Powered by Deep Web Technologies
Note: This page contains sample records for the topic "input validation flaw" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

U-252: Barracuda Web Filter Input Validation Flaws Permit Cross...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Barracuda Web Filter Input Validation Flaws Permit Cross-Site Scripting Attacks U-252: Barracuda Web Filter Input Validation Flaws Permit Cross-Site Scripting Attacks September...

2

U-219: Symantec Web Gateway Input Validation Flaws Lets Remote...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Symantec Web Gateway Input Validation Flaws Lets Remote Users Inject SQL Commands, Execute Arbitrary Commands, and Change User Passwords U-219: Symantec Web Gateway Input...

3

V-139: Cisco Network Admission Control Input Validation Flaw...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Sensitive Information U-270:Trend Micro Control Manager Input Validation Flaw in Ad Hoc Query Module Lets Remote Users Inject SQL Commands U-015: CiscoWorks Common Services Home...

4

V-192: Symantec Security Information Manager Input Validation Flaws Permit  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

92: Symantec Security Information Manager Input Validation Flaws 92: Symantec Security Information Manager Input Validation Flaws Permit Cross-Site Scripting, SQL Injection, and Information Disclosure Attacks V-192: Symantec Security Information Manager Input Validation Flaws Permit Cross-Site Scripting, SQL Injection, and Information Disclosure Attacks July 4, 2013 - 6:00am Addthis PROBLEM: Several vulnerabilities were reported in Symantec Security Information Manager PLATFORM: Symantec Security Information Manager Appliance Version 4.7.x and 4.8.0 ABSTRACT: Symantec was notified of multiple security issues impacting the SSIM management console REFERENCE LINKS: SecurityTracker Alert ID: 1028727 Symantec Security Advisory SYM13-006 CVE-2013-1613 CVE-2013-1614 CVE-2013-1615 IMPACT ASSESSMENT: Medium DISCUSSION: The console does not properly filter HTML code from user-supplied input

5

V-168: Splunk Web Input Validation Flaw Permits Cross-Site Scripting...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks V-168: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks May 31, 2013 - 6:00am Addthis...

6

V-124: Splunk Web Input Validation Flaw Permits Cross-Site Scripting...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks V-124: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks April 2, 2013 - 1:13am Addthis...

7

U-270:Trend Micro Control Manager Input Validation Flaw in Ad...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0:Trend Micro Control Manager Input Validation Flaw in Ad Hoc Query Module Lets Remote Users Inject SQL Commands U-270:Trend Micro Control Manager Input Validation Flaw in Ad Hoc...

8

T-602: BlackBerry Enterprise Server Input Validation Flaw in...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

02: BlackBerry Enterprise Server Input Validation Flaw in BlackBerry Web Desktop Manager Permits Cross-Site Scripting Attacks T-602: BlackBerry Enterprise Server Input Validation...

9

U-001:Symantec IM Manager Input Validation Flaws | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-001:Symantec IM Manager Input Validation Flaws U-001:Symantec IM Manager Input Validation Flaws U-001:Symantec IM Manager Input Validation Flaws October 3, 2011 - 12:45pm Addthis PROBLEM: Symantec IM Manager Input Validation Flaws Permit Cross-Site Scripting, SQL Injection, and Code Execution Attacks. PLATFORM: Version(s): prior to 8.4.18 ABSTRACT: Symantec IM Manager Input Validation Flaws Permit Cross-Site Scripting, SQL Injection, and Code Execution Attacks. reference LINKS: Security Advisory: SYM11-012 SecurityTracker Alert ID: 1026130 IMPACT ASSESSMENT: Medium Discussion: Several vulnerabilities were reported in Symantec IM Manager. A remote user can conduct cross-site scripting attacks. A remote user can inject SQL commands. Several scripts do not properly filter HTML code from user-supplied input before displaying the input [CVE-2011-0552]. A remote user can create a

10

T-698: Adobe ColdFusion Input Validation Flaw in 'probe.cfm' Permits  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Adobe ColdFusion Input Validation Flaw in 'probe.cfm' 8: Adobe ColdFusion Input Validation Flaw in 'probe.cfm' Permits Cross-Site Scripting Attacks T-698: Adobe ColdFusion Input Validation Flaw in 'probe.cfm' Permits Cross-Site Scripting Attacks August 22, 2011 - 3:54pm Addthis PROBLEM: A vulnerability was reported in Adobe ColdFusion. A remote user can conduct cross-site scripting attacks. PLATFORM: Adobe ColdFusion 9.x ABSTRACT: Adobe ColdFusion Input Validation Flaw in 'probe.cfm' Permits Cross-Site Scripting Attacks. reference LINKS: Adobe Vulnerability Report Adobe Security Bulletin ColdFusion Support SecurityTracker Alert ID: 1025957 IMPACT ASSESSMENT: Medium Discussion: The 'probe.cfm' script does not properly filter HTML code from user-supplied input in the 'name' parameter before displaying the input. A remote user can create a specially crafted URL that, when loaded by a

11

U-132: Apache Wicket Input Validation Flaw in 'wicket:pageMapName'  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Apache Wicket Input Validation Flaw in 'wicket:pageMapName' 2: Apache Wicket Input Validation Flaw in 'wicket:pageMapName' Parameter Permits Cross-Site Scripting Attacks U-132: Apache Wicket Input Validation Flaw in 'wicket:pageMapName' Parameter Permits Cross-Site Scripting Attacks March 23, 2012 - 7:42am Addthis PROBLEM: Apache Wicket Input Validation Flaw in 'wicket:pageMapName' Parameter Permits Cross-Site Scripting Attacks PLATFORM: Apache Wicket 1.4.x ABSTRACT: A remote user can conduct cross-site scripting attacks. reference LINKS: Apache Wicket CVE-2012-0047 SecurityTracker Alert ID: 1026839 IMPACT ASSESSMENT: High Discussion: The software does not properly filter HTML code from user-supplied input in the 'wicket:pageMapName' request parameter before displaying the input. A remote user can cause arbitrary scripting code to be executed by the target

12

V-124: Splunk Web Input Validation Flaw Permits Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Splunk Web Input Validation Flaw Permits Cross-Site 4: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks V-124: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks April 2, 2013 - 1:13am Addthis PROBLEM: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks PLATFORM: Version(s): 4.3.0 through 4.3.5 ABSTRACT: A vulnerability was reported in Splunk Web. REFERENCE LINKS: SecurityTracker Alert ID: 1028371 Splunk IMPACT ASSESSMENT: High DISCUSSION: Splunk Web does not properly filter HTML code from user-supplied input before displaying the input. A remote user can cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the site running the Splunk Web software and will run in the security context of that site. As a result, the code will be able to access the

13

U-252: Barracuda Web Filter Input Validation Flaws Permit Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Barracuda Web Filter Input Validation Flaws Permit 2: Barracuda Web Filter Input Validation Flaws Permit Cross-Site Scripting Attacks U-252: Barracuda Web Filter Input Validation Flaws Permit Cross-Site Scripting Attacks September 6, 2012 - 6:00am Addthis PROBLEM: Barracuda Web Filter Input Validation Flaws Permit Cross-Site Scripting Attacks PLATFORM: Barracuda Web Filter 5.0.015 is vulnerable; other versions may also be affected. ABSTRACT: Barracuda Web Filter Authentication Module Multiple HTML Injection Vulnerabilities reference LINKS: Barracuda Networks Barracuda Networks Security ID: BNSEC-279/BNYF-5533 SecurityTracker Alert ID: 1027500 Bugtraq ID: 55394 seclists.org IMPACT ASSESSMENT: Medium Discussion: Two scripts not properly filter HTML code from user-supplied input before displaying the input. A remote user can cause arbitrary scripting code to

14

U-050: Adobe Flex SDK Input Validation Flaw Permits Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Adobe Flex SDK Input Validation Flaw Permits Cross-Site 0: Adobe Flex SDK Input Validation Flaw Permits Cross-Site Scripting Attacks U-050: Adobe Flex SDK Input Validation Flaw Permits Cross-Site Scripting Attacks December 2, 2011 - 5:24am Addthis PROBLEM: Adobe Flex SDK Input Validation Flaw Permits Cross-Site Scripting Attacks. PLATFORM: Adobe Flex SDK 4.5.1 and earlier 4.x versions for Windows, Macintosh and Linux Adobe Flex SDK 3.6 and earlier 3.x versions for Windows, Macintosh and Linux ABSTRACT: Flex applications created using the Flex SDK may not properly filter HTML code from user-supplied input before displaying the input. reference LINKS: Adobe Security Bulletin CVE-2011-2461 SecurityTracker Alert ID: 1026361 IMPACT ASSESSMENT: High Discussion: A remote user may be able to cause arbitrary scripting code to be executed

15

T-698: Adobe ColdFusion Input Validation Flaw in 'probe.cfm' Permits  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Adobe ColdFusion Input Validation Flaw in 'probe.cfm' 8: Adobe ColdFusion Input Validation Flaw in 'probe.cfm' Permits Cross-Site Scripting Attacks T-698: Adobe ColdFusion Input Validation Flaw in 'probe.cfm' Permits Cross-Site Scripting Attacks August 22, 2011 - 3:54pm Addthis PROBLEM: A vulnerability was reported in Adobe ColdFusion. A remote user can conduct cross-site scripting attacks. PLATFORM: Adobe ColdFusion 9.x ABSTRACT: Adobe ColdFusion Input Validation Flaw in 'probe.cfm' Permits Cross-Site Scripting Attacks. reference LINKS: Adobe Vulnerability Report Adobe Security Bulletin ColdFusion Support SecurityTracker Alert ID: 1025957 IMPACT ASSESSMENT: Medium Discussion: The 'probe.cfm' script does not properly filter HTML code from user-supplied input in the 'name' parameter before displaying the input. A remote user can create a specially crafted URL that, when loaded by a

16

V-139: Cisco Network Admission Control Input Validation Flaw Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Cisco Network Admission Control Input Validation Flaw Lets 9: Cisco Network Admission Control Input Validation Flaw Lets Remote Users Inject SQL Commands V-139: Cisco Network Admission Control Input Validation Flaw Lets Remote Users Inject SQL Commands April 21, 2013 - 11:50pm Addthis PROBLEM: Cisco Network Admission Control Input Validation Flaw Lets Remote Users Inject SQL Commands PLATFORM: Cisco NAC Manager versions prior to 4.8.3.1 and 4.9.2 ABSTRACT: A vulnerability was reported in Cisco Network Admission Control. REFERENCE LINKS: SecurityTracker Alert ID: 1028451 Cisco Advisory ID: cisco-sa-20130417-nac CVE-2013-1177 IMPACT ASSESSMENT: High DISCUSSION: The Cisco Network Admission Control (NAC) Manager does not properly validate user-supplied input. A remote user can supply a specially crafted parameter value to execute SQL commands on the underlying database.

17

U-255: Apache Wicket Input Validation Flaw Permits Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apache Wicket Input Validation Flaw Permits Cross-Site 5: Apache Wicket Input Validation Flaw Permits Cross-Site Scripting Attacks U-255: Apache Wicket Input Validation Flaw Permits Cross-Site Scripting Attacks September 11, 2012 - 6:00am Addthis PROBLEM: Apache Wicket Input Validation Flaw Permits Cross-Site Scripting Attacks PLATFORM: Apache Software Foundation Apache Wicket 1.5.5 Apache Software Foundation Apache Wicket 1.5-RC5.1 Apache Software Foundation Apache Wicket 1.4.20 Apache Software Foundation Apache Wicket 1.4.18 Apache Software Foundation Apache Wicket 1.4.17 Apache Software Foundation Apache Wicket 1.4.16 ABSTRACT: A vulnerability was reported in Apache Wicket reference LINKS: Apache Wicket SecurityTracker Alert ID: 1027508 Bugtraq ID: 55445 CVE-2012-3373 IMPACT ASSESSMENT: Medium Discussion: The software does not properly filter HTML code from user-supplied input in

18

U-015: CiscoWorks Common Services Home Page Input Validation Flaw Lets  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

15: CiscoWorks Common Services Home Page Input Validation Flaw 15: CiscoWorks Common Services Home Page Input Validation Flaw Lets Remote Users Execute Arbitrary Commands U-015: CiscoWorks Common Services Home Page Input Validation Flaw Lets Remote Users Execute Arbitrary Commands October 20, 2011 - 7:30am Addthis PROBLEM: CiscoWorks Common Services Home Page Input Validation Flaw Lets Remote Users Execute Arbitrary Commands. PLATFORM: CiscoWorks Common Services-based products prior to version 4.1 running on Microsoft Windows ABSTRACT: Successful exploitation of this vulnerability may allow an authenticated, remote attacker to execute arbitrary commands on the affected system with the privileges of a system administrator. reference LINKS: Cisco Security Advisory ID: cisco-sa-20111019-cs Cisco Security Advisories and Responses

19

U-219: Symantec Web Gateway Input Validation Flaws Lets Remote Users Inject  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

19: Symantec Web Gateway Input Validation Flaws Lets Remote 19: Symantec Web Gateway Input Validation Flaws Lets Remote Users Inject SQL Commands, Execute Arbitrary Commands, and Change User Passwords U-219: Symantec Web Gateway Input Validation Flaws Lets Remote Users Inject SQL Commands, Execute Arbitrary Commands, and Change User Passwords July 24, 2012 - 7:00am Addthis PROBLEM: Symantec Web Gateway Input Validation Flaws Lets Remote Users Inject SQL Commands, Execute Arbitrary Commands, and Change User Passwords PLATFORM: Symantec Web Gateway 5.0.x.x ABSTRACT: Several vulnerabilities were reported in Symantec Web Gateway. REFERENCE LINKS: Security Advisories Relating to Symantec Products SecurityTracker Alert ID: 1027289 Bugtraq ID: 54424 Bugtraq ID: 54425 Bugtraq ID: 54426 Bugtraq ID: 54427 Bugtraq ID: 54429 Bugtraq ID: 54430

20

U-238: HP Service Manager Input Validation Flaw Permits Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: HP Service Manager Input Validation Flaw Permits Cross-Site 8: HP Service Manager Input Validation Flaw Permits Cross-Site Scripting Attacks U-238: HP Service Manager Input Validation Flaw Permits Cross-Site Scripting Attacks August 17, 2012 - 7:00am Addthis PROBLEM: HP Service Manager Input Validation Flaw Permits Cross-Site Scripting Attacks PLATFORM: Version(s): 7.11, 9.21, 9.30 ABSTRACT: Cross-site scripting (XSS) vulnerability in HP Service Manager Web Tier 7.11, 9.21, and 9.30, and HP Service Center Web Tier 6.28, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. REFERENCE LINKS: www2.hp.com http://www.securitytracker.com/id/1027399 CVE-2012-3251 IMPACT ASSESSMENT: Moderate Discussion: A vulnerability was reported in HP Service Manager. A remote user can conduct cross-site scripting attacks. The software does not properly filter

Note: This page contains sample records for the topic "input validation flaw" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Apache VCL Input Validation Flaw Lets Remote Authenticated 0: Apache VCL Input Validation Flaw Lets Remote Authenticated Users Gain Elevated Privileges V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated Users Gain Elevated Privileges May 7, 2013 - 12:01am Addthis PROBLEM: Apache VCL Input Validation Flaw Lets Remote Authenticated Users Gain Elevated Privileges PLATFORM: Apache VCL Versions: 2.1, 2.2, 2.2.1, 2.3, 2.3.1 ABSTRACT: A vulnerability was reported in Apache VCL. REFERENCE LINKS: Apache Securelist SecurityTracker Alert ID: 1028515 CVE-2013-0267 IMPACT ASSESSMENT: Medium DISCUSSION: A remote authenticated administrative user with minimal administrative privileges (i.e., nodeAdmin, manageGroup, resourceGrant, or userGrant) can send specially crafted data via the web interface or XMLRPC API to gain additional administrative privileges.

22

U-219: Symantec Web Gateway Input Validation Flaws Lets Remote Users Inject  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

19: Symantec Web Gateway Input Validation Flaws Lets Remote 19: Symantec Web Gateway Input Validation Flaws Lets Remote Users Inject SQL Commands, Execute Arbitrary Commands, and Change User Passwords U-219: Symantec Web Gateway Input Validation Flaws Lets Remote Users Inject SQL Commands, Execute Arbitrary Commands, and Change User Passwords July 24, 2012 - 7:00am Addthis PROBLEM: Symantec Web Gateway Input Validation Flaws Lets Remote Users Inject SQL Commands, Execute Arbitrary Commands, and Change User Passwords PLATFORM: Symantec Web Gateway 5.0.x.x ABSTRACT: Several vulnerabilities were reported in Symantec Web Gateway. REFERENCE LINKS: Security Advisories Relating to Symantec Products SecurityTracker Alert ID: 1027289 Bugtraq ID: 54424 Bugtraq ID: 54425 Bugtraq ID: 54426 Bugtraq ID: 54427 Bugtraq ID: 54429 Bugtraq ID: 54430

23

U-229: HP Network Node Manager i Input Validation Flaw Permits Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: HP Network Node Manager i Input Validation Flaw Permits 9: HP Network Node Manager i Input Validation Flaw Permits Cross-Site Scripting Attacks U-229: HP Network Node Manager i Input Validation Flaw Permits Cross-Site Scripting Attacks August 7, 2012 - 7:00am Addthis PROBLEM: HP Network Node Manager i Input Validation Flaw Permits Cross-Site Scripting Attacks PLATFORM: HP Network Node Manager I (NNMi) v8.x, v9.0x, v9.1x, v9.20 for HP-UX, Linux, Solaris, and Windows ABSTRACT: Potential security vulnerabilities have been identified with HP Network Node Manager i (NNMi) for HP-UX, Linux, Solaris, and Windows. The vulnerabilities could be remotely exploited resulting in cross site scripting (XSS). Reference LINKS: HP Document ID: c03405705 SecurityTracker Alert ID: 1027345 Bugtraq ID: 54815 CVE-2012-2022 IMPACT ASSESSMENT:

24

U-238: HP Service Manager Input Validation Flaw Permits Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

38: HP Service Manager Input Validation Flaw Permits Cross-Site 38: HP Service Manager Input Validation Flaw Permits Cross-Site Scripting Attacks U-238: HP Service Manager Input Validation Flaw Permits Cross-Site Scripting Attacks August 17, 2012 - 7:00am Addthis PROBLEM: HP Service Manager Input Validation Flaw Permits Cross-Site Scripting Attacks PLATFORM: Version(s): 7.11, 9.21, 9.30 ABSTRACT: Cross-site scripting (XSS) vulnerability in HP Service Manager Web Tier 7.11, 9.21, and 9.30, and HP Service Center Web Tier 6.28, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. REFERENCE LINKS: www2.hp.com http://www.securitytracker.com/id/1027399 CVE-2012-3251 IMPACT ASSESSMENT: Moderate Discussion: A vulnerability was reported in HP Service Manager. A remote user can conduct cross-site scripting attacks. The software does not properly filter

25

U-270:Trend Micro Control Manager Input Validation Flaw in Ad Hoc Query  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0:Trend Micro Control Manager Input Validation Flaw in Ad Hoc 0:Trend Micro Control Manager Input Validation Flaw in Ad Hoc Query Module Lets Remote Users Inject SQL Commands U-270:Trend Micro Control Manager Input Validation Flaw in Ad Hoc Query Module Lets Remote Users Inject SQL Commands September 28, 2012 - 6:00am Addthis PROBLEM: Trend Micro Control Manager Input Validation Flaw in Ad Hoc Query Module Lets Remote Users Inject SQL Commands PLATFORM: Control Manager - 3.0, 3.5, 5.0, 5.5, 6.0 ABSTRACT: Trend Micro has been notified of a potential product vulnerability in Control Manager. reference LINKS: Trend Micro Technical Support ID 1061043 SecurityTracker Alert ID: 1027584 Secunia Advisory SA50760 CVE-2012-2998 IMPACT ASSESSMENT: Medium Discussion: A vulnerability has been reported in Trend Micro Control Manager, which can

26

U-015: CiscoWorks Common Services Home Page Input Validation Flaw Lets  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: CiscoWorks Common Services Home Page Input Validation Flaw 5: CiscoWorks Common Services Home Page Input Validation Flaw Lets Remote Users Execute Arbitrary Commands U-015: CiscoWorks Common Services Home Page Input Validation Flaw Lets Remote Users Execute Arbitrary Commands October 20, 2011 - 7:30am Addthis PROBLEM: CiscoWorks Common Services Home Page Input Validation Flaw Lets Remote Users Execute Arbitrary Commands. PLATFORM: CiscoWorks Common Services-based products prior to version 4.1 running on Microsoft Windows ABSTRACT: Successful exploitation of this vulnerability may allow an authenticated, remote attacker to execute arbitrary commands on the affected system with the privileges of a system administrator. reference LINKS: Cisco Security Advisory ID: cisco-sa-20111019-cs Cisco Security Advisories and Responses

27

T-670: Skype Input Validation Flaw in 'mobile phone' Profile Entry Permits  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Skype Input Validation Flaw in 'mobile phone' Profile Entry 0: Skype Input Validation Flaw in 'mobile phone' Profile Entry Permits Cross-Site Scripting Attacks T-670: Skype Input Validation Flaw in 'mobile phone' Profile Entry Permits Cross-Site Scripting Attacks July 18, 2011 - 7:09am Addthis PROBLEM: A vulnerability was reported in Skype. A remote user can conduct cross-site scripting attacks. PLATFORM: 5.3.0.120 and prior versions ABSTRACT: The software does not properly filter HTML code from user-supplied input in the The "mobile phone" profile entry before displaying the input. reference LINKS: SecurityTracker Alert ID: 1025789 Skype Security Advisory KoreSecure News H Security ID: 1279864 IMPACT ASSESSMENT: High Discussion: Skype suffers from a persistent Cross-Site Scripting vulnerability due to a lack of input validation and output sanitization of the "mobile phone"

28

T-670: Skype Input Validation Flaw in 'mobile phone' Profile Entry Permits  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

70: Skype Input Validation Flaw in 'mobile phone' Profile Entry 70: Skype Input Validation Flaw in 'mobile phone' Profile Entry Permits Cross-Site Scripting Attacks T-670: Skype Input Validation Flaw in 'mobile phone' Profile Entry Permits Cross-Site Scripting Attacks July 18, 2011 - 7:09am Addthis PROBLEM: A vulnerability was reported in Skype. A remote user can conduct cross-site scripting attacks. PLATFORM: 5.3.0.120 and prior versions ABSTRACT: The software does not properly filter HTML code from user-supplied input in the The "mobile phone" profile entry before displaying the input. reference LINKS: SecurityTracker Alert ID: 1025789 Skype Security Advisory KoreSecure News H Security ID: 1279864 IMPACT ASSESSMENT: High Discussion: Skype suffers from a persistent Cross-Site Scripting vulnerability due to a lack of input validation and output sanitization of the "mobile phone"

29

U-139: IBM Tivoli Directory Server Input Validation Flaw | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

39: IBM Tivoli Directory Server Input Validation Flaw 39: IBM Tivoli Directory Server Input Validation Flaw U-139: IBM Tivoli Directory Server Input Validation Flaw April 3, 2012 - 7:00am Addthis PROBLEM: A vulnerability was reported in IBM Tivoli Directory Server. A remote user can conduct cross-site scripting attacks PLATFORM: Version(s): 6.2, 6.3 ABSTRACT: The Web Admin Tool does not properly filter HTML code from user-supplied input before displaying the input. Reference LINKS: Vendor Advisory Security Tracker ID 1026880 CVE-2012-0740 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a specially crafted URL that, when loaded by a target user, will cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the site running the IBM Tivoli Directory Server software and will run in the security context

30

V-229: IBM Lotus iNotes Input Validation Flaws Permit Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

V-229: IBM Lotus iNotes Input Validation Flaws Permit Cross-Site V-229: IBM Lotus iNotes Input Validation Flaws Permit Cross-Site Scripting Attacks V-229: IBM Lotus iNotes Input Validation Flaws Permit Cross-Site Scripting Attacks August 28, 2013 - 6:00am Addthis PROBLEM: Several vulnerabilities were reported in IBM Lotus iNotes PLATFORM: IBM Lotus iNotes 8.5.x ABSTRACT: IBM Lotus iNotes 8.5.x contains four cross-site scripting vulnerabilities REFERENCE LINKS: Security Tracker Alert ID 1028954 IBM Security Bulletin 1647740 Seclist.org CVE-2013-0590 CVE-2013-0591 CVE-2013-0595 IMPACT ASSESSMENT: Medium DISCUSSION: The software does not properly filter HTML code from user-supplied input before displaying the input. A remote user can cause arbitrary scripting code to be executed by the target user's browser. The code will originate

31

U-102: Cisco IronPort Encryption Appliance Input Validation Flaw Permits  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Cisco IronPort Encryption Appliance Input Validation Flaw 2: Cisco IronPort Encryption Appliance Input Validation Flaw Permits Cross-Site Scripting Attacks U-102: Cisco IronPort Encryption Appliance Input Validation Flaw Permits Cross-Site Scripting Attacks February 14, 2012 - 8:00am Addthis PROBLEM: A vulnerability was reported in Cisco IronPort Encryption Appliance. PLATFORM: Version(s): prior to 6.5.3 ABSTRACT: A remote user can conduct cross-site scripting reference LINKS: Vendor URL CVE-2012-0340 Security Tracker ID:1026669 IMPACT ASSESSMENT: Medium Discussion: The interface does not properly filter HTML code from user-supplied input before displaying the input. A remote user can create a specially crafted URL that, when loaded by a target user, will cause arbitrary scripting code to be executed by the target user's browser. The code will originate from

32

V-168: Splunk Web Input Validation Flaw Permits Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Splunk Web Input Validation Flaw Permits Cross-Site 8: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks V-168: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks May 31, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Splunk Web PLATFORM: Version(s) prior to 5.0.3 ABSTRACT: A reflected cross-site scripting vulnerability was identified in Splunk Web REFERENCE LINKS: SecurityTracker Alert ID: 1028605 Splunk Security Advisory SPL-59895 CVE-2012-6447 IMPACT ASSESSMENT: Medium DISCUSSION: The web interface does not properly filter HTML code from user-supplied input before displaying the input. A remote user can create a specially crafted URL that, when loaded by a target user, will cause arbitrary scripting code to be executed by the target user's browser. The code will

33

U-144:Juniper Secure Access Input Validation Flaw Permits Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4:Juniper Secure Access Input Validation Flaw Permits 4:Juniper Secure Access Input Validation Flaw Permits Cross-Site Scripting Attacks U-144:Juniper Secure Access Input Validation Flaw Permits Cross-Site Scripting Attacks April 10, 2012 - 7:30am Addthis PROBLEM: A vulnerability was reported in Juniper Secure Access/Instant Virtual Extranet (IVE). A remote user can conduct cross-site scripting attacks. PLATFORM: Version(s): prior to 7.0R9 and 7.1R ABSTRACT: The VPN management interface does not properly filter HTML code from user-supplied input before displaying the input. A remote user can cause arbitrary scripting code to be executed by the target user's browser. reference LINKS: Vendor URL SecurityTracker Alert ID: 1026893 IMPACT ASSESSMENT: High Discussion: The code will originate from the interface and will run in the security

34

V-153: Symantec Brightmail Gateway Input Validation Flaw Permits Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Symantec Brightmail Gateway Input Validation Flaw Permits 3: Symantec Brightmail Gateway Input Validation Flaw Permits Cross-Site Scripting Attacks V-153: Symantec Brightmail Gateway Input Validation Flaw Permits Cross-Site Scripting Attacks May 10, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Symantec Brightmail Gateway PLATFORM: The vulnerabilities are reported in versions prior to 9.5.x ABSTRACT: Symantec's Brightmail Gateway management console is susceptible to stored cross-site scripting (XSS) issues found in some of the administrative interface pages. REFERENCE LINKS: Security Tracker Alert ID: 1028530 Symantec Security Advisory CVE-2013-1611 IMPACT ASSESSMENT: Medium DISCUSSION: The administrative interface does not properly filter HTML code from user-supplied input before displaying the input. A remote user can cause

35

V-168: Splunk Web Input Validation Flaw Permits Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

68: Splunk Web Input Validation Flaw Permits Cross-Site 68: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks V-168: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks May 31, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Splunk Web PLATFORM: Version(s) prior to 5.0.3 ABSTRACT: A reflected cross-site scripting vulnerability was identified in Splunk Web REFERENCE LINKS: SecurityTracker Alert ID: 1028605 Splunk Security Advisory SPL-59895 CVE-2012-6447 IMPACT ASSESSMENT: Medium DISCUSSION: The web interface does not properly filter HTML code from user-supplied input before displaying the input. A remote user can create a specially crafted URL that, when loaded by a target user, will cause arbitrary scripting code to be executed by the target user's browser. The code will

36

V-112: Microsoft SharePoint Input Validation Flaws Permit Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Microsoft SharePoint Input Validation Flaws Permit 2: Microsoft SharePoint Input Validation Flaws Permit Cross-Site Scripting and Denial of Service Attacks V-112: Microsoft SharePoint Input Validation Flaws Permit Cross-Site Scripting and Denial of Service Attacks March 15, 2013 - 6:00am Addthis PROBLEM: Several vulnerabilities were reported in Microsoft SharePoint PLATFORM: Microsoft SharePoint 2010 SP1 ABSTRACT: This security update resolves four reported vulnerabilities in Microsoft SharePoint and Microsoft SharePoint Foundation. REFERENCE LINKS: Security Tracker Alert ID 1028278 MS Security Bulletin MS13-024 CVE-2013-0080 CVE-2013-0083 CVE-2013-0084 CVE-2013-0085 IMPACT ASSESSMENT: High DISCUSSION: The security update addresses the vulnerabilities correcting the way that Microsoft SharePoint Server validates URLs and user input.

