set to enable a fast interrupt indication. On a subsequent roll-over of the lower bits of that counter, the interrupt will be fired.

  17. Process development of thin strip steel casting

    SciTech Connect

    Sussman, R.C.; Williams, R.S.

    1990-12-01

    An important new frontier is being opened in steel processing with the emergence of thin strip casting. Casting steel directly to thin strip has enormous benefits in energy savings by potentially eliminating the need for hot reduction in a hot strip mill. This has been the driving force for numerous current research efforts into the direct strip casting of steel. The US Department of Energy initiated a program to evaluate the development of thin strip casting in the steel industry. In earlier phases of this program, planar flow casting on an experimental caster was studied by a team of engineers from Westinghouse Electric corporation and Armco Inc. A subsequent research program was designed as a fundamental and developmental study of both planar and melt overflow casting processes. This study was arranged as several separate and distinct tasks which were often completed by different teams of researchers. An early task was to design and build a water model to study fluid flow through different designs of planar flow casting nozzles. Another important task was mathematically modeling of melt overflow casting process. A mathematical solidification model for the formation of the strip in the melt overflow process was written. A study of the material and conditioning of casting substrates was made on the small wheel caster using the melt overflow casting process. This report discusses work on the development of thin steel casting.

  18. Low latency counter event indication

    SciTech Connect

    Gara, Alan G.; Salapura, Valentina

    2008-09-16

    A hybrid counter array device for counting events with interrupt indication includes a first counter portion comprising N counter devices, each for counting signals representing event occurrences and providing a first count value representing lower order bits. An overflow bit device associated with each respective counter device is additionally set in response to an overflow condition. The hybrid counter array includes a second counter portion comprising a memory array device having N addressable memory locations in correspondence with the N counter devices, each addressable memory location for storing a second count value representing higher order bits. An operatively coupled control device monitors each associated overflow bit device and initiates incrementing a second count value stored at a corresponding memory location in response to a respective overflow bit being set. The incremented second count value is compared to an interrupt threshold value stored in a threshold register, and, when the second counter value is equal to the interrupt threshold value, a corresponding "interrupt arm" bit is set to enable a fast interrupt indication. On a subsequent roll-over of the lower bits of that counter, the interrupt will be fired.

  19. MAGO-3 results of the experiment. Final report

    SciTech Connect

    Garanin, S.F.; Mokhov, V.N.; Volkov, G.I.; Ivanov, V.A.

    1996-12-31

    In this report the results of joint LANL-VNIIEF experiment MAGO-3 are given. The experiment was aimed to investigate the of magnetized plasma parameters when it overflows trough Laval nozzel. The details of the experiment are described, data obtained by VNIIEF experts are given.

  20. SLUDGE PARTICLE SEPAPATION EFFICIENCIES DURING SETTLER TANK RETRIEVAL INTO SCS-CON-230

    SciTech Connect

    DEARING JI; EPSTEIN M; PLYS MG

    2009-07-16

    The purpose of this document is to release, into the Hanford Document Control System, FA1/0991, Sludge Particle Separation Efficiencies for the Rectangular SCS-CON-230 Container, by M. Epstein and M. G. Plys, Fauske & Associates, LLC, June 2009. The Sludge Treatment Project (STP) will retrieve sludge from the 105-K West Integrated Water Treatment System (IWTS) Settler Tanks and transfer it to container SCS-CON-230 using the Settler Tank Retrieval System (STRS). The sludge will enter the container through two distributors. The container will have a filtration system that is designed to minimize the overflow of sludge fines from the container to the basin. FAI/09-91 was performed to quantify the effect of the STRS on sludge distribution inside of and overflow out of SCS-CON-230. Selected results of the analysis and a system description are discussed. The principal result of the analysis is that the STRS filtration system reduces the overflow of sludge from SCS-CON-230 to the basin by roughly a factor of 10. Some turbidity can be expected in the center bay where the container is located. The exact amount of overflow and subsequent turbidity is dependent on the density of the sludge (which will vary with location in the Settler Tanks) and the thermal gradient between the SCS-CON-230 and the basin. Attachment A presents the full analytical results. These results are applicable specifically to SCS-CON-230 and the STRS filtration system's expected operating duty cycles.

  1. T-543: Wireshark 0.8.20 through 1.2.8 Multiple Vulnerabilities

    Energy.gov [DOE]

    Wireshark is prone to multiple denial-of-service and buffer-overflow vulnerabilities. Exploiting these issues may allow attackers to crash the application and deny service to legitimate users. Attackers may also execute arbitrary code in the context of vulnerable users running the application.

