SNL Stacked Black Blue Logo

Nuclear Incident Response Logo

High Explosive Manager Logo

Latest Version

Released:Mar 3, 2022

Description:

High Explosive Manager 2021

SHA1 checksum value:

17ebc3fceceb7b3fbc0866fec0f645fb54eecc3b

Previous Versions


Notes

All installers created 2022-October or later have been tested on Windows 11. Please report any issues to nirp-fogbugz@sandia.gov.


Overview

The High Explosive Manager (HEM) software tool provides the ability to view and create high explosives. The primary purpose of HEM is the management of high explosives for use in SHARC. Additionally, HEM includes a tool to calculate the equivalent mass of C-4 and TNT for any explosive.

Features

  • List of pre-defined High Explosives
  • Ability to create new High Explosives
  • Calculation of TNT and C-4 equivalent mass
    • Density
    • Detonation Velocity
    • Gurney Velocity
    • Chapman-Jouguet Pressure
    • Heat of Detonation

Release Notes

High Explosive Manager 2.5.2

(100948) A new vulnerability was discovered in Log4J since the release of Log4J v2.16.0. We have since replaced the Log4J library with version 2.17.1, which fixes all known vulnerabilities for Log4J to date.

High Explosive Manager 2.5.1

(100805) A critical vulnerability was discovered in the Log4J library. The likelihood of this vulnerability being exploited in this application is very low. However, this library existed in the codebase and has been replaced with the patched version issued by Apache. Read further for more details. Log4J is an open-source logging library used by apps and services across the Internet. Logging is a process where applications keep a running list of activities they have performed, which can later be reviewed in case of error. The vulnerability is designated as CVE-2021-44228. The vulnerability allows remote attackers to gain control over vulnerable targets. To perform remote code execution, an attacker only needs to send a simple malicious request that contains a formatted string. This formatted string is then picked up by the Log4J library and executed. The result is an attacker's ability to cause Log4j to connect to a service controlled by the attacker to download and execute arbitrary code (likely malicious).

System Requirements

Operating SystemDesigned and tested on Windows 11; Expected to be compatible with Windows Vista, 7, 8, and 10, though not formally tested; Expected to function in certain virtual environments, but not tested.
Minimum Requirements
CPU2GHz Pentium 4
Memory2GB RAM
Disk Storage30GB Free
Monitor Resolution1280 x 1024 or Higher
Recommended Requirements
CPUDual- or Quad-Core of higher
Memory4GB RAM or higher
Disk Storage50GB Free or higher
Monitor Resolution1280 x 1024 or higher

SAND2018-7112 W