37

T-701: Citrix Access Gateway Enterprise Edition Input Validation Flaw in  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Citrix Access Gateway Enterprise Edition Input Validation 1: Citrix Access Gateway Enterprise Edition Input Validation Flaw in Logon Portal Permits Cross-Site Scripting Attacks T-701: Citrix Access Gateway Enterprise Edition Input Validation Flaw in Logon Portal Permits Cross-Site Scripting Attacks August 25, 2011 - 3:33pm Addthis PROBLEM: A vulnerability was reported in Citrix Access Gateway Enterprise Edition. A remote user can conduct cross-site scripting attacks. PLATFORM: Citrix Access Gateway Enterprise Edition 9.2-49.8 and prior. Citrix Access Gateway Enterprise Edition version 9.3 is not affected by this vulnerability. ABSTRACT: Citrix Access Gateway Enterprise Edition Input Validation Flaw in Logon Portal Permits Cross-Site Scripting Attacks. reference LINKS: SecurityTracker Alert ID: 1025973 Citrix Document ID: CTX129971

38

U-195: PHPlist Input Validation Flaws Permit Cross-Site Scripting and SQL  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: PHPlist Input Validation Flaws Permit Cross-Site Scripting 5: PHPlist Input Validation Flaws Permit Cross-Site Scripting and SQL Injection Attacks U-195: PHPlist Input Validation Flaws Permit Cross-Site Scripting and SQL Injection Attacks June 20, 2012 - 7:00am Addthis PROBLEM: Two vulnerabilities were reported in PHPlist. A remote user can conduct cross-site scripting attacks. A remote authenticated user can inject SQL commands. PLATFORM: Version(s): prior to 2.10.18 ABSTRACT: The 'public_html/lists/admin' pages do not properly validate user-supplied input in the 'sortby' parameter [CVE-2012-2740]. A remote authenticated administrative user can supply a specially crafted parameter value to execute SQL commands on the underlying database. REFERENCE LINKS: Vendor Advisory Security Tracker ID 1027181 CVE-2012-2740, CVE-2012-2741

39

V-034: RSA Adaptive Authentication (On-Premise) Input Validation Flaws  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: RSA Adaptive Authentication (On-Premise) Input Validation 4: RSA Adaptive Authentication (On-Premise) Input Validation Flaws Permit Cross-Site Scripting Attacks V-034: RSA Adaptive Authentication (On-Premise) Input Validation Flaws Permit Cross-Site Scripting Attacks November 27, 2012 - 2:00am Addthis PROBLEM: RSA Adaptive Authentication (On-Premise) Input Validation Flaws Permit Cross-Site Scripting Attacks PLATFORM: RSA Adaptive Authentication (On-Premise) 6.x ABSTRACT: A vulnerability was reported in RSA Adaptive Authentication (On-Premise). REFERENCE LINKS: SecurityTracker Alert ID: 1027811 SecurityFocus Security Alert RSA Customer Support CVE-2012-4611 IMPACT ASSESSMENT: Medium DISCUSSION: A vulnerability was reported in RSA Adaptive Authentication (On-Premise). A remote user can conduct cross-site scripting attacks. The software does not

40

V-112: Microsoft SharePoint Input Validation Flaws Permit Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Microsoft SharePoint Input Validation Flaws Permit 2: Microsoft SharePoint Input Validation Flaws Permit Cross-Site Scripting and Denial of Service Attacks V-112: Microsoft SharePoint Input Validation Flaws Permit Cross-Site Scripting and Denial of Service Attacks March 15, 2013 - 6:00am Addthis PROBLEM: Several vulnerabilities were reported in Microsoft SharePoint PLATFORM: Microsoft SharePoint 2010 SP1 ABSTRACT: This security update resolves four reported vulnerabilities in Microsoft SharePoint and Microsoft SharePoint Foundation. REFERENCE LINKS: Security Tracker Alert ID 1028278 MS Security Bulletin MS13-024 CVE-2013-0080 CVE-2013-0083 CVE-2013-0084 CVE-2013-0085 IMPACT ASSESSMENT: High DISCUSSION: The security update addresses the vulnerabilities correcting the way that Microsoft SharePoint Server validates URLs and user input.

Note: This page contains sample records for the topic "input validation flaw" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

T-602: BlackBerry Enterprise Server Input Validation Flaw in BlackBerry Web  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

02: BlackBerry Enterprise Server Input Validation Flaw in 02: BlackBerry Enterprise Server Input Validation Flaw in BlackBerry Web Desktop Manager Permits Cross-Site Scripting Attacks T-602: BlackBerry Enterprise Server Input Validation Flaw in BlackBerry Web Desktop Manager Permits Cross-Site Scripting Attacks April 14, 2011 - 5:07am Addthis PROBLEM: BlackBerry Enterprise Server Input Validation Flaw in BlackBerry Web Desktop Manager Permits Cross-Site Scripting Attacks PLATFORM: BlackBerry Enterprise Server Express versions 5.0.1 and 5.0.2 for Microsoft Exchange, 5.0.2 for IBM Lotus Domino, 5.0.0 through 5.0.3 for Microsoft Exchange and IBM Lotus Domino, and version 5.0.1 for Novell GroupWise. OS Platform(s): Windows (2000), Windows (2003), Windows (2008) ABSTRACT: The BlackBerry Web Desktop Manager not properly filter HTML code from

42

U-067:WebSVN Input Validation Flaw in getLog() Permits Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7:WebSVN Input Validation Flaw in getLog() Permits Cross-Site 7:WebSVN Input Validation Flaw in getLog() Permits Cross-Site Scripting Attacks U-067:WebSVN Input Validation Flaw in getLog() Permits Cross-Site Scripting Attacks December 22, 2011 - 8:15am Addthis PROBLEM: WebSVN Input Validation Flaw in getLog() Permits Cross-Site Scripting Attacks PLATFORM: WebSVN 2.3.0 and prior versions ABSTRACT: A remote user can access the target user's cookies (including authentication cookies), if any, associated with the site running the WebSVN software, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user. reference LINKS: SecurityTracker Alert ID: 1026438 WebSVN version update WebSVN News IMPACT ASSESSMENT: Medium Discussion: The getLog() function does not properly filter HTML code from user-supplied

43

U-031: Microsoft Active Directory CRL Validation Flaw Lets Remote...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Directory CRL Validation Flaw Lets Remote Users Bypass Authentication. PLATFORM: Windows XP Service Pack 3 Windows XP Professional x64 Edition Service Pack 2 Windows Server...

44

U-254: Webmin Flaws Let Remote Authenticated Users Execute Arbitrary...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

System Multiple Vulnerabilities U-255: Apache Wicket Input Validation Flaw Permits Cross-Site Scripting Attacks V-104: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code...

45

U-193: NetBSD System Call Return Value Validation Flaw Lets Local...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Technology Centers Field Sites Power Marketing Administration Other Agencies You are here Home U-193: NetBSD System Call Return Value Validation Flaw Lets Local Users Gain...

46

U-031: Microsoft Active Directory CRL Validation Flaw Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Microsoft Active Directory CRL Validation Flaw Lets Remote 1: Microsoft Active Directory CRL Validation Flaw Lets Remote Users Bypass Authentication U-031: Microsoft Active Directory CRL Validation Flaw Lets Remote Users Bypass Authentication November 9, 2011 - 8:30am Addthis PROBLEM: Microsoft Active Directory CRL Validation Flaw Lets Remote Users Bypass Authentication. PLATFORM: Windows XP Service Pack 3 Windows XP Professional x64 Edition Service Pack 2 Windows Server 2003 Service Pack 2 Windows Server 2003 x64 Edition Service Pack 2 Active Directory Windows Server 2003 with SP2 for Itanium-based Systems Windows Vista Service Pack 2 Windows Vista x64 Edition Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 Windows Server 2008 for x64-based Systems Service Pack 2 Windows 7 for 32-bit Systems Windows 7 for 32-bit Systems Service Pack 1

47

V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

or userGrant) can send specially crafted data via the web interface or XMLRPC API to gain additional administrative privileges. IMPACT: A remote authenticated user can...

48

U-238: HP Service Manager Input Validation Flaw Permits Cross...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9.21, 9.30 ABSTRACT: Cross-site scripting (XSS) vulnerability in HP Service Manager Web Tier 7.11, 9.21, and 9.30, and HP Service Center Web Tier 6.28, allows remote attackers...

49

T-649: Red Hat Network Satellite Server Request Validation Flaw Permits  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Red Hat Network Satellite Server Request Validation Flaw 9: Red Hat Network Satellite Server Request Validation Flaw Permits Cross-Site Request Forgery Attacks T-649: Red Hat Network Satellite Server Request Validation Flaw Permits Cross-Site Request Forgery Attacks June 17, 2011 - 3:43pm Addthis PROBLEM: A vulnerability was reported in Red Hat Network Satellite Server. A remote user can conduct cross-site request forgery attacks. PLATFORM: Versions 5.4.x ABSTRACT: The Red Hat Network (RHN) Satellite and Spacewalk services do not properly validate user-supplied. A remote user can create specially crafted HTML that, when loaded by a target authenticated user, will take actions on the target site acting as the target user. reference LINKS: SecurityTracker Alert ID: 1025674 RHSA-2011:0879-1 RHN Support CVE-2009-4139 IMPACT ASSESSMENT:

50

T-623: HP Business Availability Center Input Validation Hole...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: HP Business Availability Center Input Validation Hole Permits Cross-Site Scripting Attacks T-623: HP Business Availability Center Input Validation Hole Permits Cross-Site...

51

U-193: NetBSD System Call Return Value Validation Flaw Lets Local Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: NetBSD System Call Return Value Validation Flaw Lets Local 3: NetBSD System Call Return Value Validation Flaw Lets Local Users Gain Elevated Privileges U-193: NetBSD System Call Return Value Validation Flaw Lets Local Users Gain Elevated Privileges June 18, 2012 - 8:00am Addthis PROBLEM: A vulnerability was reported in NetBSD. A local user can obtain elevated privileges on the target system. PLATFORM: Version(s): 4.0.*, 5.0.*, 5.1, 6.0 Beta ABSTRACT: On Intel CPUs, the sysret instruction can be manipulated into returning to specific non-canonical addresses, which may yield a CPU reset. We cannot currently rule out with utter confidence that this vulnerability could not also be used to execute code with kernel privilege instead of crashing the system. reference LINKS: Vendor Advisory Security Tracker ID 1027178 CVE-2012-0217

52

T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Apple iOS Certificate Chain Validation Flaw Lets Certain 6: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or Modify SSL/TLS Sessions T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or Modify SSL/TLS Sessions July 26, 2011 - 1:06am Addthis PROBLEM: A vulnerability was reported in Apple iOS. A remote user with the ability to conduct a man-in-the-middle attack can access or modify SSL/TLS sessions. PLATFORM: iOS 4.2.5 through 4.2.9 for iPhone 4 (CDMA) iOS 3.0 through 4.3.4 for iPhone 3GS and iPhone 4 (GSM) iOS 3.1 through 4.3.4 for iPod touch (3rd generation) and later iOS 3.2 through 4.3.4 for iPad ABSTRACT: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or Modify SSL/TLS Sessions. reference LINKS: SecurityTracker Alert ID: 1025837

53

V-165: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

65: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote 65: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote Users Spoof the Server V-165: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote Users Spoof the Server May 28, 2013 - 12:46am Addthis PROBLEM: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote Users Spoof the Server PLATFORM: Cisco WebEx for iOS 4.1, Other versions may also be affected. ABSTRACT: A vulnerability was reported in Cisco WebEx for iOS. REFERENCE LINKS: Cisco SecurityTracker Alert ID: 1028592 Secunia Advisory SA51412 CVE-2012-6399 IMPACT ASSESSMENT: Medium DISCUSSION: A security issue in Cisco WebEx for iOS can be exploited by malicious people to conduct spoofing attacks. The security issue is caused due to the application not properly verifying the server SSL certificate. This can be exploited to e.g. spoof the server

54

T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

76: Apple iOS Certificate Chain Validation Flaw Lets Certain 76: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or Modify SSL/TLS Sessions T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or Modify SSL/TLS Sessions July 26, 2011 - 1:06am Addthis PROBLEM: A vulnerability was reported in Apple iOS. A remote user with the ability to conduct a man-in-the-middle attack can access or modify SSL/TLS sessions. PLATFORM: iOS 4.2.5 through 4.2.9 for iPhone 4 (CDMA) iOS 3.0 through 4.3.4 for iPhone 3GS and iPhone 4 (GSM) iOS 3.1 through 4.3.4 for iPod touch (3rd generation) and later iOS 3.2 through 4.3.4 for iPad ABSTRACT: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or Modify SSL/TLS Sessions. reference LINKS: SecurityTracker Alert ID: 1025837

55

Increased Software Reliability Through Input Validation Analysis and Testing  

Science Conference Proceedings (OSTI)

The Input Validation Testing (IVT) technique has been developed to address the problem of statically analyzing input command syntax as defined in English textual interface and requirements specifications and then generating test cases for input validation ... Keywords: Software reliability, requirements analysis, system testing, quality control and assurance, interfaces, input validation

Jane Huffman Hayes; A. Jefferson Offutt

1999-11-01T23:59:59.000Z

56

Semi-valid input coverage for fuzz testing  

Science Conference Proceedings (OSTI)

We define semi-valid input coverage (SVCov), the first coverage criterion for fuzz testing. Our criterion is applicable whenever the valid inputs can be defined by a finite set of constraints. SVCov measures to what extent the tests cover the domain ... Keywords: coverage criteria, fuzz testing, security testing

Petar Tsankov, Mohammad Torabi Dashti, David Basin

2013-07-01T23:59:59.000Z

57

T-623: HP Business Availability Center Input Validation Hole Permits  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: HP Business Availability Center Input Validation Hole 3: HP Business Availability Center Input Validation Hole Permits Cross-Site Scripting Attacks T-623: HP Business Availability Center Input Validation Hole Permits Cross-Site Scripting Attacks May 16, 2011 - 3:05pm Addthis PROBLEM: A vulnerability was reported in HP Business Availability Center. A remote user can conduct cross-site scripting attacks. PLATFORM: HP Business Availability Center software 8.06 and prior versions ABSTRACT: The software does not properly filter HTML code from user-supplied input before displaying the input. reference LINKS: SecurityTracker Alert ID:1025535 HP Knowledge Base CVE-2011-1856 Secunia ID: SA44569 HP Document ID:c02823184 | ESB-2011.0525 IMPACT ASSESSMENT: High Discussion: A remote user can cause arbitrary scripting code to be executed by the

58

T-693: Symantec Endpoint Protection Manager Input Validation Hole Permits  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Symantec Endpoint Protection Manager Input Validation Hole 3: Symantec Endpoint Protection Manager Input Validation Hole Permits Cross-Site Scripting and Cross-Site Request Forgery Attacks T-693: Symantec Endpoint Protection Manager Input Validation Hole Permits Cross-Site Scripting and Cross-Site Request Forgery Attacks August 15, 2011 - 3:42pm Addthis PROBLEM: Two vulnerabilities were reported in Symantec Endpoint Protection Manager. A remote user can conduct cross-site scripting attacks. A remote user can conduct cross-site request forgery attacks. PLATFORM: Version(s): 11.0 RU6(11.0.600x), 11.0 RU6-MP1(11.0.6100), 11.0 RU6-MP2(11.0.6200), 11.0 RU6-MP3(11.0.6300) ABSTRACT: Symantec Endpoint Protection Manager Input Validation Hole Permits Cross-Site Scripting and Cross-Site Request Forgery Attacks. reference LINKS:

59

U-229: HP Network Node Manager i Input Validation Flaw Permits...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Network Node Manager I (NNMi) v8.x, v9.0x, v9.1x, v9.20 for HP-UX, Linux, Solaris, and Windows ABSTRACT: Potential security vulnerabilities have been identified with HP Network...

60

The SCALE Verified, Archived Library of Inputs and Data - VALID  

SciTech Connect

The Verified, Archived Library of Inputs and Data (VALID) at ORNL contains high quality, independently reviewed models and results that improve confidence in analysis. VALID is developed and maintained according to a procedure of the SCALE quality assurance (QA) plan. This paper reviews the origins of the procedure and its intended purpose, the philosophy of the procedure, some highlights of its implementation, and the future of the procedure and associated VALID library. The original focus of the procedure was the generation of high-quality models that could be archived at ORNL and applied to many studies. The review process associated with model generation minimized the chances of errors in these archived models. Subsequently, the scope of the library and procedure was expanded to provide high quality, reviewed sensitivity data files for deployment through the International Handbook of Evaluated Criticality Safety Benchmark Experiments (IHECSBE). Sensitivity data files for approximately 400 such models are currently available. The VALID procedure and library continue fulfilling these multiple roles. The VALID procedure is based on the quality assurance principles of ISO 9001 and nuclear safety analysis. Some of these key concepts include: independent generation and review of information, generation and review by qualified individuals, use of appropriate references for design data and documentation, and retrievability of the models, results, and documentation associated with entries in the library. Some highlights of the detailed procedure are discussed to provide background on its implementation and to indicate limitations of data extracted from VALID for use by the broader community. Specifically, external users of data generated within VALID must take responsibility for ensuring that the files are used within the QA framework of their organization and that use is appropriate. The future plans for the VALID library include expansion to include additional experiments from the IHECSBE, to include experiments from areas beyond criticality safety, such as reactor physics and shielding, and to include application models. In the future, external SCALE users may also obtain qualification under the VALID procedure and be involved in expanding the library. The VALID library provides a pathway for the criticality safety community to leverage modeling and analysis expertise at ORNL.

Marshall, William BJ J [ORNL; Rearden, Bradley T [ORNL

2013-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "input validation flaw" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Fabrication Flaw Density and Distribution In Repairs to Reactor Pressure Vessel and Piping Welds  

Science Conference Proceedings (OSTI)

The Pacific Northwest National Laboratory is developing a generalized fabrication flaw distribution for the population of nuclear reactor pressure vessels and for piping welds in U.S. operating reactors. The purpose of the generalized flaw distribution is to predict component-specific flaw densities. The estimates of fabrication flaws are intended for use in fracture mechanics structural integrity assessments. Structural integrity assessments, such as estimating the frequency of loss-of-coolant accidents, are performed by computer codes that require, as input, accurate estimates of flaw densities. Welds from four different reactor pressure vessels and a collection of archived pipes have been studied to develop empirical estimates of fabrication flaw densities. This report describes the fabrication flaw distribution and characterization in the repair weld metal of vessels and piping. This work indicates that large flaws occur in these repairs. These results show that repair flaws are complex in composition and sometimes include cracks on the ends of the repair cavities. Parametric analysis using an exponential fit is performed on the data. The relevance of construction records is established for describing fabrication processes and product forms. An analysis of these records shows there was a significant change in repair frequency over the years when these components were fabricated. A description of repair flaw morphology is provided with a discussion of fracture mechanics significance. Fabrication flaws in repairs are characterized using optimized-access, high-sensitivity nondestructive ultrasonic testing. Flaw characterizations are then validated by other nondestructive evaluation techniques and complemented by destructive testing.

GJ Schuster, FA Simonen, SR Doctor

2008-04-01T23:59:59.000Z

62

T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

HT4825 Apple Product Security CVE-2011-0228 IMPACT ASSESSMENT: Medium Discussion: A remote user in a privileged network position can exploit a certificate chain validation...

63

V-085: Cisco Unity Express Input Validation Hole Permits Cross-Site Request  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Cisco Unity Express Input Validation Hole Permits Cross-Site 5: Cisco Unity Express Input Validation Hole Permits Cross-Site Request Forgery Attacks V-085: Cisco Unity Express Input Validation Hole Permits Cross-Site Request Forgery Attacks February 6, 2013 - 1:06am Addthis PROBLEM: Cisco Unity Express Input Validation Hole Permits Cross-Site Request Forgery Attacks PLATFORM: Cisco Unity Express prior to 8.0 ABSTRACT: A vulnerability was reported in Cisco Unity Express. REFERENCE LINKS: Cisco Security Notice SecurityTracker Alert ID: 1028075 CVE-2013-1120 IMPACT ASSESSMENT: Medium DISCUSSION: Cisco Unity Express software prior to version 8.0 contains vulnerabilities that could allow an unauthenticated, remote attacker to conduct cross site request forgery attacks. The vulnerabilities are due to insufficient input validation. An attacker could exploit these vulnerabilities by

64

U-204: HP Network Node Manager i Input Validation Hole Permits Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

204: HP Network Node Manager i Input Validation Hole Permits 204: HP Network Node Manager i Input Validation Hole Permits Cross-Site Scripting Attacks U-204: HP Network Node Manager i Input Validation Hole Permits Cross-Site Scripting Attacks July 3, 2012 - 7:00am Addthis PROBLEM: HP Network Node Manager i Input Validation Hole Permits Cross-Site Scripting Attacks PLATFORM: Version(s): 8.x, 9.0x, 9.1x ABSTRACT: Potential security vulnerabilities have been identified with HP Network Node Manager I (NNMi) for HP-UX, Linux, Solaris, and Windows. The vulnerabilities could be remotely exploited resulting in cross site scripting (XSS). reference LINKS: The Vendor's Advisory SecurityTracker Alert ID: 1027215 CVE-2012-2018 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in HP Network Node Manager i. The software does not properly filter HTML code from user-supplied input before

65

U-204: HP Network Node Manager i Input Validation Hole Permits Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: HP Network Node Manager i Input Validation Hole Permits 4: HP Network Node Manager i Input Validation Hole Permits Cross-Site Scripting Attacks U-204: HP Network Node Manager i Input Validation Hole Permits Cross-Site Scripting Attacks July 3, 2012 - 7:00am Addthis PROBLEM: HP Network Node Manager i Input Validation Hole Permits Cross-Site Scripting Attacks PLATFORM: Version(s): 8.x, 9.0x, 9.1x ABSTRACT: Potential security vulnerabilities have been identified with HP Network Node Manager I (NNMi) for HP-UX, Linux, Solaris, and Windows. The vulnerabilities could be remotely exploited resulting in cross site scripting (XSS). reference LINKS: The Vendor's Advisory SecurityTracker Alert ID: 1027215 CVE-2012-2018 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in HP Network Node Manager i. The software does not properly filter HTML code from user-supplied input before

66

V-193: Barracuda SSL VPN Input Validation Hole Permits Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

93: Barracuda SSL VPN Input Validation Hole Permits Cross-Site 93: Barracuda SSL VPN Input Validation Hole Permits Cross-Site Scripting Attacks V-193: Barracuda SSL VPN Input Validation Hole Permits Cross-Site Scripting Attacks July 5, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Barracuda SSL VPN PLATFORM: Version(s) prior to 2.3.3.216 ABSTRACT: Several scripts do not properly filter HTML code from user-supplied input before displaying the input via several parameters REFERENCE LINKS: SecurityTracker Alert ID: 1028736 Barracuda SSL VPN Release Notes Zero Science Lab IMPACT ASSESSMENT: Medium DISCUSSION: The code will originate from the Barracuda SSL VPN interface and will run in the security context of that site. As a result, the code will be able to access the target user's cookies (including authentication cookies), if

67

T-722: IBM WebSphere Commerce Edition Input Validation Holes Permit  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: IBM WebSphere Commerce Edition Input Validation Holes Permit 2: IBM WebSphere Commerce Edition Input Validation Holes Permit Cross-Site Scripting Attacks T-722: IBM WebSphere Commerce Edition Input Validation Holes Permit Cross-Site Scripting Attacks September 21, 2011 - 8:15am Addthis PROBLEM: IBM WebSphere Commerce Edition Input Validation Holes Permit Cross-Site Scripting Attacks. PLATFORM: WebSphere Commerce Edition V7.0 ABSTRACT: A remote user can access the target user's cookies (including authentication cookies), if any, associated with the site running the IBM WebSphere software, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user. reference LINKS: IBM Recommended Fixes for WebSphere Commerce IBM Support SecurityTracker Alert ID: 1026074

68

T-590: HP Diagnostics Input Validation Hole Permits Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: HP Diagnostics Input Validation Hole Permits Cross-Site 0: HP Diagnostics Input Validation Hole Permits Cross-Site Scripting Attacks T-590: HP Diagnostics Input Validation Hole Permits Cross-Site Scripting Attacks March 29, 2011 - 3:05pm Addthis PROBLEM: HP Diagnostics Input Validation Hole Permits Cross-Site Scripting Attacks in ActiveSync Lets Remote Users Execute Arbitrary Code. PLATFORM: HP Diagnostics software: version(s) 7.5, 8.0 prior to 8.05.54.225 ABSTRACT: A potential security vulnerability has been identified in HP Diagnostics. The vulnerability could be exploited remotely resulting in cross site scripting (XSS). reference LINKS: HP Document ID: c02770512 SecurityTracker Alert ID: 1025255 CVE-2011-0892 Security Focus Document ID: c02770512 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in HP Diagnostics. A remote user can conduct

69

T-546: Microsoft MHTML Input Validation Hole May Permit Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Microsoft MHTML Input Validation Hole May Permit Cross-Site 6: Microsoft MHTML Input Validation Hole May Permit Cross-Site Scripting Attacks Arbitrary Code T-546: Microsoft MHTML Input Validation Hole May Permit Cross-Site Scripting Attacks Arbitrary Code January 31, 2011 - 7:00am Addthis PROBLEM: Microsoft MHTML Input Validation Hole May Permit Cross-Site Scripting Attacks Arbitrary Code. PLATFORM: Microsoft 2003 SP2, Vista SP2, 2008 SP2, XP SP3, 7; and prior service packs ABSTRACT: A vulnerability was reported in Microsoft MHTML. A remote user can conduct cross-site scripting attacks. reference LINKS: Microsoft Security Advisory 2501696 Microsoft Support Security Tracker Alert CVE-2011-0096 IMPACT ASSESSMENT: Medium Discussion: The vulnerability exists due to the way MHTML interprets MIME-formatted requests for content blocks within a document. It is possible for this

70

T-590: HP Diagnostics Input Validation Hole Permits Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: HP Diagnostics Input Validation Hole Permits Cross-Site 0: HP Diagnostics Input Validation Hole Permits Cross-Site Scripting Attacks T-590: HP Diagnostics Input Validation Hole Permits Cross-Site Scripting Attacks March 29, 2011 - 3:05pm Addthis PROBLEM: HP Diagnostics Input Validation Hole Permits Cross-Site Scripting Attacks in ActiveSync Lets Remote Users Execute Arbitrary Code. PLATFORM: HP Diagnostics software: version(s) 7.5, 8.0 prior to 8.05.54.225 ABSTRACT: A potential security vulnerability has been identified in HP Diagnostics. The vulnerability could be exploited remotely resulting in cross site scripting (XSS). reference LINKS: HP Document ID: c02770512 SecurityTracker Alert ID: 1025255 CVE-2011-0892 Security Focus Document ID: c02770512 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in HP Diagnostics. A remote user can conduct

71

T-546: Microsoft MHTML Input Validation Hole May Permit Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Microsoft MHTML Input Validation Hole May Permit Cross-Site 6: Microsoft MHTML Input Validation Hole May Permit Cross-Site Scripting Attacks Arbitrary Code T-546: Microsoft MHTML Input Validation Hole May Permit Cross-Site Scripting Attacks Arbitrary Code January 31, 2011 - 7:00am Addthis PROBLEM: Microsoft MHTML Input Validation Hole May Permit Cross-Site Scripting Attacks Arbitrary Code. PLATFORM: Microsoft 2003 SP2, Vista SP2, 2008 SP2, XP SP3, 7; and prior service packs ABSTRACT: A vulnerability was reported in Microsoft MHTML. A remote user can conduct cross-site scripting attacks. reference LINKS: Microsoft Security Advisory 2501696 Microsoft Support Security Tracker Alert CVE-2011-0096 IMPACT ASSESSMENT: Medium Discussion: The vulnerability exists due to the way MHTML interprets MIME-formatted requests for content blocks within a document. It is possible for this

72

U-021: Cisco Unified Communications Manager Directory Traversal Flaw Lets  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Cisco Unified Communications Manager Directory Traversal 1: Cisco Unified Communications Manager Directory Traversal Flaw Lets Remote Users Obtain Files U-021: Cisco Unified Communications Manager Directory Traversal Flaw Lets Remote Users Obtain Files October 27, 2011 - 7:45am Addthis PROBLEM: Cisco Unified Communications Manager Directory Traversal Flaw Lets Remote Users Obtain Files. PLATFORM: Cisco Unified Communications Manager 6.x, 7.x and 8.x ABSTRACT: A vulnerability was reported in Cisco Unified Communications Manager. reference LINKS: Cisco Advisory ID: cisco-sa-20111026-cucm Cisco Security Advisories and Response SecurityTracker Alert ID: 1026243 CVE-2011-3315 IMPACT ASSESSMENT: Medium Discussion: A remote user can view files on the target system. The software does not properly validate user-supplied input. A remote user can supply a specially

73

Flaw detection and evaluation  

DOE Patents (OSTI)

The invention provides a method of and apparatus for optically inspecting nuclear fuel pellets for surface flaws. The inspection system includes a prism and lens arrangement for scanning the surface of each pellet as the same is rotated. The resulting scan produces data indicative of the extent and shape of each flaw which is employed to generate a flaw quality index for each detected flaw. The flaw quality indexes from all flaws are summed and compared with an acceptable surface quality index. The result of the comparison is utilized to control the acceptance or rejection of the pellet.

Wilks, Robert S. (Plum, PA); Sturges, Jr., Robert H. (Plum, PA)

1983-01-01T23:59:59.000Z

74

Steam Generator Management Program: Flaw Handbook Calculator  

Science Conference Proceedings (OSTI)

The EPRI Steam Generator Management Program: Steam Generator Degradation Specific Flaw Handbook v1.0 defines burst pressure equations for steam generator tubes with various degradation morphologies, and the EPRI Steam Generator Management Program: Steam Generator Integrity Assessment Guidelines (1019038) describes a probabilistic evaluation process which can be used to account for key input parameter uncertainties. The Flaw Handbook Calculator software is an automated Microsoft Excelspreadsheet which cal...

2010-04-20T23:59:59.000Z

75

U-254: Webmin Flaws Let Remote Authenticated Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

54: Webmin Flaws Let Remote Authenticated Users Execute 54: Webmin Flaws Let Remote Authenticated Users Execute Arbitrary Code and View Arbitrary Files U-254: Webmin Flaws Let Remote Authenticated Users Execute Arbitrary Code and View Arbitrary Files September 10, 2012 - 6:00am Addthis PROBLEM: Webmin Multiple Input Validation Vulnerabilities PLATFORM: The vulnerabilities are reported in version 1.580. Other versions may also be affected. ABSTRACT: An authenticated attacker may be able to execute arbitrary commands. reference LINKS: Webmin Security Alerts Bugtraq ID: 55446 Secunia Advisory SA50512 SecurityTracker Alert ID: 1027507 US CERT Vulnerability Note VU#788478 CVE-2012-2981 CVE-2012-2982 CVE-2012-2983 IMPACT ASSESSMENT: Medium Discussion: Multiple vulnerabilities have been reported in Webmin, which can be exploited by malicious users to compromise a vulnerable system and by

76

Flaw Detection and Evaluation  

Science Conference Proceedings (OSTI)

Table 2   Planar flaw classification and NDE detection methods...Lack of bonding Forging or rolling lap Casting cold shut Heat treatment cracks Grinding cracks Plating cracks Fatigue cracks Stress-corrosion cracks Welding cracks Lack of fusion Incomplete penetration Brazing debond NDE detection methods Visual Replication microscopy Magnetic particle Magnetic...

77

Application of the Neo-Deterministic Seismic Microzonation Procedure in Bulgaria and Validation of the Seismic Input Against Eurocode 8  

SciTech Connect

The earthquake record and the Code for design and construction in seismic regions in Bulgaria have shown that the territory of the Republic of Bulgaria is exposed to a high seismic risk due to local shallow and regional strong intermediate-depth seismic sources. The available strong motion database is quite limited, and therefore not representative at all of the real hazard. The application of the neo-deterministic seismic hazard assessment procedure for two main Bulgarian cities has been capable to supply a significant database of synthetic strong motions for the target sites, applicable for earthquake engineering purposes. The main advantage of the applied deterministic procedure is the possibility to take simultaneously and correctly into consideration the contribution to the earthquake ground motion at the target sites of the seismic source and of the seismic wave propagation in the crossed media. We discuss in this study the result of some recent applications of the neo-deterministic seismic microzonation procedure to the cities of Sofia and Russe. The validation of the theoretically modeled seismic input against Eurocode 8 and the few available records at these sites is discussed.

Ivanka, Paskaleva [CLSMEE--BAS, 3 Acad G. Bonchev str, 1113 Sofia (Bulgaria); Mihaela, Kouteva [CLSMEE-BAS, 3 Acad G. Bonchev str, 1113 Sofia (Bulgaria); ESP-SAND, ICTP, Trieste (Italy); Franco, Vaccari [DST-University of Trieste, Via E. Weiss 4, 34127 Trieste (Italy); Panza, Giuliano F. [DST-University of Trieste, Via E. Weiss 4, 34127 Trieste (Italy); ESP-SAND, ICTP, Trieste (Italy)

2008-07-08T23:59:59.000Z

78

NIST Engineers Discover Fundamental Flaw in Transistor ...  