  2. Novel Binders and Methods for Agglomeration of Ore

    SciTech Connect

    S. K. Kawatra; T. C. Eisele; K. A. Lewandowski; J. A. Gurtler

    2006-12-31

    Many metal extraction operations, such as leaching of copper, leaching of precious metals, and reduction of metal oxides to metal in high-temperature furnaces, require agglomeration of ore to ensure that reactive liquids or gases are evenly distributed throughout the ore being processed. Agglomeration of ore into coarse, porous masses achieves this even distribution of fluids by preventing fine particles from migrating and clogging the spaces and channels between the larger ore particles. Binders are critically necessary to produce agglomerates that will not break down during processing. However, for many important metal extraction processes there are no binders known that will work satisfactorily. Primary examples of this are copper heap leaching, where there are no binders that will work in the acidic environment encountered in this process, and advanced ironmaking processes, where binders must function satisfactorily over an extraordinarily large range of temperatures (from room temperature up to over 1200 C). As a result, operators of many facilities see a large loss of process efficiency due to their inability to take advantage of agglomeration. The large quantities of ore that must be handled in metal extraction processes also means that the binder must be inexpensive and useful at low dosages to be economical. The acid-resistant binders and agglomeration procedures developed in this project will also be adapted for use in improving the energy efficiency and performance of a broad range of mineral agglomeration applications, particularly heap leaching and advanced primary ironmaking. This project has identified several acid-resistant binders and agglomeration procedures that can be used for improving the energy efficiency of heap leaching, by preventing the ''ponding'' and ''channeling'' effects that currently cause reduced recovery and extended leaching cycle times. Methods have also been developed for iron ore processing which are intended to improve the

  3. RangeTables.xls

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    (MeVcmmg) LET vs. Range in Si for 25 MeV SEE Beams (low LET) 4 He 14 N 0 0.5 1 1.5 0 600 1200 1800 2400 3000 3600 4 He 14 N 22 Ne 0 1 2 3 4 5 6 7 8 9 10 0 100 200 300 400 500...

  4. RangeTables.xlsx

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Vcmmg) LET vs. Range in Si for 15 MeV SEE Beams (low LET) 4 He 14 N 0 0.5 1 1.5 0 200 400 600 800 1000 1200 1400 Range in Silicon (m) 4 He 14 N 20 Ne 0 1 2 3 4 5 0 50 100 150...

  5. Queuing and Running on BG/Q Systems FAQ | Argonne Leadership Computing

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Facility Queuing and Running on BG/Q Systems FAQ Contents Is there a limit on stack size? My job had empty stdout, and the stderr looks like it died immediately after it started. What happened? Where can I find the details of a job submission? Back to top Is there a limit on stack size? There is no strict limit on the stack size. The stack and heap grow towards each other until a collision occurs. If your job terminates with an error like this: ***FAULT Encountered unhandled signal

  6. Intel_tools.pptx

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    ! Cray QBR, Apr 8, 2015 Intel Tools for optimizations HBM tools are available on Edison * The memkind library is a user extensible heap manager. It can be used to test/simulate the benefit of high hand width memory (HBM or HBW) on the dual socket Edison compute nodes today. - Use the QPI bus to simulate slow memory - This is not an accurate model of the bandwidth and latency characteristics of the KNL on package memory, but is a reasonable way to determine which data structures rely critically

  7. Domestic Uranium Production Report

    Gasoline and Diesel Fuel Update

    4. U.S. uranium mills by owner, location, capacity, and operating status at end of the year, 2011-15 Owner Mill and Heap Leach1 Facility name County, state (existing and planned locations) Capacity (short tons of ore per day) Operating status at end of the year 2011 2012 2013 2014 2015 Anfield Resources Shootaring Canyon Uranium Mill Garfield, Utah 750 Standby Standby Standby Standby Standby EPR White Mesa LLC White Mesa Mill San Juan, Utah 2,000 Operating Operating Operating- Processing

  8. NOVEL BINDERS AND METHODS FOR AGGLOMERATION OF ORE

    SciTech Connect

    S.K. Kawatra; T.C. Eisele; J.A. Gurtler; C.A. Hardison; K. Lewandowski

    2004-04-01

    Many metal extraction operations, such as leaching of copper, leaching of precious metals, and reduction of metal oxides to metal in high-temperature furnaces, require agglomeration of ore to ensure that reactive liquids or gases are evenly distributed throughout the ore being processed. Agglomeration of ore into coarse, porous masses achieves this even distribution of fluids by preventing fine particles from migrating and clogging the spaces and channels between the larger ore particles. Binders are critically necessary to produce agglomerates that will not break down during processing. However, for many important metal extraction processes there are no binders known that will work satisfactorily. Primary examples of this are copper heap leaching, where there are no binders that will work in the acidic environment encountered in this process, and advanced ironmaking processes, where binders must function satisfactorily over an extraordinarily large range of temperatures (from room temperature up to over 1200 C). As a result, operators of many facilities see a large loss of process efficiency due to their inability to take advantage of agglomeration. The large quantities of ore that must be handled in metal extraction processes also means that the binder must be inexpensive and useful at low dosages to be economical. The acid-resistant binders and agglomeration procedures developed in this project will also be adapted for use in improving the energy efficiency and performance of a broad range of mineral agglomeration applications, particularly heap leaching and advanced primary ironmaking.