Science Conference Proceedings (OSTI)

NIST Engineers Discover Fundamental Flaw in Transistor Noise Theory. For Immediate Release: May 20, 2009. ...

2012-11-02T23:59:59.000Z

79

Pre-SW - Steam Generator Management Program: Flaw Handbook Calculator for Excel 2010, Version 2.0  

Science Conference Proceedings (OSTI)

The EPRI Steam Generator Management Program: Steam Generator Degradation Specific Flaw Handbook (1019037) defines burst pressure equations for steam generator tubes with various degradation morphologies, and the EPRI Steam Generator Management Program: Steam Generator Integrity Assessment Guidelines (1019038) describes a probabilistic evaluation process which can be used to account for key input parameter uncertainties. The Flaw Handbook Calculator software is an automated ...

2013-11-20T23:59:59.000Z

80

U-212: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: RSA Authentication Manager Flaws Permit Cross-Site and 2: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks U-212: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks July 13, 2012 - 7:00am Addthis PROBLEM: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks PLATFORM: RSA Authentication Manager 7.1 is vulnerable; other versions may also be affected. ABSTRACT: RSA Authentication Manager is prone to multiple security vulnerabilities because it fails to properly sanitize user-supplied input. Attackers can exploit these issues to execute arbitrary script or HTML code, steal cookie-based authentication credentials, and conduct phishing attacks. Other attacks may also be possible.

Note: This page contains sample records for the topic "input validation flaw" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

U-263: Trend Micro InterScan Messaging Security Flaws Permit Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Trend Micro InterScan Messaging Security Flaws Permit 3: Trend Micro InterScan Messaging Security Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks U-263: Trend Micro InterScan Messaging Security Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks September 19, 2012 - 6:00am Addthis PROBLEM: Trend Micro InterScan Messaging Security Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks PLATFORM: 7.1-Build_Win32_1394; possibly other versions ABSTRACT: A vulnerability was reported in Trend Micro InterScan Messaging Security. reference LINKS: US CERT Vulnerability Note VU#471364 SecurityTracker Alert ID: 1027544 CVE-2012-2995 CVE-2012-2996 Micro Trend IMPACT ASSESSMENT: Medium Discussion: Several scripts do not properly filter HTML code from user-supplied input

82

T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Apple Safari Multiple Flaws Let Remote Users Execute 3: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks July 21, 2011 - 1:27am Addthis PROBLEM: Multiple vulnerabilities were reported in Apple Safari. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can conduct cross-site scripting attacks. A remote user can obtain potentially sensitive information. A remote user can bypass a certificate validation control. PLATFORM: Safari 5.1 and Safari 5.0.6 Products Affected: Safari 5 (Mac OS X 10.6), Safari 5 (Mac OS X 10.5), Product Security, Safari 5.1 (OS X Lion) ABSTRACT: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code,

83

U-160: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

60: Google Chrome Multiple Flaws Let Remote Users Execute 60: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-160: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code May 2, 2012 - 7:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Prior to 18.0.1025.168 ABSTRACT: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system reference LINKS: SecurityTracker Alert ID: 1027001 CVE-2011-3078 CVE-2011-3079 CVE-2011-3080 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will trigger a use-after-free, validation error, or race condition and execute arbitrary code on the target system. The code will

84

U-160: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Google Chrome Multiple Flaws Let Remote Users Execute 0: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-160: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code May 2, 2012 - 7:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Prior to 18.0.1025.168 ABSTRACT: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system reference LINKS: SecurityTracker Alert ID: 1027001 CVE-2011-3078 CVE-2011-3079 CVE-2011-3080 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will trigger a use-after-free, validation error, or race condition and execute arbitrary code on the target system. The code will

85

The HMDS Coating Flaw Removal Tool  

Science Conference Proceedings (OSTI)

In many high energy laser systems, optics with HMDS sol gel antireflective coatings are placed in close proximity to each other making them particularly susceptible to certain types of strong optical interactions. During the coating process, halo shaped coating flaws develop around surface digs and particles. Depending on the shape and size of the flaw, the extent of laser light intensity modulation and consequent probability of damaging downstream optics may increase significantly. To prevent these defects from causing damage, a coating flaw removal tool was developed that deploys a spot of decane with a syringe and dissolves away the coating flaw. The residual liquid is evacuated leaving an uncoated circular spot approximately 1mm in diameter. The resulting uncoated region causes little light intensity modulation and thus has a low probability of causing damage in optics downstream from the mitigated flaw site.

Monticelli, M V; Nostrand, M C; Mehta, N; Kegelmeyer, L; Johnson, M A; Fair, J; Widmayer, C

2008-10-24T23:59:59.000Z

86

U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote Users Execute Arbitrary Code and Deny Service U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let...

87

U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code September 18, 2012 -...

88

U-010:HP Onboard Administrator Unspecified Flaw Lets Remote Users...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Manager Unspecified Flaw Lets Remote Users Gain Unauthorized Access V-120: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control...

89

NON-DESTRUCTIVE FLAW DETECTION APPARATUS  

DOE Patents (OSTI)

An apparatus is described for the non-destructive detection of flaws in electrical conducting articles. The particular feature of the detection apparatus is that a flaw in the front or back of the test article will not be masked by signals caused by the passage of the end and front of the article through the detection apparatus. The present invention alleviates the above problem by mounting detection coils on directly opposite sides of the test passageway so that the axes of the pickup coils are perpendicular to the axis of an energizing coil through which the article is passed. A flaw in the article will cause a change in the voltage induced in one pickup coil, but passage of the end or front of the article will not produce unequal signals. The signals are compared in appropriate electrical circuitry to actuate a recorder only when unequal signals are present, indicating the presence of a flaw.

Stateman, M.J.; Holloway, H.R.

1957-12-17T23:59:59.000Z

90

T-574: Google Chrome Multiple Flaws Let Remote Users Execute...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code T-574: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code March 10, 2011 - 3:05pm Addthis...

91

Apparatus and method for detecting flaws in conductive material  

Science Conference Proceedings (OSTI)

The present invention is an improved sensing unit for detecting flaws in conductive material wherein the sensing coil is positioned away from a datum of either the datum point, the datum orientation, or a combination thereof. Position of the sensing coil away from a datum increases sensitivity for detecting flaws having a characteristic volume less than about 1 mm{sup 3}, and further permits detection of subsurface flaws. Use of multiple sensing coils permits quantification of flaw area or volume.

Hockey, R.L.; Riechers, D.M.

1999-11-16T23:59:59.000Z

92

Apparatus and method for detecting flaws in conductive material  

DOE Patents (OSTI)

The present invention is an improved sensing unit for detecting flaws in conductive material wherein the sensing coil is positioned away from a datum of either the datum point, the datum orientation, or a combination thereof. Position of the sensing coil away from a datum increases sensitivity for detecting flaws having a characteristic volume less than about 1 mm.sup.3, and further permits detection of subsurface flaws. Use of multiple sensing coils permits quantification of flaw area or volume.

Hockey, Ronald L. (Richland, WA); Riechers, Douglas M. (Richland, WA)

1999-01-01T23:59:59.000Z

93

T-649: Red Hat Network Satellite Server Request Validation Flaw...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

of Red Hat Network Satellite 5.4.1 are advised to upgrade to these updated spacewalk-java packages, which resolve this issue. For this update to take effect, Red Hat Network...

94

Procedure for flaw detection in cast stainless steel  

DOE Patents (OSTI)

This paper describes a method of ultrasonic flaw detection in cast stainless steel components incorporating the steps of determining the nature of the microstructure of the cast stainless steel at the site of the flaw detection measurements by ultrasonic means independent of the component thickness at the site. Then, choosing from a plurality of flaw detection techniques, one such technique appropriate to the nature of the microstructure as determined is discussed. The detection of flaws by means of the chosen technique is then detailed.

Kupperman, D.S.

1986-08-29T23:59:59.000Z

95

Detection of Subsurface Flaws in Metals with GMR Sensors  

Science Conference Proceedings (OSTI)

Cracks and flaws in multilayered nonferrous metal structure may be quantified by using Giant Magnetoresistive (GMR) sensor based eddy current technique. This noncontact method includes a lift-off distance as great as 3 mm. Aluminum and titanium alloy plates greater than 3 mm thick are successfully inspected. Hidden flaws in second plate down are clearly detected.

Na, J.K.; Franklin, M.A. [Advanced Nondestructive Inspection, General Dynamics, 2700 Indian Ripple Road, Dayton, Ohio 45440 (United States)

2005-04-09T23:59:59.000Z

96

U-161: Citrix Provisioning Services Unspecified Flaw Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Citrix Provisioning Services Unspecified Flaw Lets Remote 1: Citrix Provisioning Services Unspecified Flaw Lets Remote Users Execute Arbitrary Code U-161: Citrix Provisioning Services Unspecified Flaw Lets Remote Users Execute Arbitrary Code May 3, 2012 - 7:00am Addthis PROBLEM: Citrix Provisioning Services Unspecified Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: 6.1 and prior ABSTRACT: A vulnerability was reported in Citrix Provisioning Services. A remote user can execute arbitrary code on the target system. reference LINKS: SecurityTracker Alert ID: 1027004 Secunia Advisory SA48971 Citrix advisory IMPACT ASSESSMENT: Medium Discussion: A remote user can send a specially crafted packet to trigger an unspecified flaw and execute arbitrary code on the target system. The code will run with the privileges of the target service.

97

T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7:Microsoft Windows SSLTLS Protocol Flaw Lets Remote Users Decryption Sessions T-727:Microsoft Windows SSLTLS Protocol Flaw Lets Remote Users Decryption Sessions September 27,...

98

T-541: Citrix Provisioning Services Unspecified Flaw Let's Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

41: Citrix Provisioning Services Unspecified Flaw Let's Remote 41: Citrix Provisioning Services Unspecified Flaw Let's Remote Users Execute Arbitrary Code T-541: Citrix Provisioning Services Unspecified Flaw Let's Remote Users Execute Arbitrary Code January 24, 2011 - 5:34pm Addthis PROBLEM: Citrix Provisioning Services Unspecified Flaw Let's Remote Users Execute Arbitrary Code PLATFORM: * Provisioning Services 5.1 * Provisioning Services 5.6 ABSTRACT: A vulnerability has been identified in Citrix Provisioning Services that could result in arbitrary code execution. This vulnerability can be triggered by an attacker sending a specially crafted packet to the Provisioning Services server. This vulnerability is present in all supported versions of Citrix Provisioning Services up to and including version 5.6. reference LINKS:

99

U-093: Mozilla Firefox Multiple Flaws Permit Remote Code Execution,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, 3: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting Attacks U-093: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting Attacks February 1, 2012 - 5:51am Addthis PROBLEM: Multiple vulnerabilities were reported in Mozilla Firefox. PLATFORM: Linux (Any), UNIX (Any), Windows (Any) Version(s): prior to 3.2.26; prior to 10.0 ABSTRACT: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting. reference LINKS: SecurityTracker Alert ID: 1026605 CVE-2011-3659, CVE-2012-0442 CVE-2012-0443, CVE-2012-0444 CVE-2012-0445, CVE-2012-0446 CVE-2012-0447, CVE-2012-0449 CVE-2012-0450 Vendor Site IMPACT ASSESSMENT:

100

U-220: Google Android DNS Resolver Randomization Flaw Lets Remote...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Off-by-one Bug Lets Remote Users Deny Service U-271: Google Android Dialer TEL URL Handling Flaw Lets Remote Users Deny Service V-065: Adobe Flash Player Buffer Overflow...

Note: This page contains sample records for the topic "input validation flaw" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

V-073: IBM Tivoli Federated Identity Manager Signature Verification Flaw  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: IBM Tivoli Federated Identity Manager Signature Verification 3: IBM Tivoli Federated Identity Manager Signature Verification Flaw Lets Remote Users Modify Attributes V-073: IBM Tivoli Federated Identity Manager Signature Verification Flaw Lets Remote Users Modify Attributes January 21, 2013 - 12:15am Addthis PROBLEM: IBM Tivoli Federated Identity Manager Signature Verification Flaw Lets Remote Users Modify Attributes PLATFORM: Tivoli Federated Identity Manager versions 6.2.0, 6.2.1, 6.2.2 ABSTRACT: A vulnerability was reported in IBM Tivoli Federated Identity Manager. REFERENCE LINKS: IBM Security Bulletin: 1615744 SecurityTracker Alert ID: 1028011 CVE-2012-6359 IMPACT ASSESSMENT: Medium DISCUSSION: The system does not check that all attributes have been signed. A remote user with the ability to conduct a man-in-the-middle attack can modify

102

TART input manual  

Science Conference Proceedings (OSTI)

The TART code is a Monte Carlo neutron/photon transport code that is only on the CRAY computer. All the input cards for the TART code are listed, and definitions for all input parameters are given. The execution and limitations of the code are described, and input for two sample problems are given. (WHK)

Kimlinger, J.R.; Plechaty, E.F.

1982-04-01T23:59:59.000Z

103

V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code April 25, 2013 - 12:14am...

104

U-106: Citrix XenServer Multiple Flaws in Web Self Service Have...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Citrix XenServer Multiple Flaws in Web Self Service Have Unspecified Impact U-106: Citrix XenServer Multiple Flaws in Web Self Service Have Unspecified Impact February 17, 2012...

105

U-271: Google Android Dialer TEL URL Handling Flaw Lets Remote...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Google Android Dialer TEL URL Handling Flaw Lets Remote Users Deny Service U-271: Google Android Dialer TEL URL Handling Flaw Lets Remote Users Deny Service October 1, 2012 -...

106

V-075: EMC AlphaStor Command Injection and Format String Flaws...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: EMC AlphaStor Command Injection and Format String Flaws Let Remote Users Execute Arbitrary Code V-075: EMC AlphaStor Command Injection and Format String Flaws Let Remote Users...

107

V-104: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code V-104: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code March 5, 2013 - 12:53am Addthis PROBLEM: Oracle Java...

108

U-239: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source Addresses U-239: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source Addresses August 20,...

109

V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

20: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code November 9, 2012 - 6:00am...

110

V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code May 27, 2013 - 12:23am...

111

NON-DESTRUCTIVE METHOD AND MEANS FOR FLAW DETECTION  

DOE Patents (OSTI)

BS>An improved method is presented for the nondestructive detection of flaws in olectrictilly conductivc articles using magnetic field. According to thc method a homogoneous mignetic field is established in the test article;it right angle" to the artyicle. A probe is aligned with its axis transverse to the translates so hat th4 probe scans the surface of the test article while the axis of the robe is transverse to the direction of translation of the article. In this manner any output current obtained in thc probe is an indication of the size and location of a flaw in the article under test, with a miiiimum of signal pick- up in the probe from the established magnetic field.

Hochschild, R.

1959-03-10T23:59:59.000Z

112

Efficient concurrency-bug detection across inputs  

Science Conference Proceedings (OSTI)

In the multi-core era, it is critical to efficiently test multi-threaded software and expose concurrency bugs before software release. Previous work has made significant progress in detecting and validating concurrency bugs under a given input. Unfortunately, ... Keywords: bug detection, concurrency bugs, multi-threaded software, software testing

Dongdong Deng, Wei Zhang, Shan Lu

2013-10-01T23:59:59.000Z

113

Acoustic emission: flaw relationship for inservice monitoring of nuclear reactor pressure boundaries. [PWR; BWR  

Science Conference Proceedings (OSTI)

The objective of the acoustic emission (AE)/flaw characterization program is to provide an experimental feasibility evaluation of using the AE method on a continuous basis (during operation and during hydrotest) to detect and analyze flaw growth in reactor pressure vessels and primary piping. This effort is based on the philosophy that AE shows demonstrated capability for being a valuable addition to current nondestructive inspection (NDI) methods with unique capability for continuous monitoring, high sensitivity and remote flaw location.

Not Available

1981-10-01T23:59:59.000Z

114

U-247: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Configuration Manager Database Authentication Bypass Vulnerability V-120: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control...

115

Alpha-helical Protein Networks Are Self-protective and Flaw-tolerant  

Science Conference Proceedings (OSTI)

Presentation Title, Alpha-helical Protein Networks Are Self-protective and Flaw- ... Bulk Metallic Glass Composites: A New High-Performance Structural Material.

116

Method for fabricating prescribed flaws in the interior of metals  

SciTech Connect

The method for fabricating a metal body having a flaw of predetermined size and shape located therein comprises placing half of the metal powder required to make the metal body in the die of a press and pressing it to create a flat upper surface thereon. A piece of copper foil is cut to the size and shape of the desired interior crack and placed on the upper surface of the powder and centered in position. The remaining powder is then placed in the die to cover the copper foil. The powder is first cold pressed and removed from the press. The powder metal piece is then sintered in a furnace at a temperature above the melting point of the copper and below the melting point of the metal. It is then removed from the furnace, cooled to room temperature, and placed back in the die and pressed further. This procedure results in an interior flaw or crack. Modified forms of the method involve using a press-sinter-press-sinter cycle with the first sinter being below the melting point of the copper and the second sinter being above the melting point of the copper and below the melting point of the metal.

Hsu, David K. (Ames, IA); Thompson, Donald O. (Ames, IA)

1989-03-07T23:59:59.000Z

117

HYDROGEN EFFECTS ON THE BURST PROPERTIES OF TYPE 304L STAINLESS STEEL FLAWED VESSELS  

DOE Green Energy (OSTI)

The effect of hydrogen on the burst properties Type 304L stainless steel vessels was investigated. The purpose of the study was to compare the burst properties of hydrogen-exposed stainless steel vessels burst with different media: water, helium gas, or deuterium gas. A second purpose of the tests was to provide data for the development of a predictive finite-element model. The burst tests were conducted on hydrogen-exposed and unexposed axially-flawed cylindrical vessels. The results indicate that samples burst pneumatically had lower volume ductility than those tested hydraulically. Deuterium gas tests had slightly lower ductility than helium gas tests. Burst pressures were not affected by burst media. Hydrogen-charged samples had lower volume ductility and slightly higher burst pressures than uncharged samples. Samples burst with deuterium gas fractured by quasi-cleavage near the inside wall. The results of the tests were used to improve a previously developed predictive finite-element model. The results show that predicting burst behavior requires as a material input the effect of hydrogen on the plastic strain to fracture from tensile tests. The burst test model shows that a reduction in the plastic strain to fracture of the material will result in lower volume ductility without a reduction in burst pressure which is in agreement with the burst results.

Morgan, M; Monica Hall, M; Ps Lam, P; Dean Thompson, D

2008-03-27T23:59:59.000Z

118

Steam Generator Management Program: Production of Steam Generator Tubing Flaws by Laboratory Autoclave Exposures  

Science Conference Proceedings (OSTI)

Qualification of a technique for the examination of steam generator tubing requires realistic flaws that are either pulled from service or produced in the laboratory. Due to the scarcity of pulled tube specimens, an effort was undertaken to produce realistic flaws in a laboratory environment. The ability to produce cracks in the laboratory was explored in doped steam, acidic, and caustic environments. These ...

2013-09-24T23:59:59.000Z

119

U-230: Sudo on Red Hat Enterprise Linux %postun Symlink Flaw Lets Local  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Sudo on Red Hat Enterprise Linux %postun Symlink Flaw Lets 0: Sudo on Red Hat Enterprise Linux %postun Symlink Flaw Lets Local Users Gain Elevated Privileges U-230: Sudo on Red Hat Enterprise Linux %postun Symlink Flaw Lets Local Users Gain Elevated Privileges August 8, 2012 - 7:00am Addthis PROBLEM: Sudo on Red Hat Enterprise Linux %postun Symlink Flaw Lets Local Users Gain Elevated Privileges PLATFORM: Red Hat Enterprise Linux (v. 5 server) Red Hat Enterprise Linux Desktop (v. 5 client) ABSTRACT: An updated sudo package that fixes one security issue and several bugs is now available for Red Hat Enterprise Linux 5. reference LINKS: Advisory: RHSA-2012:1149-1 SecurityTracker Alert ID: 1027356 Sudo Main Page Bugzilla 844442 CVE-2012-3440 IMPACT ASSESSMENT: Medium Discussion: A local user can exploit a temporary file symbolic link flaw in the %postun

120

V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Oracle Java Reflection API Flaw Lets Remote Users Execute 2: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code April 25, 2013 - 12:14am Addthis PROBLEM: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Version(s): 7 Update 21; possibly other versions (1.7.0_21-b11) Java Server JRE is also affected. ABSTRACT: A vulnerability was reported in Oracle Java. REFERENCE LINKS: SecurityTracker Alert ID: 1028466 Oracle IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create a specially crafted Java application that, when loaded and approved by the target user, will trigger a flaw in the Reflection API to bypass the security sandbox. IMPACT: A remote user can create a Java file that, when loaded by the target user,

Note: This page contains sample records for the topic "input validation flaw" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

V-035: Google Chrome Multiple Flaws Let Remote Users Execute...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

may occur when printing CVE-2012-5135. A bad cast may occur in input element handling CVE-2012-5136. Impact: A remote user can create content that, when loaded by...

122

U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Microsoft Internet Explorer Flaw Lets Remote Users Execute 2: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code September 18, 2012 - 6:00am Addthis PROBLEM: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Internet Explorer 6, 7, 8, 9 ABSTRACT: A vulnerability was reported in Microsoft Internet Explorer. reference LINKS: Bugtraq ID: 55562 Security Database KB2757760 Microsoft Security Advisory (2757760) SecurityTracker Alert ID: 1027538 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system. The code will run with the privileges of the

123

T-715: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

15: Microsoft SharePoint Multiple Flaws Permit Cross-Site 15: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting Attacks T-715: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting Attacks September 13, 2011 - 12:35pm Addthis PROBLEM: Multiple vulnerabilities were reported in Microsoft SharePoint. A remote user can conduct cross-site scripting attacks. PLATFORM: Version(s): SharePoint software ABSTRACT: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting Attacks. reference LINKS: MS11-074: Article ID: 2552998 SecurityTracker Alert ID: 1026040 CVE-2011-1893 CVE-2011-1892 CVE-2011-1891 CVE-2011-1890 CVE-2011-0653 IMPACT ASSESSMENT: High Discussion: A remote user can create a specially crafted URL or web site that, when loaded by a target user, will cause arbitrary scripting code to be executed

124

V-067: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code 7: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code V-067: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code January 11, 2013 - 12:01am Addthis PROBLEM: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Oracle Java Runtime Environment (JRE) 1.7 in Java 7 Update 10 and earlier ABSTRACT: A vulnerability was reported in Oracle Java. REFERENCE LINKS: Seclist.org Vulnerability Note VU#625617 SecurityTracker Alert ID: 1027972 Malware.dontneedcoffee.com CVE-2013-0422 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted Java content that, when loaded by the target user, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user. This vulnerability is being actively exploited.

125

V-156: Linux Kernel Array Bounds Checking Flaw Lets Local Users Gain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Linux Kernel Array Bounds Checking Flaw Lets Local Users 6: Linux Kernel Array Bounds Checking Flaw Lets Local Users Gain Elevated Privileges V-156: Linux Kernel Array Bounds Checking Flaw Lets Local Users Gain Elevated Privileges May 15, 2013 - 12:19am Addthis PROBLEM: Linux Kernel Array Bounds Checking Flaw Lets Local Users Gain Elevated Privileges PLATFORM: Version(s): 2.6.37 to 3.8.9 ABSTRACT: A vulnerability was reported in the Linux Kernel. REFERENCE LINKS: Linux Kernel SecurityTracker Alert ID: 1028565 CVE-2013-2094 IMPACT ASSESSMENT: Medium DISCUSSION: On systems compiled with PERF_EVENTS support, a local user can supply a specially crafted perf_event_open() call to execute arbitrary code on the target system with root privileges. The vulnerability resides in the perf_swevent_init() function in 'kernel/events/core.c'.

126

U-213: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Google Chrome Multiple Flaws Let Remote Users Execute 3: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-213: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code July 16, 2012 - 7:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 20.0.1132.57 ABSTRACT: Several vulnerabilities were reported in Google Chrome. reference LINKS: Stable Channel Update SecurityTracker Alert ID: 1027249 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user.

127

V-006: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary 6: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service V-006: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service October 19, 2012 - 6:00am Addthis PROBLEM: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service PLATFORM: CA ARCserve Backup for Windows r12.5, r15, r16 ABSTRACT: Two vulnerabilities were reported in CA ARCserve Backup. A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions. REFERENCE LINKS: SecurityTracker Alert ID: 1027683 CA Technologies Support CVE-2012-2971 CVE-2012-2972 IMPACT ASSESSMENT: High DISCUSSION: A remote user can send specially crafted RPC requests to execute arbitrary code on the target system [CVE-2012-2971]. The code will run with the

128

T-691: Adobe Flash Player Multiple Flaws Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Adobe Flash Player Multiple Flaws Let Remote Users Execute 1: Adobe Flash Player Multiple Flaws Let Remote Users Execute Arbitrary Code T-691: Adobe Flash Player Multiple Flaws Let Remote Users Execute Arbitrary Code August 11, 2011 - 3:00pm Addthis PROBLEM: Multiple vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Version(s): 10.3.181.36 and prior; 10.3.185.25 and prior for Android. ABSTRACT: Adobe Flash Player Multiple Flaws Let Remote Users Execute Arbitrary Code. reference LINKS: Security Bulletin: APSB11-21 SecurityTracker Alert ID: 1025907 CVE-2011-2425 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted Flash content that, when loaded by the target user, will execute arbitrary code on the target system. The

129

V-095: Oracle Java Flaws Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Oracle Java Flaws Let Remote Users Execute Arbitrary Code 5: Oracle Java Flaws Let Remote Users Execute Arbitrary Code V-095: Oracle Java Flaws Let Remote Users Execute Arbitrary Code February 20, 2013 - 12:38am Addthis PROBLEM: Oracle Java Flaws Let Remote Users Execute Arbitrary Code PLATFORM: JDK and JRE 7 Update 13 and earlier JDK and JRE 6 Update 39 and earlier JDK and JRE 5.0 Update 39 and earlier SDK and JRE 1.4.2_41 and earlier ABSTRACT: Several vulnerabilities were reported in Oracle Java. REFERENCE LINKS: Updated Release of the February 2013 Oracle Java SE Critical Patch Update SecurityTracker Alert ID: 1028155 CVE-2013-1484 CVE-2013-1485 CVE-2013-1486 CVE-2013-1487 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create a specially crafted Java Web Start application or Java applet that, when loaded by the target user, will execute arbitrary

130

V-075: EMC AlphaStor Command Injection and Format String Flaws Let Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: EMC AlphaStor Command Injection and Format String Flaws Let 5: EMC AlphaStor Command Injection and Format String Flaws Let Remote Users Execute Arbitrary Code V-075: EMC AlphaStor Command Injection and Format String Flaws Let Remote Users Execute Arbitrary Code January 23, 2013 - 12:26am Addthis PROBLEM: EMC AlphaStor Command Injection and Format String Flaws Let Remote Users Execute Arbitrary Code PLATFORM: EMC AlphaStor 4.0 prior to build 800 (All platforms) ABSTRACT: Two vulnerabilities were reported in EMC AlphaStor. REFERENCE LINKS: ESA-2013-008: SecurityTracker Alert ID: 1028020 Secunia Advisory SA51930 CVE-2013-0928 CVE-2013-0929 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can send a specially crafted DCP run command to inject commands and cause the Device Manager (rrobotd.exe) to execute arbitrary code on the target system [CVE-2013-0928].

131

U-277: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Google Chrome Multiple Flaws Let Remote Users Execute 7: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-277: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code October 9, 2012 - 6:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 22.0.1229.92 ABSTRACT: Several vulnerabilities were reported in Google Chrome. reference LINKS: SecurityTracker Alert ID: 1027617 Stable Channel Update CVE-2012-2900 CVE-2012-5108 CVE-2012-5109 CVE-2012-5110 CVE-2012-5111 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. A crash may occur in Skia text rendering [CVE-2012-2900].

132

U-089:Apache Struts ParameterInterceptor() Flaw Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9:Apache Struts ParameterInterceptor() Flaw Lets Remote Users 9:Apache Struts ParameterInterceptor() Flaw Lets Remote Users Execute Arbitrary Commands U-089:Apache Struts ParameterInterceptor() Flaw Lets Remote Users Execute Arbitrary Commands January 26, 2012 - 6:45am Addthis PROBLEM: Apache Struts ParameterInterceptor() Flaw Lets Remote Users Execute Arbitrary Commands PLATFORM: Struts 2.0.0 - Struts 2.3.1.1 ABSTRACT: A remote user can execute arbitrary code on the target system. reference LINKS: CVE-2011-3923 SecurityTracker Alert ID: 1026575 Apache Struts 2 Documentation S2-009 blog.o0o.nu IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Apache Struts. The vulnerability allows a malicious user to bypass all the protections (regex pattern, deny method invocation) built into the ParametersInterceptor, thus being able to inject

133

U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

70: Apple QuickTime Multiple Flaws Let Remote Users Execute 70: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code May 16, 2012 - 7:00am Addthis PROBLEM: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: prior to 7.7.2 ABSTRACT: Multiple vulnerabilities were reported in Apple QuickTime. A remote user can cause arbitrary code to be executed on the target user's system. Reference LINKS: SecurityTracker Alert ID: 1027065 CVE-2012-0265 CVE-2012-0663 CVE-2012-0664 CVE-2012-0665 CVE-2012-0666 IMPACT ASSESSMENT: High Discussion: A remote user can create a specially crafted file that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. Only Windows-based systems

134

V-179: Blackberry Z10 Flaw Lets Physically Local Users Access the Device |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Blackberry Z10 Flaw Lets Physically Local Users Access the 9: Blackberry Z10 Flaw Lets Physically Local Users Access the Device V-179: Blackberry Z10 Flaw Lets Physically Local Users Access the Device June 17, 2013 - 1:09am Addthis PROBLEM: Blackberry Z10 Flaw Lets Physically Local Users Access the Device PLATFORM: BlackBerry 10 OS version 10.0.10.261 and earlier, except version 10.0.9.2743 ABSTRACT: A vulnerability was reported in Blackberry Z10 Smartphones. REFERENCE LINKS: BlackBerry Security Advisory KB34458 SecurityTracker Alert ID: 1028669 CVE-2013-3692 IMPACT ASSESSMENT: Medium DISCUSSION: On systems with BlackBerry Protect enabled, if the user resets the device password via BlackBerry Protect and downloads a specifically crafted applications, then a physically local user can access or modify data on the device. The vulnerability is due to unsafe permissions on a BlackBerry Protect

135

V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

20: Apple QuickTime Multiple Flaws Let Remote Users Execute 20: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code November 9, 2012 - 6:00am Addthis PROBLEM: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Versions prior to QuickTime 7.7.3 are vulnerable on Windows 7, Vista and XP. ABSTRACT: Multiple vulnerabilities were reported in Apple QuickTime. REFERENCE LINKS: Apple Security Article: HT5581 SecurityTracker Alert ID: 1027737 Bugtraq ID: 56438 Secunia Advisory SA51226 CVE-2011-1374 CVE-2012-3751 CVE-2012-3752 CVE-2012-3753 CVE-2012-3754 CVE-2012-3755 CVE-2012-3756 CVE-2012-3757 CVE-2012-3758 IMPACT ASSESSMENT: High DISCUSSION: Multiple vulnerabilities have been reported in Apple QuickTime, which can

136

T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass  

NLE Websites -- All DOE Office Websites (Extended Search)

36: Cisco ASA Multiple Flaws Let Remote Users Deny Service and 36: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls January 18, 2011 - 2:30pm Addthis PROBLEM: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls. PLATFORM: Cisco 5500 Series Adaptive Security Appliances (ASA) ABSTRACT: Cisco ASA 5500 Series Adaptive Security Appliances are affected by multiple vulnerabilities. Affected versions of Cisco ASA Software vary depending on the specific vulnerability. Cisco ASA 5500 Series Adaptive Security Appliances may experience a TCP connection exhaustion condition (no new TCP connections are accepted) that can be triggered through the receipt of specific TCP segments during the

137

U-247: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass 7: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass Authentication and Gain Administrative Access U-247: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass Authentication and Gain Administrative Access August 29, 2012 - 6:00am Addthis PROBLEM: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass Authentication and Gain Administrative Access PLATFORM: EMC Cloud Tiering Appliance (CTA) 7.4 and prior EMC Cloud Tiering Appliance Virtual Edition (CTA/VE) 7.4 and prior EMC Cloud Tiering Appliance (CTA) 9.0 and prior EMC Cloud Tiering Appliance Virtual Edition (CTA/VE) 9.0 and prior ABSTRACT: A vulnerability was reported in EMC Cloud Tiering Appliance. reference LINKS: SecurityTracker Alert ID: 1027448 Bugtraq ID: 55250 EMC.com CVE-2012-2285 IMPACT ASSESSMENT:

138

U-213: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-213: Google Chrome Multiple Flaws Let Remote Users Execute U-213: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-213: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code July 16, 2012 - 7:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 20.0.1132.57 ABSTRACT: Several vulnerabilities were reported in Google Chrome. reference LINKS: Stable Channel Update SecurityTracker Alert ID: 1027249 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user.

139

T-650: Microsoft Word Unspecified Flaw Lets Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

650: Microsoft Word Unspecified Flaw Lets Remote Users Execute 650: Microsoft Word Unspecified Flaw Lets Remote Users Execute Arbitrary Code T-650: Microsoft Word Unspecified Flaw Lets Remote Users Execute Arbitrary Code June 20, 2011 - 3:35pm Addthis PROBLEM: A vulnerability was reported in Microsoft Word. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Office XP; possibly other versions ABSTRACT: Microsoft Word Unspecified Flaw Lets Remote Users Execute Arbitrary Code. reference LINKS: Secunia Advisory: SA44923 SecurityTracker Alert ID: 1025675 Bugtraq ID: 48261 TSL ID: TSL20110614-02 PRL: 2011-07 IMPACT ASSESSMENT: High Discussion: A code execution vulnerability has been reported in Microsoft Office Word. The vulnerability is due to memory corruption when parsing a specially crafted Word file.

140

T-720: Blue Coat Director HTTP Trace Processing Flaw Permits Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Blue Coat Director HTTP Trace Processing Flaw Permits 0: Blue Coat Director HTTP Trace Processing Flaw Permits Cross-Site Scripting Attacks T-720: Blue Coat Director HTTP Trace Processing Flaw Permits Cross-Site Scripting Attacks September 19, 2011 - 8:45am Addthis PROBLEM Blue Coat Director HTTP Trace Processing Flaw Permits Cross-Site Scripting Attacks. PLATFORM: All versions of Director prior to 5.5.2.3 are vulnerable. ABSTRACT: A vulnerability was reported in Blue Coat Director. A remote user can conduct cross-site scripting attacks. reference LINKS: Blue Coat Advisories ID: SA62 SecurityTracker Alert ID: 1026061 Blue Coat Director 510 Blue Coat SGME 5 IMPACT ASSESSMENT: Medium Discussion: An attacker can use the HTTP TRACE method to echo malicious script back to the client as part of a Cross Site Scripting (XSS) attack. No

Note: This page contains sample records for the topic "input validation flaw" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

V-058: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw 8: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code V-058: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code December 31, 2012 - 6:58am Addthis PROBLEM: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Version(s): 6, 7, 8 ABSTRACT: A vulnerability was reported in Microsoft Internet Explorer. A remote user can cause arbitrary code to be executed on the target user's system. REFERENCE LINKS: SecurityTracker Alert ID: 1027930 Secunia Advisory SA51695 CVE-2012-4792 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary

142

V-035: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Google Chrome Multiple Flaws Let Remote Users Execute 5: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code V-035: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code November 28, 2012 - 1:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 23.0.1271.91 ABSTRACT: Several vulnerabilities were reported in Google Chrome. REFERENCE LINKS: Release updates from the Chrome team SecurityTracker Alert ID: 1027815 Secunia Advisory SA51437 CVE-2012-5130 CVE-2012-5131 CVE-2012-5132 CVE-2012-5133 CVE-2012-5134 CVE-2012-5135 CVE-2012-5136 IMPACT ASSESSMENT: High DISCUSSION: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create specially crafted content that, when loaded by the

143

V-066: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users 6: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges V-066: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges January 10, 2013 - 2:00am Addthis PROBLEM: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges PLATFORM: *Adobe Reader XI (11.0.0) for Windows and Macintosh *Adobe Reader X (10.1.4) and earlier 10.x versions for Windows and Macintosh *Adobe Reader 9.5.2 and earlier 9.x versions for Windows and Macintosh *Adobe Reader 9.5.1 and earlier 9.x versions for Linux *Adobe Acrobat XI (11.0.0) for Windows and Macintosh *Adobe Acrobat X (10.1.4) and earlier 10.x versions for Windows and

144

V-067: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code 7: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code V-067: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code January 11, 2013 - 12:01am Addthis PROBLEM: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Oracle Java Runtime Environment (JRE) 1.7 in Java 7 Update 10 and earlier ABSTRACT: A vulnerability was reported in Oracle Java. REFERENCE LINKS: Seclist.org Vulnerability Note VU#625617 SecurityTracker Alert ID: 1027972 Malware.dontneedcoffee.com CVE-2013-0422 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted Java content that, when loaded by the target user, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user. This vulnerability is being actively exploited.

145

U-048: HP LaserJet Printers Unspecified Flaw Lets Remote Users Update  

NLE Websites -- All DOE Office Websites (Extended Search)

8: HP LaserJet Printers Unspecified Flaw Lets Remote Users 8: HP LaserJet Printers Unspecified Flaw Lets Remote Users Update Firmware with Arbitrary Code U-048: HP LaserJet Printers Unspecified Flaw Lets Remote Users Update Firmware with Arbitrary Code November 30, 2011 - 8:15am Addthis PROBLEM: HP LaserJet Printers Unspecified Flaw Lets Remote Users Update Firmware with Arbitrary Code . PLATFORM: HP LaserJet Printers manufactured prior to 2009 ABSTRACT A remote user can upgrade the printer's firmware with arbitrary code. reference LINKS: SecurityTracker Alert ID:1026357 HP Security for Imaging and Printing HP Clarifies on Printer Security IMPACT ASSESSMENT: Low Discussion: A vulnerability was reported in some HP LaserJet Printers. A remote user can update the firmware with arbitrary code. A remote user can send a specially crafted print job or specially crafted data to the

146

T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users 7:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions September 27, 2011 - 8:00am Addthis PROBLEM: Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions. PLATFORM: Windows XP Service Pack 3 Windows XP Professional x64 Edition Service Pack 2 Windows Server 2003 Service Pack 2 Windows Server 2003 x64 Edition Service Pack 2 Windows Server 2003 with SP2 for Itanium-based Systems Windows Vista Service Pack 2 Windows Vista x64 Edition Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 Windows Server 2008 for x64-based Systems Service Pack 2 Windows Server 2008 for Itanium-based Systems Service Pack 2 Windows 7 for 32-bit Systems and Windows 7 for 32-bit Systems Service Pack

147

T-713: Blue Coat Reporter Directory Traversal Flaw | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Blue Coat Reporter Directory Traversal Flaw 3: Blue Coat Reporter Directory Traversal Flaw T-713: Blue Coat Reporter Directory Traversal Flaw September 9, 2011 - 10:47am Addthis PROBLEM: A vulnerability was reported in Blue Coat Reporter. A remote user can view files on the target system and gain full control of the target application. PLATFORM: All pre-9.3 versions of Reporter installed on a Windows server are vulnerable. ABSTRACT: Blue Coat Reporter Directory Traversal Flaw Lets Remote Users Gain Full Control. reference LINKS: Blue Coat Security Advisory ID: SA60 SecurityTracker Alert ID: 1026023 About Path Traversal IMPACT ASSESSMENT: High Discussion: Reporter installed on a Windows server is vulnerable to an HTTP directory traversal attack. An unauthenticated user can browse the file system and read any file. Data from these files can be used by an attacker to gain

148

T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users 7:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions September 27, 2011 - 8:00am Addthis PROBLEM: Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions. PLATFORM: Windows XP Service Pack 3 Windows XP Professional x64 Edition Service Pack 2 Windows Server 2003 Service Pack 2 Windows Server 2003 x64 Edition Service Pack 2 Windows Server 2003 with SP2 for Itanium-based Systems Windows Vista Service Pack 2 Windows Vista x64 Edition Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 Windows Server 2008 for x64-based Systems Service Pack 2 Windows Server 2008 for Itanium-based Systems Service Pack 2 Windows 7 for 32-bit Systems and Windows 7 for 32-bit Systems Service Pack

149

U-180: Cisco IOS XR Packet Processing Flaw | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

80: Cisco IOS XR Packet Processing Flaw 80: Cisco IOS XR Packet Processing Flaw U-180: Cisco IOS XR Packet Processing Flaw May 31, 2012 - 7:00am Addthis PROBLEM: A vulnerability was reported in Cisco IOS XR. PLATFORM: Version(s): XR 4.0.3, 4.0.4, 4.1.0, 4.1.1, 4.1.2, and 4.2.0 ABSTRACT: A remote user can cause denial of service conditions. Reference Links: Security Tracker ID 1027104 CVE-2012-2488 Vendor Advisory IMPACT ASSESSMENT: High Discussion: A remote user can send a specially crafted packet to the target device to cause the route processor to be unable to transmit route processor-based protocol packets to the fabric. IP traffic transiting the device cannot trigger the flaw. Cisco IOS XR is affected on the Cisco 9000 Series Aggregation Services Routers (ASR) Route Switch Processor (RSP440) and the Cisco Carrier Routing

150

U-134: Apache Traffic Server Host Header Processing Flaw Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Apache Traffic Server Host Header Processing Flaw Lets 4: Apache Traffic Server Host Header Processing Flaw Lets Remote Users Deny Service U-134: Apache Traffic Server Host Header Processing Flaw Lets Remote Users Deny Service March 27, 2012 - 7:00am Addthis PROBLEM: Apache Traffic Server Host Header Processing Flaw Lets Remote Users Deny Service PLATFORM: Versions prior to 3.0.4 and 3.1.3 ABSTRACT: A vulnerability was reported in Apache Traffic Server. A remote user can cause denial of service conditions. reference LINKS: SecurityTracker Alert ID: 1026847 CVE-2012-0256 Secunia Advisory SA48509 IMPACT ASSESSMENT: High Discussion: A remote user can send a request with a specially crafted 'Host' header value to trigger a heap allocation error and cause the target service to crash. Impact: A remote user can cause the target service to crash.

151

U-166: Adobe Shockwave Player Memory Corruption Flaws Let Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Adobe Shockwave Player Memory Corruption Flaws Let Remote 6: Adobe Shockwave Player Memory Corruption Flaws Let Remote Users Execute Arbitrary Code U-166: Adobe Shockwave Player Memory Corruption Flaws Let Remote Users Execute Arbitrary Code May 10, 2012 - 7:00am Addthis PROBLEM: Adobe Shockwave Player Memory Corruption Flaws Let Remote Users Execute Arbitrary Code PLATFORM: 11.6.4.634 and prior ABSTRACT: Multiple vulnerabilities were reported in Adobe Shockwave Player. A remote user can cause arbitrary code to be executed on the target user's system. reference LINKS: SecurityTracker Alert ID: 1027037 CVE-2012-2029 CVE-2012-2030 CVE-2012-2031 CVE-2012-2032 CVE-2012-2033 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted Shockwave content that, when loaded by the target user, will trigger a memory corruption error and

152

V-075: EMC AlphaStor Command Injection and Format String Flaws Let Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: EMC AlphaStor Command Injection and Format String Flaws Let 5: EMC AlphaStor Command Injection and Format String Flaws Let Remote Users Execute Arbitrary Code V-075: EMC AlphaStor Command Injection and Format String Flaws Let Remote Users Execute Arbitrary Code January 23, 2013 - 12:26am Addthis PROBLEM: EMC AlphaStor Command Injection and Format String Flaws Let Remote Users Execute Arbitrary Code PLATFORM: EMC AlphaStor 4.0 prior to build 800 (All platforms) ABSTRACT: Two vulnerabilities were reported in EMC AlphaStor. REFERENCE LINKS: ESA-2013-008: SecurityTracker Alert ID: 1028020 Secunia Advisory SA51930 CVE-2013-0928 CVE-2013-0929 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can send a specially crafted DCP run command to inject commands and cause the Device Manager (rrobotd.exe) to execute arbitrary code on the target system [CVE-2013-0928].

153

U-010:HP Onboard Administrator Unspecified Flaw Lets Remote Users Gain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0:HP Onboard Administrator Unspecified Flaw Lets Remote Users 0:HP Onboard Administrator Unspecified Flaw Lets Remote Users Gain Access U-010:HP Onboard Administrator Unspecified Flaw Lets Remote Users Gain Access October 13, 2011 - 8:15am Addthis PROBLEM: HP Onboard Administrator Unspecified Flaw Lets Remote Users Gain Access PLATFORM: Onboard Administrator (OA) 3.21 through 3.31 ABSTRACT: A remote user can gain access to the target system reference LINKS: HP Support document ID: c03048779 SecurityTracker Alert ID: 1026158 CVE-2011-3155 IMPACT ASSESSMENT: Medium Discussion: A potential security vulnerability has been identified with HP Onboard Administrator (OA). The vulnerability could be exploited remotely to gain unauthorized access. Impact: A remote user can gain access to the target system. Solution: Onboard Administrator (OA) v3.32 is available.

154

U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

14: Oracle Java Runtime Environment (JRE) Multiple Flaws Let 14: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote Users Execute Arbitrary Code and Deny Service U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote Users Execute Arbitrary Code and Deny Service October 19, 2011 - 6:00pm Addthis PROBLEM: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote Users Execute Arbitrary Code and Deny Service. PLATFORM: Oracle JDK and JRE 7; JDK and JRE 6 Update 27 and prior; JDK and JRE 5.0 Update 31 and prior; SDK and JRE 1.4.2_33 and prior ABSTRACT: A remote user can create a Java applet or Java Web Start application that, when loaded by the target user, will access or modify data or execute arbitrary code on the target user's system. reference LINKS: Oracle Critical Patch Updates and Security Alerts

155

U-134: Apache Traffic Server Host Header Processing Flaw Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

34: Apache Traffic Server Host Header Processing Flaw Lets 34: Apache Traffic Server Host Header Processing Flaw Lets Remote Users Deny Service U-134: Apache Traffic Server Host Header Processing Flaw Lets Remote Users Deny Service March 27, 2012 - 7:00am Addthis PROBLEM: Apache Traffic Server Host Header Processing Flaw Lets Remote Users Deny Service PLATFORM: Versions prior to 3.0.4 and 3.1.3 ABSTRACT: A vulnerability was reported in Apache Traffic Server. A remote user can cause denial of service conditions. reference LINKS: SecurityTracker Alert ID: 1026847 CVE-2012-0256 Secunia Advisory SA48509 IMPACT ASSESSMENT: High Discussion: A remote user can send a request with a specially crafted 'Host' header value to trigger a heap allocation error and cause the target service to crash. Impact: A remote user can cause the target service to crash.

156

U-133: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

33: Google Chrome Multiple Flaws Let Remote Users Execute 33: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-133: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code March 26, 2012 - 3:35am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Google Chrome prior to 17.0.963.83 ABSTRACT: Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026841 CVE-2011-3049 Secunia Advisory SA48512 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. A use-after-free may occur

157

U-206: WordPress Flaws Permit Cross-Site Scripting, Cross-Site Request  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: WordPress Flaws Permit Cross-Site Scripting, Cross-Site 6: WordPress Flaws Permit Cross-Site Scripting, Cross-Site Request Forgery, and Information Disclosure Attacks U-206: WordPress Flaws Permit Cross-Site Scripting, Cross-Site Request Forgery, and Information Disclosure Attacks July 6, 2012 - 7:00am Addthis PROBLEM: WordPress Flaws Permit Cross-Site Scripting, Cross-Site Request Forgery, and Information Disclosure Attacks PLATFORM: Version(s): prior to 3.4.1 ABSTRACT: Several vulnerabilities were reported in WordPress. A remote authenticated user can conduct cross-site scripting attacks. A remote user can conduct cross-site request forgery attacks. A remote authenticated user can obtain potentially sensitive information. reference LINKS: The Vendor's Advisory WordPress 3.4.1 Maintenance and Security Release SecurityTracker Alert ID: 1027219

158

V-006: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary 6: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service V-006: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service October 19, 2012 - 6:00am Addthis PROBLEM: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service PLATFORM: CA ARCserve Backup for Windows r12.5, r15, r16 ABSTRACT: Two vulnerabilities were reported in CA ARCserve Backup. A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions. REFERENCE LINKS: SecurityTracker Alert ID: 1027683 CA Technologies Support CVE-2012-2971 CVE-2012-2972 IMPACT ASSESSMENT: High DISCUSSION: A remote user can send specially crafted RPC requests to execute arbitrary code on the target system [CVE-2012-2971]. The code will run with the

159

U-143: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Google Chrome Multiple Flaws Let Remote Users Execute 3: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-143: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code April 9, 2012 - 7:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 18.0.1025.151 ABSTRACT: Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026892 CVE-2011-3066 Secunia Advisory SA48732 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. An out-of-bounds memory

160

T-683:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

83:Google Chrome Multiple Flaws Let Remote Users Execute 83:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code T-683:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code August 3, 2011 - 3:45pm Addthis PROBLEM: Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Google Chrome prior to 13.0.782.107 ABSTRACT: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code. reference LINKS: Google Chrome advisory Update Chromium Security SecurityTracker Alert ID: 1025882 CVE-2011-2819 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a specially crafted HTML that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user.

Note: This page contains sample records for the topic "input validation flaw" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Adobe Flash Player Memory Corruption Flaw Lets Remote Users 6: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code June 12, 2013 - 12:15am Addthis PROBLEM: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Adobe Flash Player 11.7.700.202 and earlier versions for Windows Adobe Flash Player 11.7.700.203 and earlier versions for Macintosh Adobe Flash Player 11.2.202.285 and earlier versions for Linux Adobe Flash Player 11.1.115.58 and earlier versions for Android 4.x Adobe Flash Player 11.1.111.54 and earlier versions for Android 3.x and 2.x Adobe AIR 3.7.0.1860 and earlier versions for Windows and Macintosh Adobe AIR 3.7.0.1860 and earlier versions for Android

162

U-258: Adobe Flash Player Flaw Lets Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Adobe Flash Player Flaw Lets Remote Users Execute Arbitrary 8: Adobe Flash Player Flaw Lets Remote Users Execute Arbitrary Code U-258: Adobe Flash Player Flaw Lets Remote Users Execute Arbitrary Code September 12, 2012 - 1:07pm Addthis PROBLEM: Adobe Flash Player Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: 11.3.300.270 and prior (Windows, OS X); 11.2.202.236 and prior (Linux); 11.3.300.270 and prior (Chrome) ABSTRACT: A remote user can cause arbitrary code to be executed on the target user's system. Reference LINKS: CVE-2012-1535 AdobeSecurity/bulletins SecurityTracker IMPACT ASSESSMENT: High Discussion: Vulnerability was reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a specially crafted file that, when loaded by the target user,

163

U-239: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

39: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS 39: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source Addresses U-239: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source Addresses August 20, 2012 - 7:00am Addthis PROBLEM: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source Addresses PLATFORM: Version(s): 6 beta 4 and prior versions ABSTRACT: A remote user can spoof SMS source addresses. Reference LINKS: SecurityTracker Alert ID: 1027410 Apple.com PCMag.com The original advisory IMPACT ASSESSMENT: Medum Discussion: A vulnerability was reported in Apple iPhone. A remote user can send an SMS message with a specially crafted User Data Header (UDH) value that specifies an alternate reply address. The recipient's iPhone will display the reply address as the source of the SMS.

164

V-035: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Google Chrome Multiple Flaws Let Remote Users Execute 5: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code V-035: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code November 28, 2012 - 1:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 23.0.1271.91 ABSTRACT: Several vulnerabilities were reported in Google Chrome. REFERENCE LINKS: Release updates from the Chrome team SecurityTracker Alert ID: 1027815 Secunia Advisory SA51437 CVE-2012-5130 CVE-2012-5131 CVE-2012-5132 CVE-2012-5133 CVE-2012-5134 CVE-2012-5135 CVE-2012-5136 IMPACT ASSESSMENT: High DISCUSSION: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create specially crafted content that, when loaded by the

165

U-220: Google Android DNS Resolver Randomization Flaw Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Google Android DNS Resolver Randomization Flaw Lets Remote 0: Google Android DNS Resolver Randomization Flaw Lets Remote Users Poison the DNS Cache U-220: Google Android DNS Resolver Randomization Flaw Lets Remote Users Poison the DNS Cache July 25, 2012 - 7:00am Addthis PROBLEM: Google Android DNS Resolver Randomization Flaw Lets Remote Users Poison the DNS Cache PLATFORM: Version(s): 4.0.4 and prior versions ABSTRACT: A remote user can poison the DNS cache. reference LINKS: IBM Application Security Research Group SecurityTracker Alert ID: 1027291 Bugtraq ID: 523624 CVE-2012-2808 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Google Android. The res_randomid() function, which bases a return value on the process ID and the current time, is called twice in quick succession. As a result, the effective

166

U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Oracle Java Runtime Environment (JRE) Multiple Flaws Let 4: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote Users Execute Arbitrary Code and Deny Service U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote Users Execute Arbitrary Code and Deny Service October 19, 2011 - 6:00pm Addthis PROBLEM: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote Users Execute Arbitrary Code and Deny Service. PLATFORM: Oracle JDK and JRE 7; JDK and JRE 6 Update 27 and prior; JDK and JRE 5.0 Update 31 and prior; SDK and JRE 1.4.2_33 and prior ABSTRACT: A remote user can create a Java applet or Java Web Start application that, when loaded by the target user, will access or modify data or execute arbitrary code on the target user's system. reference LINKS: Oracle Critical Patch Updates and Security Alerts

167

U-077: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Google Chrome Multiple Flaws Let Remote Users Execute 7: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-077: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code January 9, 2012 - 9:15am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 16.0.912.75 ABSTRACT: A remote user may be able to execute arbitrary code on the target system. reference LINKS: Google Chrome Releases Chromium Security SecurityTracker Alert ID:1026487 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. Specially crafted animation frames can trigger a use-after-free memory

168

T-715: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Microsoft SharePoint Multiple Flaws Permit Cross-Site 5: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting Attacks T-715: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting Attacks September 13, 2011 - 12:35pm Addthis PROBLEM: Multiple vulnerabilities were reported in Microsoft SharePoint. A remote user can conduct cross-site scripting attacks. PLATFORM: Version(s): SharePoint software ABSTRACT: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting Attacks. reference LINKS: MS11-074: Article ID: 2552998 SecurityTracker Alert ID: 1026040 CVE-2011-1893 CVE-2011-1892 CVE-2011-1891 CVE-2011-1890 CVE-2011-0653 IMPACT ASSESSMENT: High Discussion: A remote user can create a specially crafted URL or web site that, when loaded by a target user, will cause arbitrary scripting code to be executed

169

V-049: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users  

NLE Websites -- All DOE Office Websites (Extended Search)

9: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let 9: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users Execute Arbitrary Code V-049: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users Execute Arbitrary Code December 18, 2012 - 1:30am Addthis PROBLEM: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users Execute Arbitrary Code PLATFORM: Windows RealPlayer 15.0.6.14 and prior. ABSTRACT: Two vulnerabilities were reported in RealPlayer. REFERENCE LINKS: RealPlayer Security Vulnerabilities Secunia Advisory SA51589 SecurityTracker Alert ID: 1027893 CVE-2012-5690 CVE-2012-5691 IMPACT ASSESSMENT: Medium DISCUSSION: Two vulnerabilities have been reported in RealPlayer, which can be exploited by malicious people to compromise a user's system. A remote user can create a specially crafted RealAudio file that, when

170

V-066: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

66: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users 66: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges V-066: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges January 10, 2013 - 2:00am Addthis PROBLEM: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges PLATFORM: *Adobe Reader XI (11.0.0) for Windows and Macintosh *Adobe Reader X (10.1.4) and earlier 10.x versions for Windows and Macintosh *Adobe Reader 9.5.2 and earlier 9.x versions for Windows and Macintosh *Adobe Reader 9.5.1 and earlier 9.x versions for Linux *Adobe Acrobat XI (11.0.0) for Windows and Macintosh *Adobe Acrobat X (10.1.4) and earlier 10.x versions for Windows and

171

U-242: Linux Kernel Netlink SCM_CREDENTIALS Processing Flaw Lets Local  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Linux Kernel Netlink SCM_CREDENTIALS Processing Flaw Lets 2: Linux Kernel Netlink SCM_CREDENTIALS Processing Flaw Lets Local Users Gain Elevated Privileges U-242: Linux Kernel Netlink SCM_CREDENTIALS Processing Flaw Lets Local Users Gain Elevated Privileges August 23, 2012 - 7:00am Addthis PROBLEM: Linux Kernel Netlink SCM_CREDENTIALS Processing Flaw Lets Local Users Gain Elevated Privileges PLATFORM: Linux Kernel 3.2.x Linux Kernel 3.4.x Linux Kernel 3.5.x ABSTRACT: A vulnerability was reported in the Linux Kernel. reference LINKS: The Linux Kernel Archives SecurityTracker Alert ID: 1027434 Secunia Advisory SA50323 CVE-2012-3520 IMPACT ASSESSMENT: Medium Discussion: A local user can obtain elevated privileges on the target system. A local user may be able to send specially crafted Netlink messages to spoof SCM_CREDENTIALS and perform actions with elevated privileges.

172

Plant Engineering: Evaluation of Indirect Assessment Techniques for Coating Flaw Detection  

Science Conference Proceedings (OSTI)

This report is a description of the work performed and conclusions resulting from an investigation of indirect assessment techniques for coating flaw detection on buried piping in nuclear generating power plant environments. Indirect assessment techniques have been developed and successfully used in the oil and gas industry to identify coating flaws on buried transmission and distribution pipelines. These techniques involve the use of electrochemical measurements taken at the soil surface (grade) to dete...

2011-12-23T23:59:59.000Z

173

Stress Intensity Factor Plasticity Correction for Flaws in Stress Concentration Regions  

DOE Green Energy (OSTI)

Plasticity corrections to elastically computed stress intensity factors are often included in brittle fracture evaluation procedures. These corrections are based on the existence of a plastic zone in the vicinity of the crack tip. Such a plastic zone correction is included in the flaw evaluation procedure of Appendix A to Section XI of the ASME Boiler and Pressure Vessel Code. Plasticity effects from the results of elastic and elastic-plastic explicit flaw finite element analyses are examined for various size cracks emanating from the root of a notch in a panel and for cracks located at fillet fadii. The results of these caluclations provide conditions under which the crack-tip plastic zone correction based on the Irwin plastic zone size overestimates the plasticity effect for crack-like flaws embedded in stress concentration regions in which the elastically computed stress exceeds the yield strength of the material. A failure assessment diagram (FAD) curve is employed to graphically c haracterize the effect of plasticity on the crack driving force. The Option 1 FAD curve of the Level 3 advanced fracture assessment procedure of British Standard PD 6493:1991, adjusted for stress concentration effects by a term that is a function of the applied load and the ratio of the local radius of curvature at the flaw location to the flaw depth, provides a satisfactory bound to all the FAD curves derived from the explicit flaw finite element calculations. The adjusted FAD curve is a less restrictive plasticity correction than the plastic zone correction of Section XI for flaws embedded in plastic zones at geometric stress concentrators. This enables unnecessary conservatism to be removed from flaw evaluation procedures that utilize plasticity corrections.

Friedman, E.; Wilson, W.K.

2000-02-01T23:59:59.000Z

174

Spatial Statistical Procedures to Validate Input Data in Energy Models  

DOE Green Energy (OSTI)

Energy modeling and analysis often relies on data collected for other purposes such as census counts, atmospheric and air quality observations, economic trends, and other primarily non-energy-related uses. Systematic collection of empirical data solely for regional, national, and global energy modeling has not been established as in the above-mentioned fields. Empirical and modeled data relevant to energy modeling is reported and available at various spatial and temporal scales that might or might not be those needed and used by the energy modeling community. The incorrect representation of spatial and temporal components of these data sets can result in energy models producing misleading conclusions, especially in cases of newly evolving technologies with spatial and temporal operating characteristics different from the dominant fossil and nuclear technologies that powered the energy economy over the last two hundred years. Increased private and government research and development and public interest in alternative technologies that have a benign effect on the climate and the environment have spurred interest in wind, solar, hydrogen, and other alternative energy sources and energy carriers. Many of these technologies require much finer spatial and temporal detail to determine optimal engineering designs, resource availability, and market potential. This paper presents exploratory and modeling techniques in spatial statistics that can improve the usefulness of empirical and modeled data sets that do not initially meet the spatial and/or temporal requirements of energy models. In particular, we focus on (1) aggregation and disaggregation of spatial data, (2) predicting missing data, and (3) merging spatial data sets. In addition, we introduce relevant statistical software models commonly used in the field for various sizes and types of data sets.

Lawrence Livermore National Laboratory

2006-01-27T23:59:59.000Z

175

INPUT VALIDATION TESTING: A SYSTEM LEVEL, EARLY LIFECYCLE TECHNIQUE  

E-Print Network (OSTI)

Johnston '12, chelsea Karpenko '12, Lauriane rougeau '13 and catherine White '12. Johnston was a member, a maintenance mechanic and material handler at Cornell for 30 years who served in many roles, including presi

Offutt, Jeff

176

V-192: Symantec Security Information Manager Input Validation...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

in Symantec Security Information Manager PLATFORM: Symantec Security Information Manager Appliance Version 4.7.x and 4.8.0 ABSTRACT: Symantec was notified of multiple security...

177

Spatial Statistical Procedures to Validate Input Data in Energy Models  

DOE Green Energy (OSTI)

Energy modeling and analysis often relies on data collected for other purposes such as census counts, atmospheric and air quality observations, economic trends, and other primarily non-energy related uses. Systematic collection of empirical data solely for regional, national, and global energy modeling has not been established as in the abovementioned fields. Empirical and modeled data relevant to energy modeling is reported and available at various spatial and temporal scales that might or might not be those needed and used by the energy modeling community. The incorrect representation of spatial and temporal components of these data sets can result in energy models producing misleading conclusions, especially in cases of newly evolving technologies with spatial and temporal operating characteristics different from the dominant fossil and nuclear technologies that powered the energy economy over the last two hundred years. Increased private and government research and development and public interest in alternative technologies that have a benign effect on the climate and the environment have spurred interest in wind, solar, hydrogen, and other alternative energy sources and energy carriers. Many of these technologies require much finer spatial and temporal detail to determine optimal engineering designs, resource availability, and market potential. This paper presents exploratory and modeling techniques in spatial statistics that can improve the usefulness of empirical and modeled data sets that do not initially meet the spatial and/or temporal requirements of energy models. In particular, we focus on (1) aggregation and disaggregation of spatial data, (2) predicting missing data, and (3) merging spatial data sets. In addition, we introduce relevant statistical software models commonly used in the field for various sizes and types of data sets.