  9. Novel Binders and Methods for Agglomeration of Ore

    SciTech Connect

    S. K. Kawatra; T. C. Eisele; J. A. Gurtler

    2004-03-31

    Many metal extraction operations, such as leaching of copper, leaching of precious metals, and reduction of metal oxides to metal in high-temperature furnaces, require agglomeration of ore to ensure that reactive liquids or gases are evenly distributed throughout the ore being processed. Agglomeration of ore into coarse, porous masses achieves this even distribution of fluids by preventing fine particles from migrating and clogging the spaces and channels between the larger ore particles. Binders are critically necessary to produce agglomerates that will not break down during processing. However, for many important metal extraction processes there are no binders known that will work satisfactorily. A primary example of this is copper heap leaching, where there are no binders that will work in the acidic environment encountered in this process. As a result, operators of acidic heap-leach facilities see a large loss of process efficiency due to their inability to take advantage of agglomeration. The large quantities of ore that must be handled in metal extraction processes also means that the binder must be inexpensive and useful at low dosages to be economical. The acid-resistant binders and agglomeration procedures developed in this project will also be adapted for use in improving the energy efficiency and performance of other agglomeration applications, particularly advanced primary ironmaking.

  10. Characterization of uranium- and plutonium-contaminated soils by electron microscopy

    SciTech Connect

    Buck, E.C.; Dietz, N.L.; Fortner, J.A.; Bates, J.K.; Brown, N.R.

    1995-03-01

    Electron beam techniques have been used to characterize uranium-contaminated soils from the Fernald Site in Ohio, and also plutonium-bearing `hot particles, from Johnston Island in the Pacific Ocean. By examining Fernald samples that had undergone chemical leaching it was possible to observe the effect the treatment had on specific uranium-bearing phases. The technique of Heap leaching, using carbonate solution, was found to be the most successful in removing uranium from Fernald soils, the Heap process allows aeration, which facilitates the oxidation of uraninite. However, another refractory uranium(IV) phase, uranium metaphosphate, was not removed or affected by any soil-washing process. Examination of ``hot particles`` from Johnston Island revealed that plutonium and uranium were present in 50--200 nm particles, both amorphous and crystalline, within a partially amorphous aluminum oxide matrix. The aluminum oxide is believed to have undergone a crystalline-to-amorphous transition caused by alpha-particle bombardment during the decay of the plutonium.

  11. System for measuring temporal profiles of scintillation at high and different linear energy transfers by using pulsed ion beams

    SciTech Connect

    Koshimizu, Masanori Asai, Keisuke; Kurashima, Satoshi; Taguchi, Mitsumasa; Kimura, Atsushi; Iwamatsu, Kazuhiro

    2015-01-15

    We have developed a system for measuring the temporal profiles of scintillation at high linear energy transfer (LET) by using pulsed ion beams from a cyclotron. The half width at half maximum time resolution was estimated to be 1.52.2 ns, which we attributed mainly to the duration of the pulsed ion beam and timing jitter between the trigger signal and the arrival of the ion pulse. The temporal profiles of scintillation of BaF{sub 2} at different LETs were successfully observed. These results indicate that the proposed system is a powerful tool for analyzing the LET effects in temporal profiles of scintillation.

  12. Inquiring Minds - Questions About Physics

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Getting particles for the accelerator Hi I am 11 and my name is Joshua Pevitz. When I grow up I want to work at Fermilab. I was wondering if you could explain to me about how you let only one atom in the accelerator, if everything is made out of atoms? Your admirer, Joshua Pevitz Dear Joshua, Thanks for your interesting question! Let me give you the simple answer first, and then I will explain. We do not let only one atom at a time into the accelerator. Instead we have more than 10 trillion

  13. Apparatus and method for continuous separation of magnetic particles from non-magnetic fluids

    DOEpatents

    Oder, Robin R.; Jamison, Russell E.

    2010-02-09

    A magnetic separator vessel (1) for separating magnetic particles from non-magnetic fluid includes a separation chamber having an interior and exterior wall, a top and bottom portion; a magnet (3) having first and second poles (2) positioned adjacent to the exterior wall, wherein the first pole is substantially diametrically opposed to the second pole; a inlet port (5) is directed into the top portion of the separation chamber, wherein the inlet port (5) is positioned adjacent to one of the first and second poles (2), wherein the inlet port (5) is adapted to transfer a mixture into the separation chamber; an underflow port (6) in communication with the bottom portion, wherein the underflow port (6) is adapted to receive the magnetic particles; and an overflow port (9) in communication with the separation chamber, wherein the overflow port (9) is adapted to receive the non-magnetic fluid.

  14. Device and method for automated separation of a sample of whole blood into aliquots

    DOEpatents

    Burtis, Carl A.; Johnson, Wayne F.

    1989-01-01

    A device and a method for automated processing and separation of an unmeasured sample of whole blood into multiple aliquots of plasma. Capillaries are radially oriented on a rotor, with the rotor defining a sample chamber, transfer channels, overflow chamber, overflow channel, vent channel, cell chambers, and processing chambers. A sample of whole blood is placed in the sample chamber, and when the rotor is rotated, the blood moves outward through the transfer channels to the processing chambers where the blood is centrifugally separated into a solid cellular component and a liquid plasma component. When the rotor speed is decreased, the plasma component backfills the capillaries resulting in uniform aliquots of plasma which may be used for subsequent analytical procedures.