Johannesson, G.; Stewart, J.; Barr, C.; Brady Sabeff, L.; George, R.; Heimiller, D.; Milbrandt, A.

2006-01-01T23:59:59.000Z

178

U-106: Citrix XenServer Multiple Flaws in Web Self Service Have Unspecified  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Citrix XenServer Multiple Flaws in Web Self Service Have 6: Citrix XenServer Multiple Flaws in Web Self Service Have Unspecified Impact U-106: Citrix XenServer Multiple Flaws in Web Self Service Have Unspecified Impact February 17, 2012 - 8:30am Addthis PROBLEM: Multiple vulnerabilities were reported in Citrix XenServer Web Self Service. PLATFORM: Version(s): 5.5, 5.6 SP2, 6.0; Web Self Service prior to 1.1.1 ABSTRACT: A number of security vulnerabilities have been identified in the management web interface of Citrix XenServer Web Self Service. reference LINKS: Citrix Support Center SecurityTracker Alert ID:1026695 IMPACT ASSESSMENT: Medium Discussion: Customers who have installed XenServer but have not additionally downloaded and installed the optional Web Self Service component are not affected by these vulnerabilities. These vulnerabilities affect all currently supported

179

T-574: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

74: Google Chrome Multiple Flaws Let Remote Users Execute 74: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code T-574: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code March 10, 2011 - 3:05pm Addthis PROBLEM: Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can bypass the pop-up blocker. PLATFORM: Google Chrome prior to 10.0.648.127 ABSTRACT: Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact while others can be exploited by malicious people bypass certain security restrictions, disclose system information, and compromise a user's system. reference LINKS: Secunia Advisory: SA43683 Google Chrome Support Chrome Stable Release SecurityTracker Alert ID:1025181

180

U-107: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny Service  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

07: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny 07: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny Service U-107: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny Service February 21, 2012 - 6:00am Addthis PROBLEM: A vulnerability was reported in Cisco NX-OS. A remote user can cause denial of service conditions. PLATFORM: Nexus 1000v, 5000, and 7000 Series Switches ABSTRACT: A remote user can send a specially crafted IP packet to cause the target device to reload. reference LINKS: Cisco Advisory SecurityTracker Alert ID:1026692 CVE-2012-0352 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Cisco NX-OS. A remote user can cause denial of service conditions. A remote user can send a specially crafted IP packet to cause the target device to reload. The vulnerability occurs when the device attepts to obtain Layer 4 (e.g.,

Note: This page contains sample records for the topic "input validation flaw" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

U-140: HP-UX Unspecified Flaw in DCE Lets Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-140: HP-UX Unspecified Flaw in DCE Lets Remote Users Execute U-140: HP-UX Unspecified Flaw in DCE Lets Remote Users Execute Arbitrary Code U-140: HP-UX Unspecified Flaw in DCE Lets Remote Users Execute Arbitrary Code April 4, 2012 - 7:15am Addthis PROBLEM: A vulnerability was reported in HP-UX PLATFORM: Version(s): 11.11, 11.23; running DCE ABSTRACT: A remote user can execute arbitrary code on the target system. A remote user can send specially crafted data to execute arbitrary code on the target system. The code will run with the privileges of the target service. Reference LINKS: Vendor Advisory Security Tracker ID 1026885 CVE-2012-0131 IMPACT ASSESSMENT: High Discussion: A potential security vulnerability has been identified in HP-UX running DCE. The vulnerability could be exploited remotely to create a Denial of Service (DoS).

182

U-245: Critical Java 0-day flaw exploited | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

45: Critical Java 0-day flaw exploited 45: Critical Java 0-day flaw exploited U-245: Critical Java 0-day flaw exploited August 27, 2012 - 4:41pm Addthis PROBLEM: Attackers are exploiting a new and unpatched vulnerability that affects the latest version of Java -- Java 7 Update 6, and it works against a fully patched Windows 7 SP1 with Java 7 Update 6, Mozilla Firefox on Ubuntu Linux 10.04, Internet Explorer / Mozilla Firefox / Chrome on Windows XP, Internet Explorer / Mozilla Firefox on Windows Vista and Windows 7, and Safari on OS X 10.7.4. PLATFORM: Version(s): Java 7 Update 6 ABSTRACT: Targeted attacks exploiting a zero-day Java vulnerability to deliver the Poison Ivy RAT onto the unsuspecting victims' machines REFERENCE LINKS: http://www.net-security.org/secworld.php?id=13484 zero-day CVE-2012-4681

183

V-218: HP Service Manager Unspecified Flaw Lets Remote Users Gain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: HP Service Manager Unspecified Flaw Lets Remote Users Gain 8: HP Service Manager Unspecified Flaw Lets Remote Users Gain Unauthorized Access V-218: HP Service Manager Unspecified Flaw Lets Remote Users Gain Unauthorized Access August 15, 2013 - 1:30am Addthis PROBLEM: A potential security vulnerability has been identified with HP Service Manager. The vulnerability could be exploited to allow remote unauthenticated access and elevation of privilege. PLATFORM: HP Service Manager v9.31, v9.30, v9.21, v7.11, v6.2.8 ABSTRACT: The vulnerabilities are reported in versions 9.31 and prior. REFERENCE LINKS: SecurityTracker Alert ID: 1028912 CVE-2013-4808 IMPACT ASSESSMENT: High DISCUSSION: A vulnerability was reported in HP Service Manager. A remote user can gain unauthorized access on the target system. IMPACT: User access via network

184

V-218: HP Service Manager Unspecified Flaw Lets Remote Users Gain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: HP Service Manager Unspecified Flaw Lets Remote Users Gain 8: HP Service Manager Unspecified Flaw Lets Remote Users Gain Unauthorized Access V-218: HP Service Manager Unspecified Flaw Lets Remote Users Gain Unauthorized Access August 15, 2013 - 1:30am Addthis PROBLEM: A potential security vulnerability has been identified with HP Service Manager. The vulnerability could be exploited to allow remote unauthenticated access and elevation of privilege. PLATFORM: HP Service Manager v9.31, v9.30, v9.21, v7.11, v6.2.8 ABSTRACT: The vulnerabilities are reported in versions 9.31 and prior. REFERENCE LINKS: SecurityTracker Alert ID: 1028912 CVE-2013-4808 IMPACT ASSESSMENT: High DISCUSSION: A vulnerability was reported in HP Service Manager. A remote user can gain unauthorized access on the target system. IMPACT: User access via network

185

T-617: BIND RPZ Processing Flaw Lets Remote Users Deny Service | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: BIND RPZ Processing Flaw Lets Remote Users Deny Service 7: BIND RPZ Processing Flaw Lets Remote Users Deny Service T-617: BIND RPZ Processing Flaw Lets Remote Users Deny Service May 6, 2011 - 7:00am Addthis PROBLEM: A vulnerability has been reported in BIND, which can be exploited by malicious people to cause a DoS (Denial of Service). PLATFORM: ISC BIND version 9.8.0. ABSTRACT: When a name server is configured with a response policy zone (RPZ), queries for type RRSIG can trigger a server crash. REFERENCE LINKS: ISC Advisory: CVE-2011-1907 Secunia Advisory: SA44416 Vulnerability Report: ISC BIND CVE-2011-1907 SecurityTracker Alert ID: 1025503 IMPACT ASSESSMENT: High Discussion: This advisory only affects BIND users who are using the RPZ feature configured for RRset replacement. BIND 9.8.0 introduced Response Policy Zones (RPZ), a mechanism for modifying DNS responses returned by a

186

V-225: McAfee Email Gateway SMTP Processing Flaw Lets Remote Users Deny  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: McAfee Email Gateway SMTP Processing Flaw Lets Remote Users 5: McAfee Email Gateway SMTP Processing Flaw Lets Remote Users Deny Service V-225: McAfee Email Gateway SMTP Processing Flaw Lets Remote Users Deny Service August 23, 2013 - 1:26am Addthis PROBLEM: A vulnerability was reported in McAfee Email Gateway. A remote user can cause denial of service conditions. PLATFORM: McAfee Email Gateway (MEG) 7.5 ABSTRACT: A remote user can cause the SMTP proxy to stop responding. REFERENCE LINKS: SecurityTracker Alert ID: 1028941 GENERIC-MAP-NOMATCH IMPACT ASSESSMENT: High DISCUSSION: A vulnerability was reported in McAfee Email Gateway. A remote user can cause denial of service conditions.A remote user can send a specially crafted e-mail to cause the ws_inv-smtp process to enter an infinite loop and cause the target SMTP proxy to stop responding.

187

T-663: Cisco Content Services Gateway ICMP Processing Flaw Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Cisco Content Services Gateway ICMP Processing Flaw Lets 3: Cisco Content Services Gateway ICMP Processing Flaw Lets Remote Users Deny Service T-663: Cisco Content Services Gateway ICMP Processing Flaw Lets Remote Users Deny Service July 7, 2011 - 12:41pm Addthis PROBLEM: A denial of service (DoS) vulnerability exists in the Cisco Content Services Gateway - Second Generation, that runs on the Cisco Service and Application Module for IP (SAMI). An unauthenticated, remote attacker could exploit this vulnerability by sending a series of crafted ICMP packets to an affected device. Exploitation could cause the device to reload. There are no workarounds available to mitigate exploitation of this vulnerability other than blocking ICMP traffic destined to the affected device. PLATFORM: Second Generation only Cisco IOS 12.4(24)MDA3,Cisco IOS 12.4(24)MDA3,Cisco

188

V-227: VMware Workstation and Player vmware-mount Command Flaw Lets Local  

NLE Websites -- All DOE Office Websites (Extended Search)

7: VMware Workstation and Player vmware-mount Command Flaw Lets 7: VMware Workstation and Player vmware-mount Command Flaw Lets Local Users Gain Root Privileges V-227: VMware Workstation and Player vmware-mount Command Flaw Lets Local Users Gain Root Privileges August 26, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in VMware Workstation and Player on Debian-based systems PLATFORM: VMware Workstation 8.x, 9.x and Player 4.x, 5.x ABSTRACT: VMware Workstation and Player contain a vulnerability in the handling of the vmware-mount command REFERENCE LINKS: Security Tracker Alert ID 1028948 VMware Security Advisory VMSA-2013-0010 CVE-2013-1662 IMPACT ASSESSMENT: Medium DISCUSSION: A local malicious user may exploit this vulnerability to escalate their privileges to root on the host OS. The issue is present when Workstation or

189

Characterization of flaws in a tube bundle mock-up for reliability studies  

Science Conference Proceedings (OSTI)

As part of an assessment of in-service inspection of steam generator tubes, the authors will assemble a steam generator mock-up for round robin studies and use as a test bed in evaluating emerging technologies. Progress is reported on the characterization of flaws that will be part of the mock-up. Eddy current and ultrasonic techniques are being evaluated as a means to characterize the flaws in the mock-up tubes before final assembly. Twenty Inconel 600 tubes with laboratory-grown cracks, typical of those to be used in the mock-up, were provided by Pacific Northwest National Laboratory for laboratory testing. After the tubes were inspected with eddy current and ultrasonic techniques, they were destructively analyzed to establish the actual depths, lengths, and profiles of the cracks. The analysis of the results will allow the best techniques to be used for characterizing the flaws in the mock-up tubes.

Kupperman, D.S.; Bakhtiari, S.

1996-10-01T23:59:59.000Z

190

U-006:Cisco Network Admission Control Manager Directory Traversal Flaw Lets  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6:Cisco Network Admission Control Manager Directory Traversal 6:Cisco Network Admission Control Manager Directory Traversal Flaw Lets Remote Users Obtain Potentially Sensitive Information U-006:Cisco Network Admission Control Manager Directory Traversal Flaw Lets Remote Users Obtain Potentially Sensitive Information October 7, 2011 - 8:45am Addthis PROBLEM: Cisco Network Admission Control Manager Directory Traversal Flaw Lets Remote Users Obtain Potentially Sensitive Information PLATFORM: Cisco NAC Manager software versions 4.8.X Cisco NAC Manager software versions 4.7.X and earlier are not affected ABSTRACT: An unauthenticated attacker could exploit this vulnerability to access sensitive information, including password files and system logs, that could be leveraged to launch subsequent attacks. reference LINKS: Cisco Security Advisory Document ID: 113189

191

Code Completion From Abbreviated Input  

E-Print Network (OSTI)

Abbreviation Completion is a novel technique to improve the efficiency of code-writing by supporting code completion of multiple keywords based on non-predefined abbreviated input - a different approach from conventional ...

Miller, Robert C.

192

U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: RSA Access Manager Session Replay Flaw Lets Remote Users 5: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System July 5, 2012 - 7:02am Addthis PROBLEM: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System PLATFORM: Version(s): Server version 6.0.x, 6.1, 6.1 SP1, 6.1 SP2, 6.1 SP3; all Agent versions ABSTRACT: A vulnerability was reported in RSA Access Manager. A remote user can gain access to the target system. reference LINKS: SecurityFocus ESA-2012-026 SecurityTracker Alert ID: 1027220 CVE-2012-2281 RSA SecurCare Online MPACT ASSESSMENT: Medium Discussion: RSA Access Manager contains a vulnerability that can be potentially exploited by a malicious user to replay the session with compromised session tokens. This is due to improper invalidation of session tokens

193

U-007: IBM Rational AppScan Import/Load Function Flaws Let Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: IBM Rational AppScan Import/Load Function Flaws Let Remote 7: IBM Rational AppScan Import/Load Function Flaws Let Remote Users Execute Arbitrary Code U-007: IBM Rational AppScan Import/Load Function Flaws Let Remote Users Execute Arbitrary Code October 10, 2011 - 9:15am Addthis PROBLEM: IBM Rational AppScan Import/Load Function Flaws Let Remote Users Execute Arbitrary Code. PLATFORM: Version(s): 7.8, 7.8.0.1, 7.8.0.2, 7.9, 7.9.0.1, 7.9.0.2, 7.9.0.3, 8.0, 8.0.0.1, 8.0.0.2 ABSTRACT: Two vulnerabilities were reported in IBM Rational AppScan. A remote user can cause arbitrary code to be executed on the target user's system. reference LINKS: IBM Security Advisory Document ID: 1515110 IBM Fix Pack Document ID: 4030774 SecurityTracker Alert ID: 1026154 IMPACT ASSESSMENT: High Discussion: A high risk security vulnerability in the "Import functionality" of IBM

194

U-260: ISC BIND RDATA Processing Flaw Lets Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: ISC BIND RDATA Processing Flaw Lets Remote Users Deny 0: ISC BIND RDATA Processing Flaw Lets Remote Users Deny Service U-260: ISC BIND RDATA Processing Flaw Lets Remote Users Deny Service September 14, 2012 - 6:00am Addthis PROBLEM: ISC BIND RDATA Processing Flaw Lets Remote Users Deny Service PLATFORM: Version(s): 9.0.x -> 9.6.x, 9.4-ESV->9.4-ESV-R5-P1, 9.6-ESV->9.6-ESV-R7-P2, 9.7.0->9.7.6-P2, 9.8.0->9.8.3-P2, 9.9.0->9.9.1-P2 ABSTRACT: A vulnerability was reported in ISC BIND. reference LINKS: The vendor's advisory SecurityTracker Alert ID: 1027529 Bugtraq ID: 55522 Red Hat Bugzilla - Bug 856754 CVE-2012-4244 IMPACT ASSESSMENT: High Discussion: A remote user can send a query for a record that has RDATA in excess of 65535 bytes to cause named to exit. This can be exploited against recursive servers by causing the server to query for records provided by an

195

U-073: Bugzilla Flaws Permit Cross-Site Scripting and Cross-Site Request  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

73: Bugzilla Flaws Permit Cross-Site Scripting and Cross-Site 73: Bugzilla Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks U-073: Bugzilla Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks January 3, 2012 - 10:30am Addthis PROBLEM: Bugzilla Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks PLATFORM: Version(s): prior to 3.4.13, 3.6.7, 4.0.3, 4.2rc1 ABSTRACT: Several vulnerabilities were reported in Bugzilla. A remote user can conduct cross-site scripting attacks. reverence LINKS: SecurityTracker Alert ID: 1026480 3.4.12 Security Advisory Bug 697699 Bug 703975 Bug 703983 IMPACT ASSESSMENT: Medium Discussion: Tabular and graphical reports, as well as new charts have a debug mode which displays raw data as plain text. This text is not correctly escaped and a crafted URL could use this vulnerability to inject code leading to

196

T-636: Wireshark Multiple Flaws Let Remote Users Deny Service | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

T-636: Wireshark Multiple Flaws Let Remote Users Deny Service T-636: Wireshark Multiple Flaws Let Remote Users Deny Service T-636: Wireshark Multiple Flaws Let Remote Users Deny Service June 3, 2011 - 3:35pm Addthis PROBLEM: Wireshark Multiple Flaws Let Remote Users Deny Service PLATFORM: Wireshark Version(s): 1.2.0 to 1.2.16, 1.4.0 to 1.4.6 ABSTRACT: Multiple vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions. reference LINKS: wnpa-sec-2011-07 SecurityTracker Alert ID: 1025597 wnpa-sec-2011-08 IMPACT ASSESSMENT: High Discussion: A remote user can send specially crafted DICOM data, Visual Networks file, compressed capture data, snoop file, or Diameter dictionary file to cause the target service to crash or enter an infinite loop. Versions affected: 1.2.0 to 1.2.16 and 1.4.0 to 1.4.6.

197

V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Apple QuickTime Multiple Flaws Let Remote Users Execute 4: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code May 27, 2013 - 12:23am Addthis PROBLEM: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Apple QuickTime prior to 7.7.4. ABSTRACT: Apple QuickTime Multiple Vulnerabilities REFERENCE LINKS: Apple Article: HT5770 SecurityTracker Alert ID: 1028589 Secunia Advisory SA53520 CVE-2013-0986, CVE-2013-0987, CVE-2013-0988 CVE-2013-0989, CVE-2013-1015, CVE-2013-1016 CVE-2013-1017, CVE-2013-1018, CVE-2013-1019 CVE-2013-1020, CVE-2013-1021, CVE-2013-1022 IMPACT ASSESSMENT: High DISCUSSION: Multiple vulnerabilities have been reported in Apple QuickTime, which can be exploited by malicious people to compromise a user's system.

198

How Presentation Flaws Affect Perceived Site Quality, Trust, and Intention to Purchase from an Online Store  

Science Conference Proceedings (OSTI)

Although there has been a great deal of research on impression formation, little application of that research has been made to electronic commerce. A research model was constructed that hypothesized errors, poor style, and incompleteness to be inversely ... Keywords: Intention To Purchase, Trust In E-Commerce, Web Site Credibility, Web Site Presentation Flaws, Web Site Quality

Andrea Everard; Dennis F. Galletta

2006-01-01T23:59:59.000Z

199

Apparatus and method for detecting and/or measuring flaws in conductive material  

Science Conference Proceedings (OSTI)

The present invention uses a magnet and sensor coil unilaterial and in relative motion to a conductive material, to measure perturbation or variation in the magnetic field in the presence of a flaw. A liftoff compensator measures a distance between the conductive material and the magnet.

Hockey, Ronald L. (Richland, WA); Riechers, Douglas M. (Richland, WA)

2000-01-01T23:59:59.000Z

200

Two Dynamical Core Formulation Flaws Exposed by a Baroclinic Instability Test Case  

Science Conference Proceedings (OSTI)

Two flaws in the semi-Lagrangian algorithm originally implemented as an optional dynamical core in the NCAR Community Atmosphere Model (CAM3.1) are exposed by steady-state and baroclinic instability test cases. Remedies are demonstrated and have ...

David L. Williamson; Jerry G. Olson; Christiane Jablonowski

2009-02-01T23:59:59.000Z

Note: This page contains sample records for the topic "input validation flaw" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

205: RSA Access Manager Session Replay Flaw Lets Remote Users 205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System July 5, 2012 - 7:02am Addthis PROBLEM: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System PLATFORM: Version(s): Server version 6.0.x, 6.1, 6.1 SP1, 6.1 SP2, 6.1 SP3; all Agent versions ABSTRACT: A vulnerability was reported in RSA Access Manager. A remote user can gain access to the target system. reference LINKS: SecurityFocus ESA-2012-026 SecurityTracker Alert ID: 1027220 CVE-2012-2281 RSA SecurCare Online MPACT ASSESSMENT: Medium Discussion: RSA Access Manager contains a vulnerability that can be potentially exploited by a malicious user to replay the session with compromised session tokens. This is due to improper invalidation of session tokens

202

Groundwater Model Validation  

SciTech Connect

Models have an inherent uncertainty. The difficulty in fully characterizing the subsurface environment makes uncertainty an integral component of groundwater flow and transport models, which dictates the need for continuous monitoring and improvement. Building and sustaining confidence in closure decisions and monitoring networks based on models of subsurface conditions require developing confidence in the models through an iterative process. The definition of model validation is postulated as a confidence building and long-term iterative process (Hassan, 2004a). Model validation should be viewed as a process not an end result. Following Hassan (2004b), an approach is proposed for the validation process of stochastic groundwater models. The approach is briefly summarized herein and detailed analyses of acceptance criteria for stochastic realizations and of using validation data to reduce input parameter uncertainty are presented and applied to two case studies. During the validation process for stochastic models, a question arises as to the sufficiency of the number of acceptable model realizations (in terms of conformity with validation data). Using a hierarchical approach to make this determination is proposed. This approach is based on computing five measures or metrics and following a decision tree to determine if a sufficient number of realizations attain satisfactory scores regarding how they represent the field data used for calibration (old) and used for validation (new). The first two of these measures are applied to hypothetical scenarios using the first case study and assuming field data consistent with the model or significantly different from the model results. In both cases it is shown how the two measures would lead to the appropriate decision about the model performance. Standard statistical tests are used to evaluate these measures with the results indicating they are appropriate measures for evaluating model realizations. The use of validation data to constrain model input parameters is shown for the second case study using a Bayesian approach known as Markov Chain Monte Carlo. The approach shows a great potential to be helpful in the validation process and in incorporating prior knowledge with new field data to derive posterior distributions for both model input and output.

Ahmed E. Hassan

2006-01-24T23:59:59.000Z

203

Refinery and Blender Net Inputs  

Annual Energy Outlook 2012 (EIA)

Refinery and Blender Net Inputs Crude OIl ... 14.54 15.14 15.26 15.08 14.51 15.30 15.70 14.93 14.47 15.30 15.54 14.97 15.01...

204

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

can supply a specially crafted parameter value to execute SQL commands on the underlying database. http:energy.govcioarticlesu-195-phplist-input-validation-flaws-permit-cross...

205

Development of flaw evaluation and acceptance procedures for flaw indications in the cooling water system at the Savannah River Site K Reactor  

SciTech Connect

This paper describes the methodology used in determining the criteria for acceptance of inspection indications in the K-Reactor Cooling Water System at the Savannah River Plant. These criteria have been developed in a manner consistent with the development of similar criteria in the ASME Code Section 11 for commercial light water reactors, but with a realistic treatment of the operating conditions in the cooling water system. The technical basis for the development of these criteria called {open_quotes}Acceptance Standards{close_quotes} is contained in this paper. A second portion of this paper contains the methodology used in the construction of flaw evaluation charts which have been developed for each specific line size in the cooling water system. The charts provide the results of detailed fracture mechanics calculations which have been completed to determine the largest flaw which can be accepted in the cooling water system without repair. These charts are designed for use in conjunction with inservice inspections of the cooling water system, and only require inspection results to determine acceptability.

Tandon, S.; Bamford, W.H. [Westinghouse Electric Corp., Pittsburgh, PA (US); Cowfer, C.D.; Ostrowski, R. [Westinghouse Savannah River Co., Aiken, SC (US)

1993-06-01T23:59:59.000Z

206

Development of flaw evaluation and acceptance procedures for flaw indications in the cooling water system at the Savannah River Site K Reactor  

SciTech Connect

This paper describes the methodology used in determining the criteria for acceptance of inspection indications in the K-Reactor Cooling Water System at the Savannah River Plant. These criteria have been developed in a manner consistent with the development of similar criteria in the ASME Code Section 11 for commercial light water reactors, but with a realistic treatment of the operating conditions in the cooling water system. The technical basis for the development of these criteria called [open quotes]Acceptance Standards[close quotes] is contained in this paper. A second portion of this paper contains the methodology used in the construction of flaw evaluation charts which have been developed for each specific line size in the cooling water system. The charts provide the results of detailed fracture mechanics calculations which have been completed to determine the largest flaw which can be accepted in the cooling water system without repair. These charts are designed for use in conjunction with inservice inspections of the cooling water system, and only require inspection results to determine acceptability.

Tandon, S.; Bamford, W.H. (Westinghouse Electric Corp., Pittsburgh, PA (United States)); Cowfer, C.D.; Ostrowski, R. (Westinghouse Savannah River Co., Aiken, SC (United States))

1993-01-01T23:59:59.000Z

207

Detection and characterization of flaws in segments of light water reactor pressure vessels  

Science Conference Proceedings (OSTI)

Studies have been conducted to determine flaw density in segments cut from light water reactor (LWR) pressure vessels as part of the Oak Ridge National Laboratory's Heavy-Section Steel Technology (HSST) Program. Segments from the Hope Creek Unit 2 vessil and the Pilgrim Unit 2 Vessel were purchased from salvage dealers. Hope Creek was a boiling water reactor (BWR) design and Pilgrim was a pressurized water reactor (PWR) design. Neither were ever placed in service. Objectives were to evaluate these LWR segments for flaws with ultrasonic and liquid penetrant techniques. Both objectives were successfully completed. One significant indication was detected in a Hope Creek seam weld by ultrasonic techniques and characterized by further analyses terminating with destructive correlation. This indication (with a through-wall dimension of approx.6 mm (approx.0.24 in.)) was detected in only 3 m (10 ft) of weldment and offers extremely limited data when compared to the extent of welding even in a single pressure vessel. However, the detection and confirmation of the flaw in the arbitrarily selected sections implies the Marshall report estimates (and others) are nonconservative for such small flaws. No significant indications were detected in the Pilgrim material by ultrasonic techniques. Unfortunately, the Pilgrim segments contained relatively little weldment; thus, we limited our ultrasonic examinations to the cladding and subcladding regions. Fluorescent liquid penetrant inspection of the cladding surfaces for both LWR segments detected no significant indications (i.e., for a total of approximately 6.8 m/sup 2/ (72 ft/sup 2/) of cladding surface).

Cook, K.V.; Cunningham, R.A. Jr.; McClung, R.W.

1987-01-01T23:59:59.000Z

208

BWRVIP-139: Vessel and Internals Project, Steam Dryer Inspection and Flaw Evaluation Guidelines  

Science Conference Proceedings (OSTI)

This document provides steam dryer inspection and flaw evaluation guidelines consistent with those developed for other boiling water reactor (BWR) internal components. It includes (1) documentation of the steam dryer configurations for the different plants, (2) a summary of dryer cracking incidents based on field experience, (3) documentation of the regions of susceptibility for fatigue cracking and intergranular stress corrosion cracking (IGSCC), (4) a review of the failure modes and effects of cracking...

2005-04-01T23:59:59.000Z

209

Verification and validation benchmarks.  

SciTech Connect

Verification and validation (V&V) are the primary means to assess the accuracy and reliability of computational simulations. V&V methods and procedures have fundamentally improved the credibility of simulations in several high-consequence fields, such as nuclear reactor safety, underground nuclear waste storage, and nuclear weapon safety. Although the terminology is not uniform across engineering disciplines, code verification deals with assessing the reliability of the software coding, and solution verification deals with assessing the numerical accuracy of the solution to a computational model. Validation addresses the physics modeling accuracy of a computational simulation by comparing the computational results with experimental data. Code verification benchmarks and validation benchmarks have been constructed for a number of years in every field of computational simulation. However, no comprehensive guidelines have been proposed for the construction and use of V&V benchmarks. For example, the field of nuclear reactor safety has not focused on code verification benchmarks, but it has placed great emphasis on developing validation benchmarks. Many of these validation benchmarks are closely related to the operations of actual reactors at near-safety-critical conditions, as opposed to being more fundamental-physics benchmarks. This paper presents recommendations for the effective design and use of code verification benchmarks based on manufactured solutions, classical analytical solutions, and highly accurate numerical solutions. In addition, this paper presents recommendations for the design and use of validation benchmarks, highlighting the careful design of building-block experiments, the estimation of experimental measurement uncertainty for both inputs and outputs to the code, validation metrics, and the role of model calibration in validation. It is argued that the understanding of predictive capability of a computational model is built on the level of achievement in V&V activities, how closely related the V&V benchmarks are to the actual application of interest, and the quantification of uncertainties related to the application of interest.

Oberkampf, William Louis; Trucano, Timothy Guy

2007-02-01T23:59:59.000Z

210

Evaluation of Manual Ultrasonic Examinations Applied to Detect Flaws in Primary System Dissimilar Metal Welds at North Anna Power Station  

SciTech Connect

During a recent inservice inspection (ISI) of a dissimilar metal weld (DMW) in an inlet (hot leg) steam generator nozzle at North Anna Power Station Unit 1, several axially oriented flaws went undetected by the licensee's manual ultrasonic testing (UT) technique. The flaws were subsequently detected as a result of outside diameter (OD) surface machining in preparation for a full structural weld overlay. The machining operation uncovered the existence of two through-wall flaws, based on the observance of primary water leaking from the DMW. Further ultrasonic tests were then performed, and a total of five axially oriented flaws, classified as primary water stress corrosion cracking (PWSCC), were detected in varied locations around the weld circumference.

Anderson, Michael T.; Diaz, Aaron A.; Doctor, Steven R.