  15. Little Wind River Floods at Riverton, Wyoming: Study to Determine Impacts

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    on Soil Contaminants | Department of Energy Little Wind River Floods at Riverton, Wyoming: Study to Determine Impacts on Soil Contaminants Little Wind River Floods at Riverton, Wyoming: Study to Determine Impacts on Soil Contaminants July 18, 2016 - 12:21pm Addthis What does this project do? Goal 1. Protect human health and the environment. Goal 6. Engage the public, governments, and interested parties. RivertonFlood02.png The Little Wind River overflowed its banksand flooded the area being

  16. WTP Calculation Sheet: Determining the LAW Glass Former Constituents and Amounts for G2 and Acm Models. 24590-LAW-M4C-LFP-00002, Rev. B

    SciTech Connect

    Gimpel, Rodney F.; Kruger, Albert A.

    2013-12-16

    The purpose of this calculation is to determine the LAW glass former recipe and additives with their respective amounts. The methodology and equations contained herein are to be used in the G2 and ACM models until better information is supplied by R&T efforts. This revision includes calculations that determines the mass and volume of the bulk chemicals/minerals needed per batch. Plus, it contains calculations (for the G2 model) to help prevent overflow in LAW Feed Preparation Vessel.

  17. Improve grinding control

    SciTech Connect

    Burger, J.R.

    1985-06-01

    The on-stream particle analyzer is an instrument with many potential uses. The most common practice in mineral benefication is to use it to monitor grinding mill discharge after the pulp has passed through a classifying cyclone. The instrument samples and analyzes the cyclone overflow. The resulting signal can be used to automatically adjust grinding variables or the data readout can be used to guide manual changes. The design of the Armco PSM-400 and its operation are described.

  18. 17th Annual ALS Users' Association Meeting

    SciTech Connect

    Robinson, Art; Tamura, Lori

    2004-11-29

    It's not exactly Russian roulette, but scheduling October events outdoors is not risk-free, even in usually sunny California. An overflow crowd of more than 400 registered users, ALS staff, and vendors enjoyed a full indoor program featuring science highlights and workshops spread over two and a half days from October 18 to October 20. However, a major storm, heralding the onset of the San Francisco Bay Area rainy season, posed a few weather challenges for the events on the ALS patio.

  19. Microsoft Word - DOE-ID-INL-16-087.docx

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    87 SECTION A. Project Title: United States Geological Survey (USGS) Geotechnical Drilling for USGS-142 and USGS-143 Rev 1 USGS-142A SECTION B. Project Description and Purpose: Concrete was used during construction of geotechnical borehole United States Geological Survey (USGS)-142, and cement overflowed into the section of the borehole where water levels were needed to be measured. The purpose of this revision is to drill an additional borehole, USGS-142A, approximately 10 to 25 feet from

  20. LIQUID CYCLONE CONTACTOR

    DOEpatents

    Whatley, M.E.; Woods, W.M.

    1962-09-01

    This invention relates to liquid-liquid extraction systems. The invention, an improved hydroclone system, comprises a series of serially connected, axially aligned hydroclones, each of which is provided with an axially aligned overflow chamber. The chambers are so arranged that rotational motion of a fluid being passed through the system is not lost in passing from chamber to chamber; consequently, this system is highly efficient in contacting and separating two immiscible liquids. (AEC)

  1. Nuclear waste solidification

    DOEpatents

    Bjorklund, William J.

    1977-01-01

    High level liquid waste solidification is achieved on a continuous basis by atomizing the liquid waste and introducing the atomized liquid waste into a reaction chamber including a fluidized, heated inert bed to effect calcination of the atomized waste and removal of the calcined waste by overflow removal and by attrition and elutriation from the reaction chamber, and feeding additional inert bed particles to the fluidized bed to maintain the inert bed composition.

  2. Mass-loss evolution of close-in exoplanets: Evaporation of hot Jupiters and the effect on population

    SciTech Connect

    Kurokawa, H.; Nakamoto, T.

    2014-03-01

    During their evolution, short-period exoplanets may lose envelope mass through atmospheric escape owing to intense X-ray and extreme ultraviolet (XUV) radiation from their host stars. Roche-lobe overflow induced by orbital evolution or intense atmospheric escape can also contribute to mass loss. To study the effects of mass loss on inner planet populations, we calculate the evolution of hot Jupiters considering mass loss of their envelopes and thermal contraction. Mass loss is assumed to occur through XUV-driven atmospheric escape and the following Roche-lobe overflow. The runaway effect of mass loss results in a dichotomy of populations: hot Jupiters that retain their envelopes and super Earths whose envelopes are completely lost. Evolution primarily depends on the core masses of planets and only slightly on migration history. In hot Jupiters with small cores (? 10 Earth masses), runaway atmospheric escape followed by Roche-lobe overflow may create sub-Jupiter deserts, as observed in both mass and radius distributions of planetary populations. Comparing our results with formation scenarios and observed exoplanets populations, we propose that populations of closely orbiting exoplanets are formed by capturing planets at/inside the inner edges of protoplanetary disks and subsequent evaporation of sub-Jupiters.

  3. Segment of Smithsonian Video history interview - December 1987

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    The interviewees were George M. Banic, Jr., John M. Googin, Chris P. Keim, Clarence Larson and Robert S. Livingston. Before looking at the specific interviews let's learn a bit...

  4. ARM - Events Article

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    If you will be leading a session, please let us know. Sessions shared with us will be added to this web page and shared in two emails to be sent July 20 and August 1. Abstract ...

  5. Federal Energy Management Program News | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    energy projects. July 18, 2014 EPA Launches 2014 National Building Competition Let the battle begin The U.S. Environmental Protection Agency (EPA) in mid-July launched the 2014...

  6. TABLE OF CONTENTS SECTION A: PREINTERVIEW OBSERVATION

    Energy Information Administration (EIA) (indexed site)

    USED" ON THE FOLDOUT PAGE. CIRCLE EACH "YES" OR "NO.") ELECTRICIT Y J-3. Now, let's talk about electricity. I have circled that electricity is used for (READ EACH USE CIRCLED...

  7. Round Table Meeting Summaries Purchase Order: DE-IE0000002 Final...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    ... Energy is not really rocket science. Feds love planning and new technology. Let's finance ... NEPA issues, they just concurred with BIA finding, and the BIA handled them very quickly. ...

  8. National Coal Council Meeting | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    But let me return specifically to the issue of coal, where I think it is important to discuss the term, "clean coal." It is a term that is used often in the lexicon of the industry ...

  9. V-139: Cisco Network Admission Control Input Validation Flaw...

    Energy.gov [DOE] (indexed site)

    PROBLEM: Cisco Network Admission Control Input Validation Flaw Lets Remote Users Inject SQL Commands PLATFORM: Cisco NAC Manager versions prior to 4.8.3.1 and 4.9.2 ABSTRACT: A...

  10. Y-12s Moon Box ? a big hit in Texas

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    not rub against anything that would mar its shiny finish. Then off it went to Texas. In planning this trip, I first considered shipping the Moon Box, but I did not want to let it...

  11. OSTI, US Dept of Energy Office of Scientific and Technical Information...

    Office of Scientific and Technical Information (OSTI)

    It continues to grow, and I am pleased to let you knowthat it is adding audio and video materials from CERN, the European Organization for Nuclear Research. The inclusion of CERN ...

  12. User-Friendly Model Puts Solar Energy in Your Backyard | OpenEI...

    OpenEI (Open Energy Information) [EERE & EIA]

    a photovoltaic (PV) system for your home or property, check out the National Renewable Energy Laboratory's In My Backyard (IMBY) tool. It's quick, useful, and-let's just say...

  13. LBNL Report-54360 ATF-03-09 Closed Orbit Response to Quadrupole...

    Office of Scientific and Technical Information (OSTI)

    ... Let M be the single-turn linear 3 map at the exit of the quadrupole. The map from the exit ... equations (10) look very different, but with some algebra, we can show they are the same. ...

  14. DOE Tour of Zero: The Johns Island Custom by Amerisips Homes...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    low-cost comfort. 15 of 26 Professionally installed high-performance windows let in light but keep out heat. 16 of 26 The air-to-water heat pump is integrated with a...

  15. Test Your Energy Knowledge with Our Bioenergy Quiz

    Energy.gov [DOE]

    We are very excited to announce our first ever bioenergy quiz—an online, interactive tool that’s both enlightening and entertaining! Interested in participating? Just click the link in the photo above and let the game begin.

  16. Energy Department Sets Tougher Standards for Clothes Washers to Qualify for the ENERGY STAR® Label

    Energy.gov [DOE]

    WASHINGTON, DC - The U.S. Department of Energy (DOE) today announced tougher standards for clothes washers to qualify for the ENERGY STAR® label, which lets American families identify which clothes...

  17. Secretary Moniz's Remarks at the 2013 Enrico Fermi Awards Ceremony...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Let me just say a few words about the winners, starting with Allen Bard, sometimes called the father of modern electrochemistry. Son of European immigrants, born and raised in New ...

  18. Secretary Chu Congratulates Solar Decathlon Winners | Department...

    Office of Environmental Management (EM)

    ... Let's look again at our history; read from our own playbook. The Wright Brothers ... We invented solar cells, wind turbines and lithium ion batteries, but are no longer the ...

  19. Secretary Moniz's Remarks at the White House Energy Datapalooza...

    Energy Saver

    today let me just summarize a few of the things that DOE has underway in using big data, maybe not so big data, in supporting private sector innovation to advance clean energy. ...

  20. Remarks by Dr. Jeffrey Salmon | OSTI, US Dept of Energy Office...

    Office of Scientific and Technical Information (OSTI)

    Let me read you the very first issue he addressed to Bush: "First: What can be done, consistent with military security, and with the prior approval of the military authorities, to ...

  1. BPA-2012-00183-CRequest

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    information is needed to fulfill this request, please let me know. Thank you, Richard van Dijk Another Way BRA P0 Box 820152 Vancouver, WA 98682 360.453.7260 richard@alderspur.com...

  2. Solar Decathlon Opening | Department of Energy

    Office of Environmental Management (EM)

    Solar Decathlon Opening Solar Decathlon Opening October 6, 2005 - 12:25pm Addthis Remarks Prepared for Energy Secretary Bodman Let me begin by welcoming all of you to this Solar...