2012-06-01T23:59:59.000Z

211

U-111: IBM AIX ICMP Processing Flaw Lets Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

11: IBM AIX ICMP Processing Flaw Lets Remote Users Deny Service 11: IBM AIX ICMP Processing Flaw Lets Remote Users Deny Service U-111: IBM AIX ICMP Processing Flaw Lets Remote Users Deny Service February 27, 2012 - 6:27am Addthis PROBLEM: A vulnerability was reported in IBM AIX. A remote user can cause denial of service conditions. PLATFORM: version(s): 5.3, 6.1, and 7.1 ABSTRACT: A remote user can send a specially crafted ICMP packet to cause the target service to crash. reference LINKS: Vendor Advisory Security Tracker ID 1026742 CVE-2011-1385 IMPACT ASSESSMENT: Medium Discussion: There is an error in the handling of a particular ICMP packet in which a remote user can cause a denial of service. Impact: Denial of service on AIX via network. Solution: The vendor has issued a fix. 5.3.12: APAR IV03369 6.1.5: APAR IV13672 6.1.6: APAR IV13554

212

T-662: ISC BIND Packet Processing Flaw Lets Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: ISC BIND Packet Processing Flaw Lets Remote Users Deny 2: ISC BIND Packet Processing Flaw Lets Remote Users Deny Service T-662: ISC BIND Packet Processing Flaw Lets Remote Users Deny Service July 6, 2011 - 7:47am Addthis PROBLEM: A vulnerability was reported in ISC BIND. A remote user can cause denial of service conditions. PLATFORM: 9.6.3, 9.6-ESV-R4, 9.6-ESV-R4-P1, 9.6-ESV-R5b1 9.7.0, 9.7.0-P1, 9.7.0-P2, 9.7.1, 9.7.1-P1, 9.7.1-P2, 9.7.2, 9.7.2-P1, 9.7.2-P2, 9.7.2-P3, 9.7.3, 9.7.3-P1, 9.7.3-P2, 9.7.4b1 9.8.0, 9.8.0-P1, 9.8.0-P2, 9.8.0-P3, 9.8.1b1 ABSTRACT: A defect in the affected BIND 9 versions allows an attacker to remotely cause the "named" process to exit using a specially crafted packet. This defect affects both recursive and authoritative servers. The code location of the defect makes it impossible to protect BIND using ACLs configured

213

3430 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 61, NO. 8, OCTOBER 2012 Experimental Validation of High-Voltage-Ratio  

E-Print Network (OSTI)

Validation of High-Voltage-Ratio Low-Input-Current-Ripple Converters for Hybrid Fuel Cell Supercapacitor

Simões, Marcelo Godoy

214

V-198: Red Hat Enterprise MRG Messaging Qpid Python Certificate Validation  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Red Hat Enterprise MRG Messaging Qpid Python Certificate 8: Red Hat Enterprise MRG Messaging Qpid Python Certificate Validation Flaw Lets Remote Users Conduct Man-in-the-Middle Attacks V-198: Red Hat Enterprise MRG Messaging Qpid Python Certificate Validation Flaw Lets Remote Users Conduct Man-in-the-Middle Attacks July 12, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Red Hat Enterprise MRG Messaging. PLATFORM: Red Hat Enterprise MRG v2 for Red Hat Enterprise Linux (version 6) ABSTRACT: A remote user can conduct a man-in-the-middle attack to access potentially sensitive information REFERENCE LINKS: SecurityTracker Alert ID: 1028774 Redhat Advisory RHSA-2013:1024-1 CVE-2013-1909 IMPACT ASSESSMENT: Medium DISCUSSION: The system does not properly validate the remote server's TLS/SSL certificates. A remote user can conduct a man-in-the-middle attack to

215

Table 8. Capacity and Fresh Feed Input to Selected Downstream ...  

U.S. Energy Information Administration (EIA)

Capacity Inputs CapacityInputs Capacity Inputs Table 8. ... (EIA) Form EIA-820, "Annual Refinery Report." Inputs are from the form EIA-810, "Monthly Refinery Report."

216

DOE-2 Input File From WINDOW  

NLE Websites -- All DOE Office Websites (Extended Search)

an EnergyPlus input file from WINDOW 5 Last update: 12232008 01:54 PM Creating an EnergyPlus Input File for One Window In the WINDOW Window Library, which defines a complete...

217

DOE-2 Input File From WINDOW  

NLE Websites -- All DOE Office Websites (Extended Search)

a DOE2 input file from WINDOW 5 Last update: 02012008 01:19 PM Creating a DOE-2 Input File for One Window In the WINDOW Window Library, which defines a complete window including...

218

Model Validation  

Science Conference Proceedings (OSTI)

...thus establishing appropriate and important benchmarks. Benchmarking can go beyond validation and also measure relative computational speed, accuracy, and breadth for available modeling approaches and implementations, providing valuable information for users to discern the best models and for modelers...

219

A Flaw Tolerance Approach to Address Reactor Vessel Head Penetration Cracking Issue  

SciTech Connect

Nickel-based alloys and the associated welds are susceptible to Primary Water Stress Corrosion Cracking. In Pressurized Water Reactor nuclear power plants, the reactor vessel closure head upper penetration nozzles used for the Control Rod Drive Mechanisms and other instrumentation systems are made of such nickel-based alloys. Cracking and leakage have been observed in the upper head penetration nozzles in nuclear power plants worldwide. Such cracking and the resulting leakage is a degradation of the reactor vessel pressure boundary. Regulatory requirements have been issued by the Nuclear Regulatory Commission regarding periodic inspection of the susceptible areas to enable detection of indications and provide reasonable assurance of continued structural integrity for reactor vessel closure head. A flaw tolerance approach has been used in the disposition of detected indications to minimize outage delays, by performing up-front fracture mechanics evaluations for the common types of indications detected in the susceptible areas. Details of the flaw tolerance approach are presented in this paper. (authors)

Ng, C. K.; Jirawongkraisorn, S.; Swamy, S. [Westinghouse Electric Company, LLC, Nuclear Services Division, P. O. Box 158, Madison, PA 15663 (United States)

2006-07-01T23:59:59.000Z

220

BISON Validation | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Validation Validation BISON Validation January 29, 2013 - 11:54am Addthis BISON Validation Predictive Maturity Work continued on the previously developed discovery, accumulation, and assessment (DAA) process to plan, track, assess, and communicate VU activities and results. DAA was applied to the BISON sensitivity analysis described above, and the results were exported to Synopsis, the DAA management tool. [SNL, LANL, INL] Building on previous sensitivity studies of the LIFE-IV nuclear fuels code, a recently completed VU study focused on a methodology by which experimental campaigns may be devised to improve code calibration. Specifically, a principal component analysis is performed on the input parameters of the experiments, and the experiments that offer the least residual error when reconstructed from the principal components are

Note: This page contains sample records for the topic "input validation flaw" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Yankee Rowe simulator core model validation  

Science Conference Proceedings (OSTI)

This paper presents the validation of the Yankee Rowe simulator core model. Link-Miles Simulation Corporation is developing the Yankee Rowe simulator and Yankee Atomic Electric Company is involved in input and benchmark data generation, as well as simulator validation. Core model validation by Yankee comprises three tasks: (1) careful generation of fuel reactivity characteristics (B constants); (2) nonintegrated core model testing; and (3) fully integrated core model testing. Simulator core model validation and verification is a multistage process involving input and benchmark data generation as well as interactive debugging. Core characteristics were brought within acceptable criteria by this process. This process was achieved through constant communication between Link-Miles and Yankee engineers. Based on this validation, the Yankee Rowe simulator core model is found to be acceptable for training purposes.

Napolitano, M.E.

1990-01-01T23:59:59.000Z

222

EOS Land Validation Project  

NLE Websites -- All DOE Office Websites (Extended Search)

EOS Land Validation The EOS Land Validation Project Overview EOS Land Validation Logo The objective of the EOS Land Validation Project is to achieve consistency, completeness,...

223

Energy Input Output Calculator | Open Energy Information  

Open Energy Info (EERE)

Input Output Calculator Input Output Calculator Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Energy Input-Output Calculator Agency/Company /Organization: Department of Energy Sector: Energy Focus Area: Energy Efficiency Resource Type: Online calculator User Interface: Website Website: www2.eere.energy.gov/analysis/iocalc/Default.aspx Web Application Link: www2.eere.energy.gov/analysis/iocalc/Default.aspx OpenEI Keyword(s): Energy Efficiency and Renewable Energy (EERE) Tools Language: English References: EERE Energy Input-Output Calculator[1] The Energy Input-Output Calculator (IO Calculator) allows users to estimate the economic development impacts from investments in alternate electricity generating technologies. About the Calculator The Energy Input-Output Calculator (IO Calculator) allows users to estimate

224

Input apparatus for dynamic signature verification systems  

DOE Patents (OSTI)

The disclosure relates to signature verification input apparatus comprising a writing instrument and platen containing piezoelectric transducers which generate signals in response to writing pressures.

EerNisse, Errol P. (Albuquerque, NM); Land, Cecil E. (Albuquerque, NM); Snelling, Jay B. (Albuquerque, NM)

1978-01-01T23:59:59.000Z

225

In-service Inspection Ultrasonic Testing of Reactor Pressure Vessel Welds for Assessing Flaw Density and Size Distribution per 10 CFR 50.61a, Alternate Fracture Toughness Requirements  

SciTech Connect

Pressurized thermal shock (PTS) events are system transients in a pressurized water reactor (PWR) in which there is a rapid operating temperature cool-down that results in cold vessel temperatures with or without repressurization of the vessel. The rapid cooling of the inside surface of the reactor pressure vessel (RPV) causes thermal stresses that can combine with stresses caused by high pressure. The aggregate effect of these stresses is an increase in the potential for fracture if a pre-existing flaw is present in a material susceptible to brittle failure. The ferritic, low alloy steel of the reactor vessel beltline adjacent to the core, where neutron radiation gradually embrittles the material over the lifetime of the plant, can be susceptible to brittle fracture. The PTS rule, described in the Code of Federal Regulations, Title 10, Section 50.61 (50.61), Fracture Toughness Requirements for Protection against Pressurized Thermal Shock Events, adopted on July 23, 1985, establishes screening criteria to ensure that the potential for a reactor vessel to fail due to a PTS event is deemed to be acceptably low. The U.S. Nuclear Regulatory Commission (NRC) completed a research program that concluded that the risk of through-wall cracking due to a PTS event is much lower than previously estimated. The NRC subsequently developed a rule, 50.61a, published on January 4, 2010, entitled Alternate Fracture Toughness Requirements for Protection Against Pressurized Thermal Shock Events (75 FR 13). Use of the new rule by licensees is optional. The 50.61a rule differs from 50.61 in that it requires licensees who choose to follow this alternate method to analyze the results from periodic volumetric examinations required by the ASME Code, Section XI, Rules for Inservice Inspection (ISI) of Nuclear Power Plants. These analyses are intended to determine if the actual flaw density and size distribution in the licensees reactor vessel beltline welds are bounded by the flaw density and size distribution values used in the PTS technical basis. Under a contract with the NRC, Pacific Northwest National Laboratory (PNNL) has been working on a program to assess the ability of current inservice inspection (ISI)-ultrasonic testing (UT) techniques, as qualified through ASME Code, Appendix VIII, Supplements 4 and 6, to detect small fabrication or inservice-induced flaws located in RPV welds and adjacent base materials. As part of this effort, the investigators have pursued an evaluation, based on the available information, of the capability of UT to provide flaw density/distribution inputs for making RPV weld assessments in accordance with 50.61a. This paper presents the results of an evaluation of data from the 1993 Browns Ferry Nuclear Plant, Unit 3, Spirit of Appendix VIII reactor vessel examination, a comparison of the flaw density/distribution from this data with the distribution in 50.61a, possible reasons for differences, and plans and recommendations for further work in this area.

Sullivan, Edmund J.; Anderson, Michael T.; Norris, Wallace

2012-09-17T23:59:59.000Z

226

Deriving input syntactic structure from execution  

Science Conference Proceedings (OSTI)

Program input syntactic structure is essential for a wide range of applications such as test case generation, software debugging and network security. However, such important information is often not available (e.g., most malware programs make use of ... Keywords: bottom-up grammar, control dependence, input lineage, reverse engineering, syntax tree, top-down grammar

Zhiqiang Lin; Xiangyu Zhang

2008-11-01T23:59:59.000Z

227

U.S. Weekly Inputs & Utilization  

U.S. Energy Information Administration (EIA)

Crude Oil Inputs: 16,237: 16,031: 15,965: 15,893: 15,611: 15,845: 1982-2013: Gross Inputs: 16,539: 16,448: 16,257: 16,200: 15,927: 16,209: 1990-2013: Operable ...

228

Designating required vs. optional input fields  

Science Conference Proceedings (OSTI)

This paper describes a study comparing different techniques for visually distingishing required from optional input fields in a form-filling application. Seven techniques were studied: no indication, bold field labels, chevrons in front of the labels, ... Keywords: data input, optional fields, required fields, visual design

Thomas S. Tullis; Ana Pons

1997-03-01T23:59:59.000Z

229

Serious Flaws in Korf et al.'s Analysis on Time Complexity of A*  

E-Print Network (OSTI)

Understanding the effect of a heuristic on the time complexity of the well-known A* search algorithm has been a subject of a large research body in AI. Among those researches is Korf et al.'s analysis (Korf & Reid, 1998; Korf et al., 2001; Korf, 2000a; Korf, 2000b), which concluded that the effect of a heuristic is to reduce the effective depth rather than effective branching factor. Since this conclusion conflicts with both previous analysis and recent analysis by other authors, we try to investigate the causes of such contradictions and finally find out that Korf et al.'s analysis has many serious flaws from which their main conclusion was drawn.

Dinh, Hang

2008-01-01T23:59:59.000Z

230

SWAT 2012 Input/Output Documentation  

E-Print Network (OSTI)

The Soil and Water Assessment Tool (SWAT) is a comprehensive model that requires a diversity of information in order to run. Novice users may feel overwhelmed by the variety and number of inputs when they first begin to use the model. This document provides a full description of model inputs. The inputs are organized by topic and emphasis is given to differentiating required inputs from optional inputs. The first chapter focuses on assisting the user in identifying inputs that must be defined for their particular dataset. The remaining chapters list variables by file and discuss methods used to measure or calculate values for the input parameters. SWAT is a public domain model jointly developed by USDA Agricultural Research Service (USDA-ARS) and Texas A&M AgriLife Research, part of The Texas A&M University System. SWAT is a small watershed to river basin-scale model to simulate the quality and quantity of surface and ground water and predict the environmental impact of land use, land management practices, and climate change. SWAT is widely used in assessing soil erosion prevention and control, non-point source pollution control and regional management in watersheds. Download the SWAT model, or read more information at the SWAT website.

Arnold, J.G.; Kiniry, J.R.; Srinivasan, R.; Williams, J.R.; Haney, E.B.; Neitsch, S.L.

2013-03-04T23:59:59.000Z

231

National Climate Assessment: Available Technical Inputs  

NLE Websites -- All DOE Office Websites (Extended Search)

Available Technical Inputs Print E-mail Available Technical Inputs Print E-mail Technical inputs for the 2013 National Climate Assessment were due March 1, 2012. Please note that these reports were submitted independently to the National Climate Assessment for consideration and have not been reviewed by the National Climate Assessment Development and Advisory Committee. Links to agency-sponsored reports will be posted here as they are made available. Sectors National Climate Assessment Health Sector Literature Review and Bibliography. Technical Input for the Interagency Climate Change and Human Health Group, September 2012. Overview Bibliography Bibliography User's Guide Search Strategy and Results Walthall et al. 2012. Climate Change and Agriculture in the United States: Effects and Adaptation. USDA Technical Bulletin 1935. Washington, DC. 186 pages. | Report FAQs

232

Wind Energy Input to the Ekman Layer  

Science Conference Proceedings (OSTI)

Wind stress energy input through the surface ageostrophic currents is studied. The surface ageostrophic velocity is calculated using the classical formula of the Ekman spiral, with the Ekman depth determined from an empirical formula. The total ...

Wei Wang; Rui Xin Huang

2004-05-01T23:59:59.000Z

233

Identifying Steam Opportunity "Impact" Inputs for the Steam System Assessment Tool (SSAT)  

E-Print Network (OSTI)

The U.S. DOE BestPractices Steam "Steam System Assessment Tool" (SSAT) is a powerful tool for quantifying potential steam improvement opportunities in steam systems. However, all assessment tools are only as good as the validity of the modeling inputs.

Harrell, G.; Jendrucko, R.; Wright, A.

2004-01-01T23:59:59.000Z

234

T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

validate remote certificates and may ignore that a system root certificate has been disabled and incorrectly accept certificates signed by that root server CVE-2011-0214. On...

235

Non-destructive evaluation means and method of flaw reconstruction utilizing an ultrasonic multi-viewing transducer data acquistion system  

DOE Patents (OSTI)

A multi-viewing ultrasound transducer acquisition system for non-destructive evaluation, flaw detection and flaw reconstruction in materials. A multiple transducer assembly includes a central transducer surrounded by a plurality of perimeter transducers, each perimeter transducer having an axis of transmission which can be angularly oriented with respect to the axis of transmission of the central transducer to intersect the axis of transmission of the central transducer. A control apparatus automatically and remotely positions the transducer assembly with respect to the material by a positioning apparatus and adjusts the pe GRANT REFERENCE This invention was conceived and reduced to practice at least in part under a grant from the Department of Energy under Contract No. W-7407-ENG-82.

Thompson, Donald O. (Ames, IA); Wormley, Samuel J. (Ames, IA)

1989-03-28T23:59:59.000Z

236

HMAC Validation List  

Science Conference Proceedings (OSTI)

Keyed-Hash Message Authentication Code (HMAC) Validation List. Last Update: 11/15/2013. HMAC Validation List. Overview. ...

237

Neural Network Input Representations that Produce Accurate Consensus Sequences from DNA Fragment Assemblies  

E-Print Network (OSTI)

Motivation: Given inputs extracted from an aligned column of DNA bases and the underlying Perkin Elmer Applied Biosystems (ABI) fluorescent traces, our goal is to train a neural network to correctly determine the consensus base for the column. Choosing an appropriate network input representation is critical to success in this task. We empirically compare five representations; one uses only base calls and the others include trace information. Results: We attained the most accurate results from networks that incorporate trace information into their input representations. Based on estimates derived from using 10-fold cross-validation, the best network topology produces consensus accuracies ranging from 99.26% to over 99.98% for coverages from two to six aligned sequences. With a coverage of six, it makes only three errors in 20,000 consensus calls. In contrast, the network that only uses base calls in its input representation has over double that error rate -- eight errors in 20,000 cons...

C.F. Allex; J.W. Shavlik; F.R. Blattner

1999-01-01T23:59:59.000Z

238

BWRVIP-18, Revision 1-A: BWR Vessel and Internals Project, BWR Core Spray Internals Inspection and Flaw Evaluation Guidelines  

Science Conference Proceedings (OSTI)

The Boiling Water Reactor Vessel and Internals Project (BWRVIP), formed in June 1994, is an association of utilities focused exclusively on boiling water reactor (BWR) vessel and internals issues. This BWRVIP report contains generic guidelines that describe locations on the core spray piping and spargers for which inspection is needed, categories of plants for which inspection needs would differ, extent of inspection and reinspection for each location, and flaw evaluation procedures to determine ...

2012-04-09T23:59:59.000Z

239

Total Blender Net Input of Petroleum Products  

U.S. Energy Information Administration (EIA) Indexed Site

Input Input Product: Total Input Natural Gas Plant Liquids and Liquefied Refinery Gases Pentanes Plus Liquid Petroleum Gases Normal Butane Isobutane Other Liquids Oxygenates/Renewables Methyl Tertiary Butyl Ether (MTBE) Renewable Fuels (incl. Fuel Ethanol) Fuel Ethanol Renewable Diesel Fuel Other Renewable Fuels Unfinished Oils (net) Unfinished Oils, Naphthas and Lighter Unfinished Oils, Kerosene and Light Gas Oils Unfinished Oils, Heavy Gas Oils Residuum Motor Gasoline Blending Components (MGBC) (net) MGBC - Reformulated MGBC - Reformulated - RBOB MGBC - Reformulated, RBOB for Blending w/ Alcohol MGBC - Reformulated, RBOB for Blending w/ Ether MGBC - Reformulated, GTAB MGBC - Conventional MGBC - Conventional, CBOB MGBC - Conventional, GTAB MGBC - Other Conventional Period-Unit: Monthly-Thousand Barrels Monthly-Thousand Barrels per Day Annual-Thousand Barrels Annual-Thousand Barrels per Day

240

Opportunities for Public Input Into DOE Projects  

NLE Websites -- All DOE Office Websites (Extended Search)

Opportunities for Public Input Into DOE Projects Opportunities for Public Input Into DOE Projects There are currently several DOE-proposed activities that citizens can comment on in the near future. Here is a summary of each, as well as a description of how to provide your input into the project: Hanford Draft Closure and Waste Management Environmental Impact Statement Idahoans might be interested in this document because one of the proposed actions involves sending a small amount of radioactive waste (approximately 5 cubic meters of special reactor components) to the Idaho Nuclear Technology and Engineering Center on DOE's Idaho Site for treatment. Here is a link to more information about the document: http://www.hanford.gov . A public hearing on the draft EIS will be held in Boise on Tuesday, Feb. 2 at the Owyhee Plaza Hotel. It begins at 6 p.m.

Note: This page contains sample records for the topic "input validation flaw" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

71 - 28580 of 31,917 results. 71 - 28580 of 31,917 results. Article T-701: Citrix Access Gateway Enterprise Edition Input Validation Flaw in Logon Portal Permits Cross-Site Scripting Attacks Citrix Access Gateway Enterprise Edition Input Validation Flaw in Logon Portal Permits Cross-Site Scripting Attacks. http://energy.gov/cio/articles/t-701-citrix-access-gateway-enterprise-edition-input-validation-flaw-logon-portal Article T-650: Microsoft Word Unspecified Flaw Lets Remote Users Execute Arbitrary Code Microsoft Word Unspecified Flaw Lets Remote Users Execute Arbitrary Code. http://energy.gov/cio/articles/t-650-microsoft-word-unspecified-flaw-lets-remote-users-execute-arbitrary-code Article IRS Announces New Tribal Economic Development Bond Allocation Guidance Treasury and the IRS published new guidance today allocating Tribal

242

PUBLIC INFORMATION AND INPUT ON WIPP  

E-Print Network (OSTI)

PUBLIC INFORMATION AND INPUT ON WIPP Get The Information You Need 1. Check the EPA Website, Fact Sheets and Issue Papers. EPA will make sure that key information is available on its WIPP Website. EPA the EPA WIPP Information Line at 1-800-331-WIPP (1-800-331-9477) to obtain information on upcoming events

243

Gravity Transform for Input Conditioning in  

E-Print Network (OSTI)

Gravity Transform for Input Conditioning in Brain Machine Interfaces António R. C. Paiva, José C. Motivation 2. Methods i. Gravity Transform ii. Modeling and output sensitivity analysis 3. Data Analysis #12;3 Outline 1. Motivation 2. Methods i. Gravity Transform ii. Modeling and output sensitivity analysis 3. Data

Paiva, António R. C.

244

Wind Energy Input to the Surface Waves  

Science Conference Proceedings (OSTI)

Wind energy input into the ocean is primarily produced through surface waves. The total rate of this energy source, integrated over the World Ocean, is estimated at 60 TW, based on empirical formulas and results from a numerical model of surface ...

Wei Wang; Rui Xin Huang

2004-05-01T23:59:59.000Z

245

Hydrogen Generation Rate Model Calculation Input Data  

DOE Green Energy (OSTI)

This report documents the procedures and techniques utilized in the collection and analysis of analyte input data values in support of the flammable gas hazard safety analyses. This document represents the analyses of data current at the time of its writing and does not account for data available since then.

KUFAHL, M.A.

2000-04-27T23:59:59.000Z

246

Repeat on input for data flow computers  

DOE Patents (OSTI)

A processing node for a data flow parallel processing computer is activated by an input token from the system. The token or the stored information in the node includes information to cause the node to repeat a specified sequence of operations upon initiation by the token, thereby increasing the efficiency system for some computing operations.

Grafe, V.G.; Hoch, J.E.

1989-12-27T23:59:59.000Z

247

Multiple Input Microcantilever Sensor with Capacitive Readout  

DOE Green Energy (OSTI)

A surface-micromachined MEMS process has been used to demonstrate multiple-input chemical sensing using selectively coated cantilever arrays. Combined hydrogen and mercury-vapor detection was achieved with a palm-sized, self-powered module with spread-spectrum telemetry reporting.

Britton, C.L., Jr.; Brown, G.M.; Bryan, W.L.; Clonts, L.G.; DePriest, J.C.; Emergy, M.S.; Ericson, M.N.; Hu, Z.; Jones, R.L.; Moore, M.R.; Oden, P.I.; Rochelle, J.M.; Smith, S.F.; Threatt, T.D.; Thundat, T.; Turner, G.W.; Warmack, R.J.; Wintenberg, A.L.

1999-03-11T23:59:59.000Z

248

On the Input Problem for Massive Modularity  

Science Conference Proceedings (OSTI)

Jerry Fodor argues that the massive modularity thesis -- the claim that (human) cognition is wholly served by domain specific, autonomous computational devices, i.e., modules -- is a priori ... Keywords: Fodor, Sperber, input problem, language faculty, massive modularity, theory of mind

J. Collins

2005-02-01T23:59:59.000Z

249

Evaluating capacitive touch input on clothes  

Science Conference Proceedings (OSTI)

Wearable computing and smart clothing have attracted a lot of attention in the last years. For a variety of applications, it can be seen as potential future direction of mobile user interfaces. In this paper, we concentrate on usability and applicability ... Keywords: capacitive touch, design guidelines, input on textiles, wearable controls

Paul Holleis; Albrecht Schmidt; Susanna Paasovaara; Arto Puikkonen; Jonna Hkkil

2008-09-01T23:59:59.000Z

250

DOE Seeks Input On Addressing Contractor Pension and Medical...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Seeks Input On Addressing Contractor Pension and Medical Benefits Liabilities DOE Seeks Input On Addressing Contractor Pension and Medical Benefits Liabilities March 27, 2007 -...

251

USDA, Departments of Energy and Navy Seek Input from Industry...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Departments of Energy and Navy Seek Input from Industry to Advance Biofuels for Military and Commercial Transportation USDA, Departments of Energy and Navy Seek Input from Industry...

252

Documentation of Calculation Methodology, Input Data, and Infrastructu...  

NLE Websites -- All DOE Office Websites (Extended Search)

Documentation of Calculation Methodology, Input Data, and Infrastructure for the Home Energy Saver Web Site Title Documentation of Calculation Methodology, Input Data, and...

253

Multimodal interfaces with voice and gesture input  

SciTech Connect

The modalities of speech and gesture have different strengths and weaknesses, but combined they create synergy where each modality corrects the weaknesses of the other. We believe that a multimodal system such a one interwining speech and gesture must start from a different foundation than ones which are based solely on pen input. In order to provide a basis for the design of a speech and gesture system, we have examined the research in other disciplines such as anthropology and linguistics. The result of this investigation was a taxonomy that gave us material for the incorporation of gestures whose meanings are largely transparent to the users. This study describes the taxonomy and gives examples of applications to pen input systems.

Milota, A.D.; Blattner, M.M.

1995-07-20T23:59:59.000Z

254

Land Validation web site  

NLE Websites -- All DOE Office Websites (Extended Search)

web site A web site is now available for the Land Validation project. It was created with the purpose of facilitating communication among MODIS Land Validation Principal...

255

East Coast (PADD 1) Gross Inputs to Atmospheric Crude Oil ...  

U.S. Energy Information Administration (EIA)

East Coast (PADD 1) Gross Inputs to Atmospheric Crude Oil Distillation Units (Thousand Barrels per Day)

256

Rocky Mountains (PADD 4) Gross Inputs to Refineries (Thousand ...  

U.S. Energy Information Administration (EIA)

Gross Input to Atmospheric Crude Oil Distillation Units ; PAD District 4 Refinery Utilization and Capacity ...

257

Refining District New Mexico Gross Inputs to Atmospheric Crude Oil ...  

U.S. Energy Information Administration (EIA)

Refining District New Mexico Gross Inputs to Atmospheric Crude Oil Distillation Units (Thousand Barrels per Day)

258

NASA Land Validation Campaign Data  

NLE Websites -- All DOE Office Websites (Extended Search)

Products > Validation NASA Land Validation Campaign Data Land Validation Campaigns The goal of the EOS Validation Program is the comprehensive assessment of all EOS science data...

259

Ground motion input in seismic evaluation studies  

Science Conference Proceedings (OSTI)

This report documents research pertaining to conservatism and variability in seismic risk estimates. Specifically, it examines whether or not artificial motions produce unrealistic evaluation demands, i.e., demands significantly inconsistent with those expected from real earthquake motions. To study these issues, two types of artificial motions are considered: (a) motions with smooth response spectra, and (b) motions with realistic variations in spectral amplitude across vibration frequency. For both types of artificial motion, time histories are generated to match target spectral shapes. For comparison, empirical motions representative of those that might result from strong earthquakes in the Eastern U.S. are also considered. The study findings suggest that artificial motions resulting from typical simulation approaches (aimed at matching a given target spectrum) are generally adequate and appropriate in representing the peak-response demands that may be induced in linear structures and equipment responding to real earthquake motions. Also, given similar input Fourier energies at high-frequencies, levels of input Fourier energy at low frequencies observed for artificial motions are substantially similar to those levels noted in real earthquake motions. In addition, the study reveals specific problems resulting from the application of Western U.S. type motions for seismic evaluation of Eastern U.S. nuclear power plants.

Sewell, R.T.; Wu, S.C.

1996-07-01T23:59:59.000Z

260

Development of MELCOR Input Techniques for High Temperature Gas-Cooled Reactor Analysis  

E-Print Network (OSTI)

High Temperature Gas-cooled Reactors (HTGRs) can provide clean electricity,as well as process heat that can be used to produce hydrogen for transportation and other sectors. A prototypic HTGR, the Next Generation Nuclear Plant (NGNP),will be built at Idaho National Laboratory.The need for HTGR analysis tools and methods has led to the addition of gas-cooled reactor (GCR) capabilities to the light water reactor code MELCOR. MELCOR will be used by the Nuclear Regulatory Commission licensing of the NGNP and other HTGRs. In the present study, new input techniques have been developed for MELCOR HTGR analysis. These new techniques include methods for modeling radiation heat transfer between solid surfaces in an HTGR, calculating fuel and cladding geometric parameters for pebble bed and prismatic block-type HTGRs, and selecting appropriate input parameters for the reflector component in MELCOR. The above methods have been applied to input decks for a water-cooled reactor cavity cooling system (RCCS); the 400 MW Pebble Bed Modular Reactor (PBMR), the input for which is based on a code-to-code benchmark activity; and the High Temperature Test Facility (HTTF), which is currently in the design phase at Oregon State University. RCCS results show that MELCOR accurately predicts radiation heat transfer rates from the vessel but may overpredict convective heat transfer rates and RCCS coolant flow rates. PBMR results show that thermal striping from hot jets in the lower plenum during steady-state operations, and in the upper plenum during a pressurized loss of forced cooling accident, may be a major design concern. Hot jets could potentially melt control rod drive mechanisms or cause thermal stresses in plenum structures. For the HTTF, results will provide data to validate MELCOR for HTGR analyses. Validation will be accomplished by comparing results from the MELCOR representation of the HTTF to experimental results from the facility. The validation process can be automated using a modular code written in Python, which is described here.

Corson, James

2010-05-01T23:59:59.000Z

Note: This page contains sample records for the topic "input validation flaw" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

On the Wind Power Input to the Ocean General Circulation  

Science Conference Proceedings (OSTI)

The wind power input to the ocean general circulation is usually calculated from the time-averaged wind products. Here, this wind power input is reexamined using available observations, focusing on the role of the synoptically varying wind. Power ...

Xiaoming Zhai; Helen L. Johnson; David P. Marshall; Carl Wunsch

2012-08-01T23:59:59.000Z

262

On the Wind Power Input to the Ocean General Circulation  

E-Print Network (OSTI)

The wind power input to the ocean general circulation is usually calculated from the time-averaged wind products. Here, this wind power input is reexamined using available observations, focusing on the role of the synoptically ...

Zhai, Xiaoming

263

Wisconsin Natural Gas Input Supplemental Fuels (Million Cubic...  

Annual Energy Outlook 2012 (EIA)

Input Supplemental Fuels (Million Cubic Feet) Wisconsin Natural Gas Input Supplemental Fuels (Million Cubic Feet) Decade Year-0 Year-1 Year-2 Year-3 Year-4 Year-5 Year-6 Year-7...

264

Vermont Natural Gas Input Supplemental Fuels (Million Cubic Feet...  

Gasoline and Diesel Fuel Update (EIA)

Input Supplemental Fuels (Million Cubic Feet) Vermont Natural Gas Input Supplemental Fuels (Million Cubic Feet) Decade Year-0 Year-1 Year-2 Year-3 Year-4 Year-5 Year-6 Year-7...

265

Estimation of time-dependent input from neuronal membrane potential  

Science Conference Proceedings (OSTI)

The set of firing rates of the presynaptic excitatory and inhibitory neurons constitutes the input signal to the postsynaptic neuron. Estimation of the time-varying input rates from intracellularly recorded membrane potential is investigated here. For ...

Ryota Kobayashi; Shigeru Shinomoto; Petr Lansky

2011-12-01T23:59:59.000Z

266

New Mexico Natural Gas Input Supplemental Fuels (Million Cubic...  

Gasoline and Diesel Fuel Update (EIA)

Input Supplemental Fuels (Million Cubic Feet) New Mexico Natural Gas Input Supplemental Fuels (Million Cubic Feet) Decade Year-0 Year-1 Year-2 Year-3 Year-4 Year-5 Year-6 Year-7...

267

Texas Natural Gas Input Supplemental Fuels (Million Cubic Feet...  

Gasoline and Diesel Fuel Update (EIA)

Input Supplemental Fuels (Million Cubic Feet) Texas Natural Gas Input Supplemental Fuels (Million Cubic Feet) Decade Year-0 Year-1 Year-2 Year-3 Year-4 Year-5 Year-6 Year-7 Year-8...

268

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

August 29, 2011 August 29, 2011 T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password RSA enVision lets remote users view files and remote authenticated users obtain password. August 25, 2011 T-701: Citrix Access Gateway Enterprise Edition Input Validation Flaw in Logon Portal Permits Cross-Site Scripting Attacks Citrix Access Gateway Enterprise Edition Input Validation Flaw in Logon Portal Permits Cross-Site Scripting Attacks. August 22, 2011 T-698: Adobe ColdFusion Input Validation Flaw in 'probe.cfm' Permits Cross-Site Scripting Attacks Adobe ColdFusion Input Validation Flaw in 'probe.cfm' Permits Cross-Site Scripting Attacks. August 17, 2011 T-695: Avaya Aura Application Server Buffer Overflow in 'cstore.exe' Lets Remote Users Execute Arbitrary Code

269

A survey of design issues in spatial input  

Science Conference Proceedings (OSTI)

We present a survey of design issues for developing effective free-space three-dimensional (3D) user interfaces. Our survey is based upon previous work in 3D interaction, our experience in developing free-space interfaces, and our informal observations ... Keywords: 3D interaction, ergonomics of virtual manipulation, haptic input, spatial input, two-handed input, virtual reality

Ken Hinckley; Randy Pausch; John C. Goble; Neal F. Kassell

1994-11-01T23:59:59.000Z

270

U.S. Blender Net Input  

U.S. Energy Information Administration (EIA) Indexed Site

2007 2008 2009 2010 2011 2012 View 2007 2008 2009 2010 2011 2012 View History Total Input 1,184,435 1,522,193 1,850,204 2,166,784 2,331,109 2,399,318 2005-2012 Natural Gas Plant Liquids and Liquefied Refinery Gases 3,445 5,686 6,538 7,810 10,663 2008-2012 Pentanes Plus 2,012 474 1,808 1,989 2,326 4,164 2005-2012 Liquid Petroleum Gases 2,971 3,878 4,549 5,484 6,499 2008-2012 Normal Butane 2,943 2,971 3,878 4,549 5,484 6,499 2005-2012 Isobutane 2005-2006 Other Liquids 1,518,748 1,844,518 2,160,246 2,323,299 2,388,655 2008-2012 Oxygenates/Renewables 234,047 274,974 286,837 295,004 2009-2012 Methyl Tertiary Butyl Ether (MTBE) 2005-2006 Renewable Fuels (incl. Fuel Ethanol) 234,047 274,974 286,837 295,004 2009-2012 Fuel Ethanol 131,810 182,772 232,677 273,107 281,507 287,433 2005-2012

271

U.S. Blender Net Input  

U.S. Energy Information Administration (EIA) Indexed Site

Apr-13 May-13 Jun-13 Jul-13 Aug-13 Sep-13 View Apr-13 May-13 Jun-13 Jul-13 Aug-13 Sep-13 View History Total Input 206,541 217,867 212,114 216,075 219,783 208,203 2005-2013 Natural Gas Plant Liquids and Liquefied Refinery Gases 891 352 376 196 383 1,397 2008-2013 Pentanes Plus 261 301 313 67 287 393 2005-2013 Liquid Petroleum Gases 630 51 63 129 96 1,004 2008-2013 Normal Butane 630 51 63 129 96 1,004 2005-2013 Isobutane 2005-2006 Other Liquids 205,650 217,515 211,738 215,879 219,400 206,806 2008-2013 Oxygenates/Renewables 25,156 26,576 26,253 26,905 27,788 25,795 2009-2013 Methyl Tertiary Butyl Ether (MTBE) 2005-2006 Renewable Fuels (incl. Fuel Ethanol) 25,156 26,576 26,253 26,905 27,788 25,795 2009-2013 Fuel Ethanol 24,163 25,526 24,804 25,491 25,970 24,116 2005-2013

272

Field Testing: Independent, Accredited Testing and Validation for the Wind Industry (Fact Sheet)  

DOE Green Energy (OSTI)

This fact sheet describes the field testing capabilities at the National Wind Technology Center (NWTC). NREL's specialized facilities and personnel at the NWTC provide the U.S. wind industry with scientific and engineering support that has proven critical to the development of wind energy for U.S. energy needs. The NWTC's specialized field-testing capabilities have evolved over 30 years of continuous support by the U.S. Department of Energy Wind and Hydropower Technologies Program and long standing industry partnerships. The NWTC provides wind industry manufacturers, developers, and operators with turbine and component testing all in one convenient location. Although industry utilizes sophisticated modeling tools to design and optimize turbine configurations, there are always limitations in modeling capabilities, and testing is a necessity to ensure performance and reliability. Designs require validation and testing is the only way to determine if there are flaws. Prototype testing is especially important in capturing manufacturing flaws that might require fleet-wide retrofits. The NWTC works with its industry partners to verify the performance and reliability of wind turbines that range in size from 400 Watts to 3 megawatts. Engineers conduct tests on components and full-scale turbines in laboratory environments and in the field. Test data produced from these tests can be used to validate turbine design codes and simulations that further advance turbine designs.

Not Available

2011-11-01T23:59:59.000Z

273

EOS Land Validation Presentations  

NLE Websites -- All DOE Office Websites (Extended Search)

EOS Land Validation Presentations EOS Land Validation Presentations Meeting: Land Cover Validation Workshop Date: February 2, 2004 Place: Boston, MA Title: Validation Data Support Activities at the ORNL DAAC (Power Point) Presenter: Bob Cook Meeting: Fall 2003 American Geophysical Union (AGU) Meeting Date: December 9, 2003 Place: San Francisco, CA Title: Ground-Based Data Supporting the Validation of MODIS Land Products (Power Point) Presenter: Larry Voorhees Meeting: Terra and Aqua Products Review Date: March 2003 Place: NASA HQ Title: Supporting the Validation of MODIS Land Products (Power Point) Presenter: Larry Voorhees Meeting: Terra and Aqua Products Review Date: March 2003 Place: NASA HQ Title: MODIS Land Summary (Power Point) Presenter: Chris Justice, University of Maryland Meeting: Spring 2002 American Geophysical Union (AGU) Meeting

274

FCT Technology Validation: Contacts  

NLE Websites -- All DOE Office Websites (Extended Search)

Technology Validation: Contacts on AddThis.com... Home Transportation Projects StationaryDistributed Generation Projects Integrated Projects Quick Links Hydrogen Production...

275

SCAP Validation FAQ - NIST  

Science Conference Proceedings (OSTI)

... The SCAP capabilities offered in the SCAP 1.2 program are authenticated configuration scanner (ACS) with optional CVE and OCIL validation. ...

2013-08-12T23:59:59.000Z

276

Press Release: DOE Seeks Public Input for Depleted Uranium Hexafluorid...  

NLE Websites -- All DOE Office Websites (Extended Search)

Perry, (865) 576-0885 September 24, 2001 www.oakridge.doe.gov DOE SEEKS PUBLIC INPUT FOR DEPLETED URANIUM HEXAFLUORIDE ENVIRONMENTAL IMPACT STATEMENT Public Meetings Planned in...

277

Progress in evaluation and improvement in nondestructive examination reliability for inservice inspection of Light Water Reactors (LWRs) and characterize fabrication flaws in reactor pressure vessels  

Science Conference Proceedings (OSTI)

This paper is a review of the work conducted under two programs. One (NDE Reliability Program) is a multi-year program addressing the reliability of nondestructive evaluation (NDE) for the inservice inspection (ISI) of light water reactor components. This program examines the reliability of current NDE, the effectiveness of evolving technologies, and provides assessments and recommendations to ensure that the NDE is applied at the right time, in the right place with sufficient effectiveness that defects of importance to structural integrity will be reliably detected and accurately characterized. The second program (Characterizing Fabrication Flaws in Reactor Pressure Vessels) is assembling a data base to quantify the distribution of fabrication flaws that exist in US nuclear reactor pressure vessels with respect to density, size, type, and location. These programs will be discussed as two separate sections in this report. 4 refs., 7 figs.

Doctor, S.R.; Bowey, R.E.; Good, M.S.; Friley, J.R.; Kurtz, R.J.; Simonen, F.A.; Taylor, T.T.; Heasler, P.G.; Andersen, E.S.; Diaz, A.A.; Greenwood, M.S.; Hockey, R.L.; Schuster, G.J.; Spanner, J.C.; Vo, T.V.

1991-10-01T23:59:59.000Z

278

Input--output capital coefficients for energy technologies. [Input-output model  

DOE Green Energy (OSTI)

Input-output capital coefficients are presented for five electric and seven non-electric energy technologies. They describe the durable goods and structures purchases (at a 110 sector level of detail) that are necessary to expand productive capacity in each of twelve energy source sectors. Coefficients are defined in terms of 1967 dollar purchases per 10/sup 6/ Btu of output from new capacity, and original data sources include Battelle Memorial Institute, the Harvard Economic Research Project, The Mitre Corp., and Bechtel Corp. The twelve energy sectors are coal, crude oil and gas, shale oil, methane from coal, solvent refined coal, refined oil products, pipeline gas, coal combined-cycle electric, fossil electric, LWR electric, HTGR electric, and hydroelectric.

Tessmer, R.G. Jr.

1976-12-01T23:59:59.000Z

279

Finding input sub-spaces for polymorphic fuzzy signatures  

Science Conference Proceedings (OSTI)

A significant feature of fuzzy signatures is its applicability for complex and sparse data. To create Polymorphic Fuzzy Signatures (PFS) for sparse data, sparse input sub-spaces (ISSs) should be considered. Finding the optimal ISSs manually is not a ... Keywords: WRAO, fuzzy C-means, fuzzy signatures, input subspace clustering, polymorphic fuzzy signatures, trapezoidal approximation

A. H. Hadad; T. D. Gedeon; B. S. U. Mendis

2009-08-01T23:59:59.000Z

280

Ancient runes: using text input for interaction in mobile games  

Science Conference Proceedings (OSTI)

Mobile phones are often carried in the pocket making them available for gaming any time. Mobile games typically rely on the joystick for input, but quality of the joystick is very different in the different devices. This paper presents Ancient Runes, ... Keywords: mobile multiplayer gaming, playability, text input

Elina M. I. Koivisto; Riku Suomela; Ari Koivisto

2006-07-01T23:59:59.000Z

Note: This page contains sample records for the topic "input validation flaw" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Manual deskterity: an exploration of simultaneous pen + touch direct input  

Science Conference Proceedings (OSTI)

Manual Deskterity is a prototype digital drafting table that supports both pen and touch input. We explore a division of labor between pen and touch that flows from natural human skill and differentiation of roles of the hands. We also explore the simultaneous ... Keywords: bimanual input, gestures, pen, tabletop, tablets, touch

Ken Hinckley; Koji Yatani; Michel Pahud; Nicole Coddington; Jenny Rodenhouse; Andy Wilson; Hrvoje Benko; Bill Buxton

2010-04-01T23:59:59.000Z

282

Kernel principal component analysis for stochastic input model generation  

Science Conference Proceedings (OSTI)

Stochastic analysis of random heterogeneous media provides useful information only if realistic input models of the material property variations are used. These input models are often constructed from a set of experimental samples of the underlying random ... Keywords: Data-driven models, Flow in random porous media, Kernel principal component analysis, Non-linear model reduction, Stochastic partial differential equations

Xiang Ma; Nicholas Zabaras

2011-08-01T23:59:59.000Z

283

Skeletal input for user interaction in X3D  

Science Conference Proceedings (OSTI)

Recent developments in depth sensor technology enable developers to use skeletal input in interactive 3D environments with high user fluctuation like museum exhibits. However, the question of how to use natural user input and body movement to control ... Keywords: Kinect, X3D, natural interaction

Manuel Olbrich; Tobias Franke; Jens Keil; Sven Hertling

2013-06-01T23:59:59.000Z

284

BeThere: 3D mobile collaboration with spatial input  

Science Conference Proceedings (OSTI)

We present BeThere, a proof-of-concept system designed to explore 3D input for mobile collaborative interactions. With BeThere, we explore 3D gestures and spatial input which allow remote users to perform a variety of virtual interactions ... Keywords: around device interaction, augmented reality, collaboration, depth sensors

Rajinder S. Sodhi; Brett R. Jones; David Forsyth; Brian P. Bailey; Giuliano Maciocci

2013-04-01T23:59:59.000Z

285

Twinkle box: a three-dimensional computer input device  

Science Conference Proceedings (OSTI)

During the past fifteen years, use of two-dimensional computer input/output devices has become commonplace. Since the earliest uses of the light pen for target identification in air defense systems it has been obvious that two-dimensional input would ...

Robert P. Burton; Ivan E. Sutherland

1974-05-01T23:59:59.000Z

286

Electrophoretically active sol-gel processes to backfill, seal, and/or densify porous, flawed, and/or cracked coatings on electrically conductive material  

DOE Patents (OSTI)

Electrophoretically active sol-gel processes to fill, seal, and/or density porous, flawed, and/or cracked coatings on electrically conductive substrates. Such coatings may be dielectrics, ceramics, or semiconductors and, by the present invention, may have deposited onto and into them sol-gel ceramic precursor compounds which are subsequently converted to sol-gel ceramics to yield composite materials with various tailored properties. 6 figs.

Panitz, J.K.; Reed, S.T.; Ashley, C.S.; Neiser, R.A.; Moffatt, W.C.

1999-07-20T23:59:59.000Z

287

Materials Reliability Program: Advanced FEA Evaluation of Growth of Postulated Circumferential PWSCC Flaws in Pressurizer Nozzle Dis similar Metal Welds (MRP-216, Rev. 1)  

Science Conference Proceedings (OSTI)

Indications of circumferential flaws in the pressurizer nozzles at Wolf Creek raised questions about the need to accelerate refueling outages or take mid-cycle outages at other plants. This study demonstrates the viability of leak detection as a means to preclude the potential for rupture for the pressurizer nozzle dissimilar metal (DM) welds in a group of nine PWRs originally scheduled to perform performance demonstration initiative (PDI) inspection or mitigation during the spring 2008 outage season. Mo...

2007-08-10T23:59:59.000Z

288

Materials Reliability Program: Advanced FEA Evaluation of Growth of Postulated Circumferential PWSCC Flaws in Pressurizer Nozzle Dis similar Metal Welds (MRP-216)  

Science Conference Proceedings (OSTI)

Indications of circumferential flaws in the pressurizer nozzles at Wolf Creek raised questions about the need to accelerate refueling outages or take mid-cycle outages at other plants. This study demonstrates the viability of leak detection as a means to preclude the potential for rupture for the pressurizer nozzle dissimilar metal (DM) welds in a group of nine PWRs originally scheduled to perform performance demonstration initiative (PDI) inspection or mitigation during the spring 2008 outage season. Mo...

2007-08-02T23:59:59.000Z

289

PREDICTING THE TIME RESPONSE OF A BUILDING UNDER HEAT INPUT CONDITIONS FOR ACTIVE SOLAR HEATING SYSTEMS  

E-Print Network (OSTI)

solar space heating system with heat input and building loadBUILDING UNDER HEAT INPUT CONDITIONS FOR ACTIVE SOLAR HEATINGBUILDING UNDER HEAT INPUT CONDITIONS FOR ACTIVE SOLAR HEATING

Warren, Mashuri L.

2013-01-01T23:59:59.000Z

290

DOE Seeks Industry Input on Nickel Disposition Strategy | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Industry Input on Nickel Disposition Strategy Industry Input on Nickel Disposition Strategy DOE Seeks Industry Input on Nickel Disposition Strategy March 23, 2012 - 12:00pm Addthis WASHINGTON, D.C. - The Energy Department's prime contractor, Fluor-B&W Portsmouth (FBP), managing the Portsmouth Gaseous Diffusion Plant (GDP), issued a request for Expressions of Interest (EOI) seeking industry input to support the development of an acquisition strategy for potential disposition of DOE nickel. The EOI requests technical, financial, and product market information to review the feasibility of technologies capable of decontaminating the nickel to a level indistinguishable from what is commercially available, such that it could be safely recycled and reused. The EOI scope is for 6,400 tons of nickel to be recovered from the uranium enrichment process

291

DOE Seeks Industry Input on Nickel Disposition Strategy | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

DOE Seeks Industry Input on Nickel Disposition Strategy DOE Seeks Industry Input on Nickel Disposition Strategy DOE Seeks Industry Input on Nickel Disposition Strategy March 23, 2012 - 12:00pm Addthis WASHINGTON, D.C. - The Energy Department's prime contractor, Fluor-B&W Portsmouth (FBP), managing the Portsmouth Gaseous Diffusion Plant (GDP), issued a request for Expressions of Interest (EOI) seeking industry input to support the development of an acquisition strategy for potential disposition of DOE nickel. The EOI requests technical, financial, and product market information to review the feasibility of technologies capable of decontaminating the nickel to a level indistinguishable from what is commercially available, such that it could be safely recycled and reused. The EOI scope is for 6,400 tons of nickel to be recovered from the uranium enrichment process

292

Input to the 2012-2021 Strategic Plan  

NLE Websites -- All DOE Office Websites (Extended Search)

Related Federal Climate Efforts Related Federal Climate Efforts Input to the 2012-2021 Strategic Plan Print E-mail Engaging Stakeholders The USGCRP is dedicated to engaging stakeholders in strategic planning efforts. Our community outreach activities created a dialogue with our stakeholders through various communication channels, such as opportunities for interagency collaboration, town hall meetings, public presentations and listening sessions. These channels alongside our 60 day public comment period enabled the program to incorporate stakeholder input int the process of drafting this decadal plan. In addition, we welcome input - particularly on the future direction of USGCRP and on the climate information you need and use. Please send your comments to input@usgcrp.gov. Listening Sessions

293

Abandoned Uranium Mines Report to Congress: LM Wants Your Input |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Abandoned Uranium Mines Report to Congress: LM Wants Your Input Abandoned Uranium Mines Report to Congress: LM Wants Your Input Abandoned Uranium Mines Report to Congress: LM Wants Your Input April 11, 2013 - 1:33pm Addthis C-SR-10 Uintah Mine, Colorado, LM Uranium Lease Tracts C-SR-10 Uintah Mine, Colorado, LM Uranium Lease Tracts What does this project do? Goal 4. Optimize the use of land and assets Abandoned Uranium Mines Report to Congress The U.S. Department of Energy (DOE) Office of Legacy Management (LM) is seeking stakeholder input on an abandoned uranium mines report to Congress. On January 2, 2013, President Obama signed into law the National Defense Authorization Act for Fiscal Year 2013, which requires the Secretary of Energy, in consultation with the Secretary of the U.S Department of the Interior (DOI) and the Administrator

294

,"U.S. Refinery Crude Oil Input Qualities"  

U.S. Energy Information Administration (EIA) Indexed Site

,,"(202) 586-8800",,,"7242013 11:46:42 PM" "Back to Contents","Data 1: U.S. Refinery Crude Oil Input Qualities" "Sourcekey","MCRS1US2","MCRAPUS2" "Date","U.S. Sulfur...

295

Speech recognition as a computer graphics input technique (Panel Session)  

Science Conference Proceedings (OSTI)

Richard Rabin Interactive graphics systems typically require intense hands busy/eyes busy and brains busy activity on the part of the system user/operator. Voice input by means of automatic speech recognition equipment, offers major potential ...

Alan R. Strass; Mark Robillard; Sue Schedler; Matthew Peterson / Richard Rabin

1982-07-01T23:59:59.000Z

296

Comparison of wind stress algorithms, datasets and oceanic power input  

E-Print Network (OSTI)

If the ocean is in a statistically steady state, energy balance is a strong constraint, suggesting that the energy input into the world ocean is dissipated simultaneously at the same rate. Energy conservation is one of the ...

Yuan, Shaoyu

2009-01-01T23:59:59.000Z

297

Constructing Verifiable Random Functions with Large Input Spaces Susan Hohenberger  

E-Print Network (OSTI)

idea is to apply a simulation technique where the large space of VRF inputs is collapsed into a small, the verification should remain secure even if the public commitment were setup in a malicious manner. The VRF

298

On the Energy Input from Wind to Surface Waves  

Science Conference Proceedings (OSTI)

A basic model relating the energy dissipation in the ocean mixed layer to the energy input into the surface wave field is combined with recent measurements of turbulent kinetic energy dissipation to determine the average phase speed of the waves ...

J. R. Gemmrich; T. D. Mudge; V. D. Polonichko

1994-11-01T23:59:59.000Z

299

Eclat : automatic generation and classification of test inputs  

E-Print Network (OSTI)

This thesis describes a technique that selects, from a large set of test inputs, a small subset likely to reveal faults in the software under test. The technique takes a program or software component, plus a set of correct ...

Pacheco, Carlos, S.M. Massachusetts Institute of Technology

2005-01-01T23:59:59.000Z

300

IMPACT OF HIGH-INPUT PRODUCTION PRACTICES ON SOYBEAN YIELD.  

E-Print Network (OSTI)

??High-input management practices are often heavily marketed to producers to increase soybean [Glycine max (L) Merr.] yield in already high-yielding environments. Field research was conducted (more)

Jordan, Daniel L.

2010-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "input validation flaw" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Indiana, Illinois, Kentucky Refinery District Gross Inputs to ...  

U.S. Energy Information Administration (EIA)

Indiana, Illinois, Kentucky Refinery District Gross Inputs to Refineries (Thousand Barrels per Day) Year Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec; 1985: 1,739 ...

302

FCT Technology Validation: Transportation Projects  

NLE Websites -- All DOE Office Websites (Extended Search)

Transportation Projects to someone by E-mail Share FCT Technology Validation: Transportation Projects on Facebook Tweet about FCT Technology Validation: Transportation Projects on...

303

EOS Validation Data Archival Policy  

NLE Websites -- All DOE Office Websites (Extended Search)

FIFE Follow-On LBA (Amazon) NACP (North America) OTTER (Oregon) SAFARI 2000 (S.Africa) SNF (Minnesota) Validation BIGFOOT Canopy Chemistry (ACCP) EOS Land Validation...

304

Validation of PG+W  

Science Conference Proceedings (OSTI)

Validation of PG+W. ... More Information. Calibration of Turbine Meters. Validation of PG+W. Propylene Glycol vs. Stoddard Solvent. ...

2012-08-09T23:59:59.000Z

305

Model Validation Bernie Lesieutre  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Model Validation Model Validation Bernie Lesieutre University of Wisconsin lesieutre@wisc.edu 27 June 2013 Washington, DC DOE/OE Transmission Reliability Program 2 Project Objectives To Develop techniques and tools for PMU- and feature-based power system model validation. Background: Our prior proof-of-concept research demonstrated that feature-based sensitivity models can be used to calibrate power system dynamic models. This was applied to the WECC composite load model for oscillatory and FIDVR events. 3 Project Objectives PSLF simulation features features Sensitivity Model (parameters) Measured Data Simulated Data Features Error Adjust Parameters Technical Approach 4 Project Objectives Current Research: Use PMU data to calibrate power plant models. Four Tasks:

306

validation | OpenEI  

Open Energy Info (EERE)

validation validation Dataset Summary Description (Abstract): 31Conclusiones y recomendacionesEl método de cálculo de la radiación solar global desarrollado ha obtenido resultadoscomparables a otros métodos revisados en la bibliografía. A diferencia de muchos deestos métodos, que han sido ajustados y refinados por sus autores a lo largo de variosaños de trabajo, este es completamente nuevo y parte de un enfoque diferente, por loque tiene un gran potencial de ajuste y sintonización.Algunos cambios que pueden sugerirse son tomar distribuciones espaciales ytemporales Source Instituto de Meteorología de Cuba Date Released November 30th, 2005 (9 years ago) Date Updated November 07th, 2007 (7 years ago) Keywords América Latina Cuba documentation solar SWERA validation

307

Accelerated Testing Validation  

NLE Websites -- All DOE Office Websites (Extended Search)

Testing Validation Testing Validation Rangachary Mukundan (PI), Rodney Borup, John Davey, Roger Lujan Los Alamos National Laboratory Adam Z. Weber Lawrence Berkeley National Laboratory Greg James Ballard Power Systems, Inc Mike Brady Oak Ridge National Laboratory Steve Grot Ion Power, Inc This presentation does not contain any proprietary or confidential information Objective/Barrier/Target The objectives of this project are 3-fold 1. Correlation of the component lifetimes measured in an AST to real-world behavior of that component. 2. Validation of existing ASTs for Catalyst layers and Membranes 3. Development of new ASTs for GDLs, bipolar plates and interfaces Technical Barrier Addressed: A. Durability * Durability of fuel cell systems operating over automotive drive cycles has not

308

Fuel Cell Technologies Office: Technology Validation  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Information Technology Validation Search Search Help Technology Validation EERE Fuel Cell Technologies Office Technology Validation Printable Version Share this resource...

309

New Hampshire Natural Gas Input Supplemental Fuels (Million Cubic Feet)  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (Million Cubic Feet) Input Supplemental Fuels (Million Cubic Feet) New Hampshire Natural Gas Input Supplemental Fuels (Million Cubic Feet) Decade Year-0 Year-1 Year-2 Year-3 Year-4 Year-5 Year-6 Year-7 Year-8 Year-9 1960's 0 0 0 1970's 0 0 0 0 0 0 0 0 0 0 1980's 774 720 582 328 681 509 362 464 492 592 1990's 205 128 96 154 160 90 147 102 103 111 2000's 180 86 66 58 91 84 92 9 0 0 2010's 0 0 0 - = No Data Reported; -- = Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Release Date: 12/12/2013 Next Release Date: 1/7/2014 Referring Pages: Total Supplemental Supply of Natural Gas New Hampshire Supplemental Supplies of Natural Gas Supplies of Natural Gas Supplemental Fuels (Annual Supply &

310

OECD Input-Output Tables | Open Energy Information  

Open Energy Info (EERE)

OECD Input-Output Tables OECD Input-Output Tables Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Input-Output Tables Agency/Company /Organization: Organisation for Economic Co-Operation and Development Topics: Co-benefits assessment, Market analysis, Co-benefits assessment, Pathways analysis Resource Type: Dataset Website: www.oecd.org/document/3/0,3343,en_2649_34445_38071427_1_1_1_1,00.html Country: Sweden, Finland, Japan, South Korea, Argentina, Australia, China, Israel, United Kingdom, Portugal, Romania, Greece, Poland, Slovakia, Chile, India, Canada, New Zealand, United States, Denmark, Norway, Spain, Austria, Italy, Netherlands, Ireland, France, Belgium, Brazil, Czech Republic, Estonia, Germany, Hungary, Luxembourg, Mexico, Slovenia, South Africa, Turkey, Indonesia, Switzerland, Taiwan, Russia

311

Washington Natural Gas Input Supplemental Fuels (Million Cubic Feet)  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (Million Cubic Feet) Input Supplemental Fuels (Million Cubic Feet) Washington Natural Gas Input Supplemental Fuels (Million Cubic Feet) Decade Year-0 Year-1 Year-2 Year-3 Year-4 Year-5 Year-6 Year-7 Year-8 Year-9 1960's 0 0 0 1970's 0 0 0 0 0 0 0 0 0 0 1980's 15 13 15 11 11 9 10 21 79 154 1990's 181 154 180 4 0 0 0 0 0 0 2000's 0 0 0 0 0 0 0 0 0 0 2010's 0 0 0 - = No Data Reported; -- = Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Release Date: 12/12/2013 Next Release Date: 1/7/2014 Referring Pages: Total Supplemental Supply of Natural Gas Washington Supplemental Supplies of Natural Gas Supplies of Natural Gas Supplemental Fuels (Annual Supply & Disposition

312

Minnesota Natural Gas Input Supplemental Fuels (Million Cubic Feet)  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (Million Cubic Feet) Input Supplemental Fuels (Million Cubic Feet) Minnesota Natural Gas Input Supplemental Fuels (Million Cubic Feet) Decade Year-0 Year-1 Year-2 Year-3 Year-4 Year-5 Year-6 Year-7 Year-8 Year-9 1960's 0 0 0 1970's 0 0 0 0 0 0 0 0 0 0 1980's 48 106 337 1 3 11 2 1 385 315 1990's 56 49 52 78 289 194 709 172 50 64 2000's 101 118 13 42 71 154 13 54 46 47 2010's 12 20 9 - = No Data Reported; -- = Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Release Date: 12/12/2013 Next Release Date: 1/7/2014 Referring Pages: Total Supplemental Supply of Natural Gas Minnesota Supplemental Supplies of Natural Gas Supplies of Natural Gas Supplemental Fuels (Annual Supply &

313

District of Columbia Natural Gas Input Supplemental Fuels (Million Cubic  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (Million Cubic Feet) Input Supplemental Fuels (Million Cubic Feet) District of Columbia Natural Gas Input Supplemental Fuels (Million Cubic Feet) Decade Year-0 Year-1 Year-2 Year-3 Year-4 Year-5 Year-6 Year-7 Year-8 Year-9 1960's 0 0 0 1970's 0 0 0 0 0 0 0 0 0 0 1980's 2 1 46 0 0 0 0 0 0 0 1990's 0 0 0 0 0 0 0 0 0 0 2000's 0 0 0 0 0 0 0 0 0 0 2010's 0 0 0 - = No Data Reported; -- = Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Release Date: 12/12/2013 Next Release Date: 1/7/2014 Referring Pages: Total Supplemental Supply of Natural Gas District of Columbia Supplemental Supplies of Natural Gas Supplies of Natural Gas Supplemental Fuels (Annual Supply & Disposition)

314

Maryland Natural Gas Input Supplemental Fuels (Million Cubic Feet)  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (Million Cubic Feet) Input Supplemental Fuels (Million Cubic Feet) Maryland Natural Gas Input Supplemental Fuels (Million Cubic Feet) Decade Year-0 Year-1 Year-2 Year-3 Year-4 Year-5 Year-6 Year-7 Year-8 Year-9 1960's 0 0 0 1970's 0 0 0 0 0 0 0 0 0 0 1980's 484 498 984 352 332 373 155 136 743 899 1990's 24 72 126 418 987 609 882 178 80 498 2000's 319 186 48 160 124 382 41 245 181 170 2010's 115 89 116 - = No Data Reported; -- = Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Release Date: 12/12/2013 Next Release Date: 1/7/2014 Referring Pages: Total Supplemental Supply of Natural Gas Maryland Supplemental Supplies of Natural Gas Supplies of Natural Gas Supplemental Fuels (Annual Supply &