  3. Financial Times-World Energy Council Energy Leaders Summit |...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    aggressive action to achieve, is indeed critically important. First, let's look at our heavy reliance on oil. The growth in world oil consumption has been averaging about 1.8...

  4. Tips: Windows | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Unfortunately, they can also account for 10% to 25% of your heating bill by letting heat ... joints; be made of strong, durable materials; and have interlocking or overlapping joints. ...

  5. QER- Comment of Pepco Holdings, Inc. 2

    Office of Energy Efficiency and Renewable Energy (EERE)

    Karen: Here are some of our initial thoughts on vulnerability questions for you to consider. Please let me know if you have other specific topics you want us to consider right now.

  6. The Human Genome Project and other biological research efforts...

    Office of Scientific and Technical Information (OSTI)

    But in order to make sense of this raw data, researchers need software tools which let them explore and model data in a more intuitive fashion. With this in mind, researchers at ...

  7. DOE Zero Energy Ready Home Case Study 2013: TC Legend, Seattle...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    energy-effi cient custom homes on and around nearby Whidbey Island in the Puget Sound. ... meaning they let in a lot of solar energy, which is important for a home ...

  8. Breaking a Cycle-Free Lifestyle for Earth Day | Department of...

    Energy.gov [DOE] (indexed site)

    Now, before I start, let me get this out of the way: Bikes and I have not historically gotten along. When I was a young girl, I was so thrilled to have learned to ride a bike that ...

  9. 5 Million Reasons for Communities to Lower Their Energy Use ...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Follow along all week on Twitter, Facebook, Instagram and Google+, and let us know how you ActOnClimate. From Fairbanks, Alaska, to Roanoke, Virginia, communities across America ...

  10. Microsoft Word - Sept 2010.MeetingMinutes.FINAL

    Office of Environmental Management (EM)

    ... The TWS would need to review the WTP schedule and activity charts in greater detail ... of EM's role is to let people know what assets are available for conversion to energy parks. ...

  11. Microsoft Word - Another Way BPA, Request No. HQ-2012-01166-F...

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    b5. If you need to see those, let me know. chris -----Original Message----- From: Fishman, Janet Sent: Wednesday, May 30, 2012 1:38 PM To: Morris, Alexander; Washington,...

  12. Consent-Based Siting Public Meeting Small Group Discussion Summary

    Office of Environmental Management (EM)

    ... DOE should let people know what sorts of things they are willing to offer the host ... citizens (some who may not have or use internet) in these and future meetings * The ...

  13. How Do Holiday Lights Work? | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    ... While shunts serve to remedy an open circuit, fuses work to prevent damage due to a short ... of holiday lights, let's address some common problems we run into and how to remedy them. ...

  14. U.S. Secretary of Energy Ernest Moniz on the COP21 Climate Conference...

    Energy.gov [DOE] (indexed site)

    Dr. Ernest Moniz Dr. Ernest Moniz Secretary of Energy First of all, let me thank Bill Burns, who - I would reciprocate - is just a fabulous colleague in the administration on a ...

  15. City of Sacramento Video (Text Version) | Department of Energy

    Energy.gov [DOE] (indexed site)

    Scooter the Spare the Air mascot would like to thank Folsom Lake Ford for letting him test out a new Ford Fusion. The Fusion is made by Ford but did you know that all major auto ...

  16. Energy Department Makes a Difference Helping Students' Careers...

    Office of Environmental Management (EM)

    ... in clean energy. Addthis Related Articles EcoCAR 3: Year 1 Finals Power Up University Teams Virginia Tech Wins EcoCAR Competition Solar Decathlon 2015: Let the Competition Begin

  17. OSTI, US Dept of Energy Office of Scientific and Technical Information...

    Office of Scientific and Technical Information (OSTI)

    Revisit the OSTIblog article of June 20, 2013 to read more about the search capabilities DDE now offers and the larger scope of its content. And, as always, let us know if you have ...

  18. I Love Saving Money and Energy | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    Laboratory Valentine's Day is all about love-and I love all the quick and easy ways to save money and energy at home How much do I love saving energy and money? Let me count...

  19. V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting...

    Office of Environmental Management (EM)

    Users Upload Files and Let Remote Users Conduct Cross-Site Scripting Attacks U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks

  20. 10 Questions for a Materials Scientist: Vilas Pol | Department...

    Energy.gov [DOE] (indexed site)

    In addition, brainy Emeritus Prof. Aharon Gedanken from Bar-Ilan University of Israel influenced me entirely with the materials science milieu during my Ph.D. Q: Let's talk about ...

  1. Nov2002

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    ... Guilford: Joe, when surveys like this come up, people have one question on their mind, so let's cut to the chase: Can a survey like this really be confidential? Haymore: That's a ...

  2. DOE National Laboratories Train the Scientist of Tomorrow | U...

    Office of Science (SC)

    ... Galante's project examined ways to improve the top layer of a solar cell. "The top layer needs to be transparent to let the light in and conductive so the electricity can flow. ...

  3. Energy Saver 101: Home Cooling Infographic | Department of Energy

    Energy.gov [DOE] (indexed site)

    While home cooling only accounts for 6 percent of the average home's energy use, it can lead to high energy bills during the warm months. This summer, don't let your energy bills...

  4. Pacific Northwest Smart Grid Demonstration Project SUCCESS STORIES

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Engineering. "Knowing there was an aging issue with one cable, we thought: let's look at demand response to reduce the load." Failing cable leads to fast launch By September 2010,...

  5. Do we get actual vendor name while we searched with zip code...

    OpenEI (Open Energy Information) [EERE & EIA]

    let me know? Submitted by SUTHARI on 29 September, 2014 - 08:02 1 answer Points: 0 Hi SUTHARI, we had a bug in the U.S. Utility Rate Database affecting zip codes with leading...

  6. BPA-2012-00477-FOIA Response

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Zehntbauer,Nicole R - TERG-3 Subject: Troutdale Substation dgn on Sharepoint Site Hello Let me know if you have any problems viewing the data. Thanks, Anne Anne K. Hillyer,...

  7. Geocoded Data | OpenEI Community

    OpenEI (Open Energy Information) [EERE & EIA]

    Geocoded Data Home > Groups > OpenEI Community Central Hello there open energy community Thank you for the openness in letting me join :) I was searching the open source data...

  8. Social poster.pdf

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    at the bar. Let's be social Wednesday, 7 October 2015 5:00 - 7:00 PM Users' Center Music Room Contributions of food are welcome, and we encourage you to share your recipe for...

  9. OSTI, US Dept of Energy, Office of Scientific and Technical Informatio...

    Office of Scientific and Technical Information (OSTI)

    And some material, let's face it, isn't worth saving. Between this blog and Archimedes' method of mechanical theorems, the work that SLAC was looking at, which would you save? What ...

  10. V-198: Red Hat Enterprise MRG Messaging Qpid Python Certificate...

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    8: Red Hat Enterprise MRG Messaging Qpid Python Certificate Validation Flaw Lets Remote Users Conduct Man-in-the-Middle Attacks V-198: Red Hat Enterprise MRG Messaging Qpid Python...

  11. Renewable Energy, Right in Your Back Yard | OpenEI Community

    OpenEI (Open Energy Information) [EERE & EIA]

    select from "solar" or "wind" energy. Under solar, the application lets you draw your own solar panel square on the roof, input a few values (size, derating, tilt angle, Azimuth...

  12. OSTIblog Articles in the metrics Topic | OSTI, US Dept of Energy...

    Office of Scientific and Technical Information (OSTI)

    You can then announce to the world that you are a smashing success. The other way is to gather serious, knowledgeable, and thoughtful people and let them ask hard questions; ask ...

  13. OSTI, US Dept of Energy Office of Scientific and Technical Information...

    Office of Scientific and Technical Information (OSTI)

    You can then announce to the world that you are a smashing success. The other way is to gather serious, knowledgeable, and thoughtful people and let them ask hard questions; ask ...

  14. OSTIblog Articles in the Digitize Legacy Collection Topic | OSTI...

    Office of Scientific and Technical Information (OSTI)

    You can then announce to the world that you are a smashing success. The other way is to gather serious, knowledgeable, and thoughtful people and let them ask hard questions; ask ...

  15. OSTIblog Articles in the CoV Topic | OSTI, US Dept of Energy...

    Office of Scientific and Technical Information (OSTI)

    You can then announce to the world that you are a smashing success. The other way is to gather serious, knowledgeable, and thoughtful people and let them ask hard questions; ask ...

  16. OSTI, US Dept of Energy Office of Scientific and Technical Information...

    Office of Scientific and Technical Information (OSTI)

    anytime. Multiple key words and Boolean tools let me target precisely what I am looking ... to provide the latest suite of innovative tools and resources to make it happen. ...

  17. How the Membrane Protein AmtB Transports Ammonia

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    the uncharged NH3 "gas." A Doorway for Letting Ammonia into Cells Like any factory, a biological cell takes in raw materials and energy and expels waste products. What goes in...

  18. Can't See the Forest for the Trees | Department of Energy

    Energy.gov [DOE] (indexed site)

    However, on my way to let the dog back in through the walk-out basement during the last snow storm (she can go out the dog door by herself, but for some reason won't come back in ...

  19. Microsoft Word - 12064648 DVP

    Office of Legacy Management (LM)

    ... The standard LMS key worked in a lock that is "daisy-chained" on the gate for the dog ... Durango Processing site (DUR01, aka "the dog park") to let them know about sampling ...

  20. Microsoft Word - 11063904 DVP

    Office of Legacy Management (LM)

    ... The 3359 key worked in a lock that is "daisy-chained" on the gate for the dog park. Key ... Mill Tailings site (DUR01, aka "the dog park") to let them know about sampling ...

  1. Microsoft Word - 10053097 DVP.doc

    Office of Legacy Management (LM)

    ... Site Access: Samplers called Durango police dispatch @ 970-385-2900 as soon as they arrived at the Durango Mill Tailings site (DUR01, aka "the dog park") to let them know about ...

  2. September 2004 Water Sampling

    Office of Legacy Management (LM)

    ... The 3359 key worked in a lock that is "daisy-chained" on the gate for the dog park. Key ... Durango Processing site (DUR01, aka "the dog park") to let them know about sampling ...

  3. Returning to Work After a Respiratory Infection | Jefferson Lab

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    Med. at ext. 7539 or 5585. Thanks. Please let me know if you have any questions. -Smitty W. Smith Chandler, MD, MPH, MS Site Occupational Medicine Director Jefferson Lab June 2016

  4. Fascinating Fluids

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    If it gets sticky, dip it back into the solution. What is going on here? Don't let your ball dry on fabric or furniture. Borrow a disposable diaper from someone with a baby. Cut it...

  5. Fermilab Today

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    the MINOS building. Don't let yourself be too attracted by them, though: Coralberry is an invasive species. Photo: Prabhjot Singh, University of Delhi In the News GBN students test...

  6. JC3 Bulletin Archive | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    a DoS (Denial of Service), and compromise a user's system. February 14, 2013 V-091: Adobe AcrobatReader Bug Lets Remote Users Execute Arbitrary Code Adobe has identified...

  7. JC3 Bulletin Archive | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) (indexed site)

    A vulnerability was reported in McAfee VirusScan Enterprise. February 27, 2013 V-100: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code Several vulnerabilities were...

  8. BBAP ???for EH-53 v2.0

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    security personnel Do not let your truck idle for more than 3 min (unless it is a concrete truck and pumper) Properly maintain and inspect your truck(s) daily for safety issues...

  9. Nature template - PC Word 97

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    A few exceptions include the second law of thermodynamics, which states that entropy must ... To better understand this effect, let us start with a non-magnetic uniaxial anisotropic ...

  10. SAND2013-8530J

    Office of Scientific and Technical Information (OSTI)

    ... the dielectric breakdown voltage as a function of dielectric thickness as follows Eint ... * Z * tdieiecMeV, (3) where LET is the linear energy transfer, Z is the atomic number ...

  11. OSTI, US Dept of Energy Office of Scientific and Technical Information...

    Office of Scientific and Technical Information (OSTI)

    And some material, let's face it, isn't worth saving. Between this blog and Archimedes' method of mechanical theorems, the work that SLAC was looking at, which would you save? What ...

  12. OSTIblog Posts by Dr. Jeffrey Salmon | OSTI, US Dept of Energy...

    Office of Scientific and Technical Information (OSTI)

    ... And some material, let's face it, isn't worth saving. Between this blog and Archimedes' method of mechanical theorems, the work that SLAC was looking at, which would you save? What ...

  13. OSTIblog Articles in the multimedia Topic | OSTI, US Dept of...

    Office of Scientific and Technical Information (OSTI)

    ... And some material, let's face it, isn't worth saving. Between this blog and Archimedes' method of mechanical theorems, the work that SLAC was looking at, which would you save? What ...

  14. OSTIblog Articles in the slac Topic | OSTI, US Dept of Energy...

    Office of Scientific and Technical Information (OSTI)

    ... And some material, let's face it, isn't worth saving. Between this blog and Archimedes' method of mechanical theorems, the work that SLAC was looking at, which would you save? What ...

  15. OSTIblog Articles in the archimedes Topic | OSTI, US Dept of...

    Office of Scientific and Technical Information (OSTI)

    And some material, let's face it, isn't worth saving. Between this blog and Archimedes' method of mechanical theorems, the work that SLAC was looking at, which would you save? What ...

  16. Slide 1

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    14, 13 Using X-Windows * X-Windows let you run graphical user programs (e.g. Emacs, Matlab) on NERSC Machines * We suggest you to use NX for much better X-Windows experience 2...

  17. X marks the spot: Researchers confirm novel method for controlling...

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    much like changing the settings on iTunes or a stereo lets one explore the behavior of music. This discovery gives fusion researchers a tool to access different intrinsic rotation...

  18. Pontotoc Co. Greene Co. Hale Co. OAK GROVE C OAL D EGAS CEDAR...

    Gasoline and Diesel Fuel Update

    LITT LE SAND Y CREEK COAL D EGAS FAYETTE SW FAYETTE N WAT TS CR EEKALD YELLOW CR EEKALD RPDOKTIBBEHACNT Y-1 BALLS BRAN CH BU TT AH ATCH IE RIVER NETT LET ON ABERD EEN E ...

  19. OAK GROVE C OAL D EGAS CEDAR COVE COAL D EGAS BLU E CREEK COAL...

    Gasoline and Diesel Fuel Update

    LITT LE SAND Y CREEK COAL D EGAS FAYETTE SW FAYETTE N WAT TS CR EEKALD YELLOW CR EEKALD RPDOKTIBBEHACNT Y-1 BALLS BRAN CH BU TT AH ATCH IE RIVER NETT LET ON ABERD EEN E ...

  20. Fermilab Today

    U.S. Department of Energy (DOE) - all webpages (Extended Search)

    ... Let's start by talking about what happens when you shoot two billiard balls together on an otherwise bare table. If you snap a photo after the collision, you see two balls moving ...