315

Iowa Natural Gas Input Supplemental Fuels (Million Cubic Feet)  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (Million Cubic Feet) Input Supplemental Fuels (Million Cubic Feet) Iowa Natural Gas Input Supplemental Fuels (Million Cubic Feet) Decade Year-0 Year-1 Year-2 Year-3 Year-4 Year-5 Year-6 Year-7 Year-8 Year-9 1960's 0 0 0 1970's 0 0 0 0 0 0 0 0 0 0 1980's 57 64 68 23 53 45 44 40 34 82 1990's 81 46 45 84 123 96 301 137 17 12 2000's 44 39 23 143 30 31 46 40 27 3 2010's 2 1 0 - = No Data Reported; -- = Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Release Date: 12/12/2013 Next Release Date: 1/7/2014 Referring Pages: Total Supplemental Supply of Natural Gas Iowa Supplemental Supplies of Natural Gas Supplies of Natural Gas Supplemental Fuels (Annual Supply & Disposition

316

Pennsylvania Natural Gas Input Supplemental Fuels (Million Cubic Feet)  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (Million Cubic Feet) Input Supplemental Fuels (Million Cubic Feet) Pennsylvania Natural Gas Input Supplemental Fuels (Million Cubic Feet) Decade Year-0 Year-1 Year-2 Year-3 Year-4 Year-5 Year-6 Year-7 Year-8 Year-9 1960's 0 0 0 1970's 0 0 0 0 0 0 0 0 0 0 1980's 3,127 10,532 5,621 3,844 82 221 196 247 254 305 1990's 220 222 132 110 252 75 266 135 80 119 2000's 261 107 103 126 131 132 124 145 123 205 2010's 4 2 2 - = No Data Reported; -- = Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Release Date: 12/12/2013 Next Release Date: 1/7/2014 Referring Pages: Total Supplemental Supply of Natural Gas Pennsylvania Supplemental Supplies of Natural Gas Supplies of Natural Gas Supplemental Fuels (Annual Supply &

317

Possible Magmatic Input to the Dixie Valley Geothermal Field, and  

Open Energy Info (EERE)

Possible Magmatic Input to the Dixie Valley Geothermal Field, and Possible Magmatic Input to the Dixie Valley Geothermal Field, and Implications for District-Scale Resource Exploration, Inferred from Magnetotelluric (MT) Resistivity Surveying Jump to: navigation, search OpenEI Reference LibraryAdd to library Journal Article: Possible Magmatic Input to the Dixie Valley Geothermal Field, and Implications for District-Scale Resource Exploration, Inferred from Magnetotelluric (MT) Resistivity Surveying Abstract Magnetotelluric (MT) profiling in northwestern Nevadais used to test hypotheses on the main sources of heat andhydrothermal fluid for the Dixie Valley-Central NevadaSeismic Belt area. The transect reveals families of resistivitystructures commonly dominated by steeply-dipping features,some of which may be of key geothermal significance. Mostnotably, 2-D inversion

318

Missouri Natural Gas Input Supplemental Fuels (Million Cubic Feet)  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (Million Cubic Feet) Input Supplemental Fuels (Million Cubic Feet) Missouri Natural Gas Input Supplemental Fuels (Million Cubic Feet) Decade Year-0 Year-1 Year-2 Year-3 Year-4 Year-5 Year-6 Year-7 Year-8 Year-9 1960's 0 0 0 1970's 0 0 0 0 0 0 0 0 0 0 1980's 65 60 2,129 1,278 326 351 1 1 2 1,875 1990's 0 0 0 0 371 4 785 719 40 207 2000's 972 31 62 1,056 917 15 78 66 6 10 2010's 18 - = No Data Reported; -- = Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Release Date: 12/12/2013 Next Release Date: 1/7/2014 Referring Pages: Total Supplemental Supply of Natural Gas Missouri Supplemental Supplies of Natural Gas Supplies of Natural Gas Supplemental Fuels (Annual Supply &

319

Rhode Island Natural Gas Input Supplemental Fuels (Million Cubic Feet)  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (Million Cubic Feet) Input Supplemental Fuels (Million Cubic Feet) Rhode Island Natural Gas Input Supplemental Fuels (Million Cubic Feet) Decade Year-0 Year-1 Year-2 Year-3 Year-4 Year-5 Year-6 Year-7 Year-8 Year-9 1960's 0 0 0 1970's 0 0 0 0 0 0 0 0 0 0 1980's 257 951 718 594 102 130 182 109 391 219 1990's 51 92 155 126 0 27 42 18 1 1 2000's 0 0 0 0 0 0 0 0 0 0 2010's 0 0 0 - = No Data Reported; -- = Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Release Date: 12/12/2013 Next Release Date: 1/7/2014 Referring Pages: Total Supplemental Supply of Natural Gas Rhode Island Supplemental Supplies of Natural Gas Supplies of Natural Gas Supplemental Fuels (Annual Supply &

320

DOE Seeks Input On Addressing Contractor Pension and Medical Benefits  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Input On Addressing Contractor Pension and Medical Input On Addressing Contractor Pension and Medical Benefits Liabilities DOE Seeks Input On Addressing Contractor Pension and Medical Benefits Liabilities March 27, 2007 - 12:10pm Addthis WASHINGTON, DC - The U.S. Department of Energy (DOE) today announced in the Federal Register that it is seeking public comment on how to address the increasing costs and liabilities of contractor employee pension and medical benefits. Under the Department of Energy's unique Management and Operating and other site management contracts, DOE reimburses its contractors for allowable costs incurred in providing contractor employee pension and medical benefits to current employees and retirees. In FY2006, these costs reached approximately $1.1 billion - a more than 226 percent increase since FY2000 - and are expected to grow in future years.

Note: This page contains sample records for the topic "input validation flaw" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Georgia Natural Gas Input Supplemental Fuels (Million Cubic Feet)  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (Million Cubic Feet) Input Supplemental Fuels (Million Cubic Feet) Georgia Natural Gas Input Supplemental Fuels (Million Cubic Feet) Decade Year-0 Year-1 Year-2 Year-3 Year-4 Year-5 Year-6 Year-7 Year-8 Year-9 1960's 0 0 0 1970's 0 0 0 0 0 0 0 0 0 0 1980's 24 57 151 84 28 121 124 248 241 292 1990's 209 185 166 199 123 130 94 14 16 12 2000's 73 51 7 14 5 0 3 2 52 2010's 732 701 660 - = No Data Reported; -- = Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Release Date: 12/12/2013 Next Release Date: 1/7/2014 Referring Pages: Total Supplemental Supply of Natural Gas Georgia Supplemental Supplies of Natural Gas Supplies of Natural Gas Supplemental Fuels (Annual Supply &

322

Delaware Natural Gas Input Supplemental Fuels (Million Cubic Feet)  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (Million Cubic Feet) Input Supplemental Fuels (Million Cubic Feet) Delaware Natural Gas Input Supplemental Fuels (Million Cubic Feet) Decade Year-0 Year-1 Year-2 Year-3 Year-4 Year-5 Year-6 Year-7 Year-8 Year-9 1960's 0 0 0 1970's 0 0 0 0 0 0 0 0 0 0 1980's 55 135 56 20 13 12 9 0 2 18 1990's 4,410 4,262 3,665 3,597 3,032 1 1 2 0 0 2000's 6 0 0 7 17 0 W 5 2 2 2010's 1 0 - = No Data Reported; -- = Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Release Date: 12/12/2013 Next Release Date: 1/7/2014 Referring Pages: Total Supplemental Supply of Natural Gas Delaware Supplemental Supplies of Natural Gas Supplies of Natural Gas Supplemental Fuels (Annual Supply & Disposition

323

South Dakota Natural Gas Input Supplemental Fuels (Million Cubic Feet)  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (Million Cubic Feet) Input Supplemental Fuels (Million Cubic Feet) South Dakota Natural Gas Input Supplemental Fuels (Million Cubic Feet) Decade Year-0 Year-1 Year-2 Year-3 Year-4 Year-5 Year-6 Year-7 Year-8 Year-9 1960's 0 0 0 1970's 0 0 0 0 0 0 0 0 0 0 1980's 9 24 50 1 0 0 0 0 10 16 1990's 10 3 10 9 61 37 87 30 4 5 2000's 13 5 3 57 5 4 0 1 0 0 2010's 0 0 0 - = No Data Reported; -- = Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Release Date: 12/12/2013 Next Release Date: 1/7/2014 Referring Pages: Total Supplemental Supply of Natural Gas South Dakota Supplemental Supplies of Natural Gas Supplies of Natural Gas Supplemental Fuels (Annual Supply & Disposition

324

Incorporating uncertainty in RADTRAN 6.0 input files.  

SciTech Connect

Uncertainty may be introduced into RADTRAN analyses by distributing input parameters. The MELCOR Uncertainty Engine (Gauntt and Erickson, 2004) has been adapted for use in RADTRAN to determine the parameter shape and minimum and maximum of the distribution, to sample on the distribution, and to create an appropriate RADTRAN batch file. Coupling input parameters is not possible in this initial application. It is recommended that the analyst be very familiar with RADTRAN and able to edit or create a RADTRAN input file using a text editor before implementing the RADTRAN Uncertainty Analysis Module. Installation of the MELCOR Uncertainty Engine is required for incorporation of uncertainty into RADTRAN. Gauntt and Erickson (2004) provides installation instructions as well as a description and user guide for the uncertainty engine.

Dennis, Matthew L.; Weiner, Ruth F.; Heames, Terence John (Alion Science and Technology)

2010-02-01T23:59:59.000Z

325

Optical device with conical input and output prism faces  

DOE Patents (OSTI)

A device for radially translating radiation in which a right circular cylinder is provided at each end thereof with conical prism faces. The faces are oppositely extending and the device may be severed in the middle and separated to allow access to the central part of the beam. Radiation entering the input end of the device is radially translated such that radiation entering the input end at the perimeter is concentrated toward the output central axis and radiation at the input central axis is dispersed toward the output perimeter. Devices are disclosed for compressing beam energy to enhance drilling techniques, for beam manipulation of optical spatial frequencies in the Fourier plane and for simplification of dark field and color contrast microscopy. Both refracting and reflecting devices are disclosed.

Brunsden, Barry S. (Chicago, IL)

1981-01-01T23:59:59.000Z

326

Connecticut Natural Gas Input Supplemental Fuels (Million Cubic Feet)  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (Million Cubic Feet) Input Supplemental Fuels (Million Cubic Feet) Connecticut Natural Gas Input Supplemental Fuels (Million Cubic Feet) Decade Year-0 Year-1 Year-2 Year-3 Year-4 Year-5 Year-6 Year-7 Year-8 Year-9 1960's 0 0 0 1970's 0 0 0 0 0 0 0 0 0 0 1980's 144 1,584 1,077 291 239 343 298 180 245 251 1990's 111 146 40 94 29 68 48 37 33 31 2000's 20 6 6 57 191 273 91 0 0 1 2010's 0 0 0 - = No Data Reported; -- = Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Release Date: 12/12/2013 Next Release Date: 1/7/2014 Referring Pages: Total Supplemental Supply of Natural Gas Connecticut Supplemental Supplies of Natural Gas Supplies of Natural Gas Supplemental Fuels (Annual Supply &

327

South Carolina Natural Gas Input Supplemental Fuels (Million Cubic Feet)  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (Million Cubic Feet) Input Supplemental Fuels (Million Cubic Feet) South Carolina Natural Gas Input Supplemental Fuels (Million Cubic Feet) Decade Year-0 Year-1 Year-2 Year-3 Year-4 Year-5 Year-6 Year-7 Year-8 Year-9 1960's 0 0 0 1970's 0 0 0 0 0 0 0 0 0 0 1980's 74 184 63 73 62 87 31 22 191 201 1990's 17 47 26 34 154 62 178 10 0 18 2000's 63 6 3 15 2 86 75 0 2010's 0 0 - = No Data Reported; -- = Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Release Date: 12/12/2013 Next Release Date: 1/7/2014 Referring Pages: Total Supplemental Supply of Natural Gas South Carolina Supplemental Supplies of Natural Gas Supplies of Natural Gas Supplemental Fuels (Annual Supply &

328

Tennessee Natural Gas Input Supplemental Fuels (Million Cubic Feet)  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (Million Cubic Feet) Input Supplemental Fuels (Million Cubic Feet) Tennessee Natural Gas Input Supplemental Fuels (Million Cubic Feet) Decade Year-0 Year-1 Year-2 Year-3 Year-4 Year-5 Year-6 Year-7 Year-8 Year-9 1960's 0 0 0 1970's 0 0 0 0 0 0 0 0 0 0 1980's 12 42 90 39 25 36 13 26 36 78 1990's 3 8 12 13 84 33 73 19 4 11 2000's 13 0 1 1 0 0 0 0 0 0 2010's 0 0 0 - = No Data Reported; -- = Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Release Date: 12/12/2013 Next Release Date: 1/7/2014 Referring Pages: Total Supplemental Supply of Natural Gas Tennessee Supplemental Supplies of Natural Gas Supplies of Natural Gas Supplemental Fuels (Annual Supply & Disposition

330

Table 3. U.S. Inputs to Biodiesel Production  

U.S. Energy Information Administration (EIA) Indexed Site

U.S. Inputs to Biodiesel Production U.S. Inputs to Biodiesel Production (million pounds) 2011 January 8 17 - W 150 W 14 11 February 26 13 - W 150 W 14 11 March 68 14 - W 190 W 19 27 April 88 20 - W 236 W 15 47 May 113 21 - W 264 W 16 36 June 75 34 - W 311 W 23 49 July 77 35 - W 367 W 26 64 August 84 37 W W 398 W 34 38 September 84 27 W W 430 W

331

Environmental issues of material input in CDTE-module manufacturing  

DOE Green Energy (OSTI)

The goal of a low-cost and high-volume photovoltaic (PV) module fabrication demands an optimized process sequence to guarantee product quality and module stability on a long-term basis. Nevertheless, large-scale module manufacturing uses several input and auxiliary materials and generates waste from processing output materials. The mining and refining of the PV manufacturing material consumes input and auxiliary material and also creates waste. Therefore, investigations into these materials were conducted with respect to their risk potential for environment and health.

Steinberger, H.; Hochwimmer, R.; Schmid, H. [Fraunhofer Inst. fuer Festkoerpertechnologie, Muenchen (Germany); Thumm, W.; Kettrup, A. [GSF, Oberschleissheim (Germany). Inst. fuer Oekologische Chemie; Moskowitz, P. [Brookhaven National Lab., Upton, NY (United States). Biomedical and Environmental Assessment Group

1995-12-31T23:59:59.000Z

332

Electricity Regulation in California and Input Market Distortions  

E-Print Network (OSTI)

We provide an analysis of the soft price cap regulation that occurred in Californias electricity market between December 2000 and June 2001. We demonstrate the incentive it created to distort the prices of electricity inputs. After introducing a theoretical model of the incentive, we present empirical data from two important input markets: pollution emissions permits and natural gas. We find substantial evidence that generators manipulated these costs in a way that allowed them to justify bids in excess of the price cap and earn higher rents than they could otherwise. Our analysis suggests that the potential benefits of soft price cap regulation were likely undone by such behavior. 1

Mark R. Jacobsen; Azeem M. Shaikh

2004-01-01T23:59:59.000Z

333

Flight code validation simulator  

Science Conference Proceedings (OSTI)

An End-To-End Simulation capability for software development and validation of missile flight software on the actual embedded computer has been developed utilizing a 486 PC, i860 DSP coprocessor, embedded flight computer and custom dual port memory interface hardware. This system allows real-time interrupt driven embedded flight software development and checkout. The flight software runs in a Sandia Digital Airborne Computer (SANDAC) and reads and writes actual hardware sensor locations in which IMU (Inertial Measurements Unit) data resides. The simulator provides six degree of freedom real-time dynamic simulation, accurate real-time discrete sensor data and acts on commands and discretes from the flight computer. This system was utilized in the development and validation of the successful premier flight of the Digital Miniature Attitude Reference System (DMARS) in January 1995 at the White Sands Missile Range on a two stage attitude controlled sounding rocket.

Sims, B.A.

1995-08-01T23:59:59.000Z

334

CIPS Validation Data Plan  

SciTech Connect

This report documents analysis, findings and recommendations resulted from a task 'CIPS Validation Data Plan (VDP)' formulated as an POR4 activity in the CASL VUQ Focus Area (FA), to develop a Validation Data Plan (VDP) for Crud-Induced Power Shift (CIPS) challenge problem, and provide guidance for the CIPS VDP implementation. The main reason and motivation for this task to be carried at this time in the VUQ FA is to bring together (i) knowledge of modern view and capability in VUQ, (ii) knowledge of physical processes that govern the CIPS, and (iii) knowledge of codes, models, and data available, used, potentially accessible, and/or being developed in CASL for CIPS prediction, to devise a practical VDP that effectively supports the CASL's mission in CIPS applications.

Nam Dinh

2012-03-01T23:59:59.000Z

335

CIPS Validation Data Plan  

SciTech Connect

This report documents analysis, findings and recommendations resulted from a task 'CIPS Validation Data Plan (VDP)' formulated as an POR4 activity in the CASL VUQ Focus Area (FA), to develop a Validation Data Plan (VDP) for Crud-Induced Power Shift (CIPS) challenge problem, and provide guidance for the CIPS VDP implementation. The main reason and motivation for this task to be carried at this time in the VUQ FA is to bring together (i) knowledge of modern view and capability in VUQ, (ii) knowledge of physical processes that govern the CIPS, and (iii) knowledge of codes, models, and data available, used, potentially accessible, and/or being developed in CASL for CIPS prediction, to devise a practical VDP that effectively supports the CASL's mission in CIPS applications.

Nam Dinh

2012-03-01T23:59:59.000Z

336

PV array simulator development and validation.  

Science Conference Proceedings (OSTI)

The ability to harvest all available energy from a photovoltaic (PV) array is essential if new system developments are to meet levelized cost of energy targets and achieve grid parity with conventional centralized utility power. Therefore, exercising maximum power point tracking (MPPT) algorithms, dynamic irradiance condition operation and startup and shutdown routines and evaluating inverter performance with various PV module fill-factor characteristics must be performed with a repeatable, reliable PV source. Sandia National Laboratories is collaborating with Ametek Programmable Power to develop and demonstrate a multi-port TerraSAS PV array simulator. The simulator will replicate challenging PV module profiles, enabling the evaluation of inverter performance through analyses of the parameters listed above. Energy harvest algorithms have traditionally implemented methods that successfully utilize available energy. However, the quantification of energy capture has always been difficult to conduct, specifically when characterizing the inverter performance under non-reproducible dynamic irradiance conditions. Theoretical models of the MPPT algorithms can simulate capture effectiveness, but full validation requires a DC source with representative field effects. The DC source being developed by Ametek and validated by Sandia is a fully integrated system that can simulate an IV curve from the Solar Advisor Model (SAM) module data base. The PV simulator allows the user to change the fill factor by programming the maximum power point voltage and current parameters and the open circuit voltage and short circuit current. The integrated PV simulator can incorporate captured irradiance and module temperature data files for playback, and scripted profiles can be generated to validate new emerging hardware embedded with existing and evolving MPPT algorithms. Since the simulator has multiple independent outputs, it also has the flexibility to evaluate an inverter with multiple MPPT DC inputs. The flexibility of the PV simulator enables the validation of the inverter's capability to handle vastly different array configurations.

Kuszmaul, Scott S.; Gonzalez, Sigifredo; Lucca, Roberto (Ametek Programmable Power, San Diego, CA); Deuel, Don (Ametek Programmable Power, San Diego, CA)

2010-06-01T23:59:59.000Z

337

Validation Program - The Security Content Automation ...  

Science Conference Proceedings (OSTI)

... Information technology Laboratory (ITL). Security Content Automation Protocol (SCAP) Validation Program. The SCAP Validation ...

2013-12-10T23:59:59.000Z

338

FCT Technology Validation: Integrated Projects  

NLE Websites -- All DOE Office Websites (Extended Search)

Integrated Projects to Integrated Projects to someone by E-mail Share FCT Technology Validation: Integrated Projects on Facebook Tweet about FCT Technology Validation: Integrated Projects on Twitter Bookmark FCT Technology Validation: Integrated Projects on Google Bookmark FCT Technology Validation: Integrated Projects on Delicious Rank FCT Technology Validation: Integrated Projects on Digg Find More places to share FCT Technology Validation: Integrated Projects on AddThis.com... Home Transportation Projects Stationary/Distributed Generation Projects Integrated Projects DOE Projects Non-DOE Projects Quick Links Hydrogen Production Hydrogen Delivery Hydrogen Storage Fuel Cells Manufacturing Codes & Standards Education Systems Analysis Contacts Integrated Projects To maximize overall system efficiencies, reduce costs, and optimize

339

A toolbox for calculating net anthropogenic nitrogen inputs (NANI)  

Science Conference Proceedings (OSTI)

The ''Net Anthropogenic Nitrogen Input'' (NANI) to a region represents an estimate of anthropogenic net nitrogen (N) fluxes across its boundaries, and is thus a measure of the effect of human activity on the regional nitrogen cycle. NANI accounts for ... Keywords: Anthropogenic, Nitrogen, Synthesis, Toolbox, Watershed

Bongghi Hong; Dennis P. Swaney; Robert W. Howarth

2011-05-01T23:59:59.000Z

340

Coupled Thermal-Chemical-Mechanical Modeling of Validation Cookoff Experiments  

DOE Green Energy (OSTI)

The cookoff of energetic materials involves the combined effects of several physical and chemical processes. These processes include heat transfer, chemical decomposition, and mechanical response. The interaction and coupling between these processes influence both the time-to-event and the violence of reaction. The prediction of the behavior of explosives during cookoff, particularly with respect to reaction violence, is a challenging task. To this end, a joint DoD/DOE program has been initiated to develop models for cookoff, and to perform experiments to validate those models. In this paper, a series of cookoff analyses are presented and compared with data from a number of experiments for the aluminized, RDX-based, Navy explosive PBXN-109. The traditional thermal-chemical analysis is used to calculate time-to-event and characterize the heat transfer and boundary conditions. A reaction mechanism based on Tarver and McGuire's work on RDX{sup 2} was adjusted to match the spherical one-dimensional time-to-explosion data. The predicted time-to-event using this reaction mechanism compares favorably with the validation tests. Coupled thermal-chemical-mechanical analysis is used to calculate the mechanical response of the confinement and the energetic material state prior to ignition. The predicted state of the material includes the temperature, stress-field, porosity, and extent of reaction. There is little experimental data for comparison to these calculations. The hoop strain in the confining steel tube gives an estimation of the radial stress in the explosive. The inferred pressure from the measured hoop strain and calculated radial stress agree qualitatively. However, validation of the mechanical response model and the chemical reaction mechanism requires more data. A post-ignition burn dynamics model was applied to calculate the confinement dynamics. The burn dynamics calculations suffer from a lack of characterization of the confinement for the flaw-dominated failure mode experienced in the tests. High-pressure burning rates are needed for more detailed post-ignition studies. Sub-models for chemistry, mechanical response and burn dynamics need to be validated against data from less complex experiments. The sub-models can then be used in integrated analysis for comparison with experimental data taken during integrated tests.

ERIKSON,WILLIAM W.; SCHMITT,ROBERT G.; ATWOOD,A.I.; CURRAN,P.D.

2000-11-27T23:59:59.000Z

Note: This page contains sample records for the topic "input validation flaw" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Total Refinery Net Input of Crude Oil and Petroleum Products  

U.S. Energy Information Administration (EIA) Indexed Site

Input Input Product: Total Crude Oil & Petroleum Products Crude Oil Natural Gas Plant Liquids Pentanes Plus Liquefied Petroleum Gases Normal Butane Isobutane Other Liquids Hydrogen/Oxygenates/Renewables/Other Hydrocarbons Hydrogen Oxygenates (excl. Fuel Ethanol) Methyl Tertiary Butyl Ether (MTBE) All Other Oxygenates Renewable Fuels (incl. Fuel Ethanol) Fuel Ethanol Renewable Diesel Fuel Other Renewable Fuels Other Hydrocarbons Unfinished Oils (net) Unfinished Oils, Naphthas and Lighter Unfinished Oils, Kerosene and Light Gas Oils Unfinished Oils, Heavy Gas Oils Residuum Motor Gasoline Blending Components (MGBC) (net) MGBC - Reformulated MGBC - Reformulated - RBOB MGBC - Reformulated, RBOB for Blending w/ Alcohol MGBC - Reformulated, RBOB for Blending w/ Ether MGBC - Conventional MGBC - CBOB MGBC - Conventional, GTAB MGBC - Other Conventional Aviation Gasoline Blending Components (net) Alaskan Crude Oil Receipts Period-Unit: Monthly-Thousand Barrels Monthly-Thousand Barrels per Day Annual-Thousand Barrels Annual-Thousand Barrels per Day

342

Agricultural and Environmental Input Parameters for the Biosphere Model  

SciTech Connect

This analysis is one of 10 technical reports that support the Environmental Radiation Model for Yucca Mountain Nevada (ERMYN) (i.e., the biosphere model). It documents development of agricultural and environmental input parameters for the biosphere model, and supports the use of the model to develop biosphere dose conversion factors (BDCFs). The biosphere model is one of a series of process models supporting the total system performance assessment (TSPA) for the repository at Yucca Mountain. The ERMYN provides the TSPA with the capability to perform dose assessments. A graphical representation of the documentation hierarchy for the ERMYN is presented in Figure 1-1. This figure shows the interrelationships between the major activities and their products (the analysis and model reports) that were planned in ''Technical Work Plan for Biosphere Modeling and Expert Support'' (BSC 2004 [DIRS 169573]). The ''Biosphere Model Report'' (BSC 2004 [DIRS 169460]) describes the ERMYN and its input parameters.

K. Rasmuson; K. Rautenstrauch

2004-09-14T23:59:59.000Z

343

Refinery & Blenders Net Input of Crude Oil  

U.S. Energy Information Administration (EIA) Indexed Site

Input Input Product: Total Crude Oil & Petroleum Products Crude Oil Natural Gas Plant Liquids and Liquefied Refinery Gases Pentanes Plus Liquefied Petroleum Gases Ethane Normal Butane Isobutane Other Liquids Hydrogen/Oxygenates/Renewables/Other Hydrocarbons Hydrogen Oxygenates (excl. Fuel Ethanol) Methyl Tertiary Butyl Ether (MTBE) All Other Oxygenates Renewable Fuels (incl. Fuel Ethanol) Fuel Ethanol Renewable Diesel Fuel Other Renewable Fuels Other Hydrocarbons Unfinished Oils (net) Unfinished Oils, Naphthas and Lighter Unfinished Oils, Kerosene and Light Gas Oils Unfinished Oils, Heavy Gas Oils Residuum Motor Gasoline Blending Components (MGBC) (net) MGBC - Reformulated MGBC - Reformulated - RBOB MGBC - Reformulated, RBOB for Blending w/ Alcohol MGBC - Reformulated, RBOB for Blending w/ Ether MGBC - Reformulated, GTAB MGBC - Conventional MGBC - CBOB MGBC - Conventional, GTAB MGBC - Other Conventional Aviation Gasoline Blending Components (net) Period-Unit: Monthly-Thousand Barrels Monthly-Thousand Barrels per Day Annual-Thousand Barrels Annual-Thousand Barrels per Day

344

Documentation of Calculation Methodology, Input Data, and Infrastructure  

NLE Websites -- All DOE Office Websites (Extended Search)

Documentation of Calculation Methodology, Input Data, and Infrastructure Documentation of Calculation Methodology, Input Data, and Infrastructure for the Home Energy Saver Web Site Title Documentation of Calculation Methodology, Input Data, and Infrastructure for the Home Energy Saver Web Site Publication Type Report LBNL Report Number LBNL-51938 Year of Publication 2005 Authors Pinckard, Margaret J., Richard E. Brown, Evan Mills, James D. Lutz, Mithra M. Moezzi, Celina S. Atkinson, Christopher A. Bolduc, Gregory K. Homan, and Katie Coughlin Document Number LBNL-51938 Pagination 108 Date Published July 13 Publisher Lawrence Berkeley National Laboratory City Berkeley Abstract The Home Energy Saver (HES, http://HomeEnergySaver.lbl.gov) is an interactive web site designed to help residential consumers make decisions about energy use in their homes. This report describes the underlying methods and data for estimating energy consumption. Using engineering models, the site estimates energy consumption for six major categories (end uses); heating, cooling, water heating, major appliances, lighting, and miscellaneous equipment. The approach taken by the Home Energy Saver is to provide users with initial results based on a minimum of user input, allowing progressively greater control in specifying the characteristics of the house and energy consuming appliances. Outputs include energy consumption (by fuel and end use), energy-related emissions (carbon dioxide), energy bills (total and by fuel and end use), and energy saving recommendations. Real-world electricity tariffs are used for many locations, making the bill estimates even more accurate. Where information about the house is not available from the user, default values are used based on end-use surveys and engineering studies. An extensive body of qualitative decision-support information augments the analytical results.

345

ALEGRA -- code validation: Experiments and simulations  

SciTech Connect

In this study, the authors are providing an experimental test bed for validating features of the ALEGRA code over a broad range of strain rates with overlapping diagnostics that encompass the multiple responses. A unique feature of the Arbitrary Lagrangian Eulerian Grid for Research Applications (ALEGRA) code is that it allows simultaneous computational treatment, within one code, of a wide range of strain-rates varying from hydrodynamic to structural conditions. This range encompasses strain rates characteristic of shock-wave propagation (10{sup 7}/s) and those characteristic of structural response (10{sup 2}/s). Most previous code validation experimental studies, however, have been restricted to simulating or investigating a single strain-rate regime. What is new and different in this investigation is that the authors have performed well-instrumented experiments which capture features relevant to both hydrodynamic and structural response in a single experiment. Aluminum was chosen for use in this study because it is a well characterized material--its EOS and constitutive material properties are well defined over a wide range of loading rates. The current experiments span strain rate regimes of over 10{sup 7}/s to less than 10{sup 2}/s in a single experiment. The input conditions are extremely well defined. Velocity interferometers are used to record the high strain-rate response, while low strain rate data were collected using strain gauges.

Chhabildas, L.C.; Konrad, C.H.; Mosher, D.A.; Reinhart, W.D; Duggins, B.D.; Rodeman, R.; Trucano, T.G.; Summers, R.M.; Peery, J.S.

1998-03-16T23:59:59.000Z

346

North Dakota Natural Gas Input Supplemental Fuels (Million Cubic Feet)  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (Million Cubic Feet) Input Supplemental Fuels (Million Cubic Feet) North Dakota Natural Gas Input Supplemental Fuels (Million Cubic Feet) Decade Year-0 Year-1 Year-2 Year-3 Year-4 Year-5 Year-6 Year-7 Year-8 Year-9 1960's 0 0 0 1970's 0 0 0 0 0 0 0 0 0 0 1980's 196 417 102 0 8,335 40,370 49,847 51,543 49,014 54,408 1990's 53,144 52,557 58,496 57,680 57,127 57,393 55,867 53,179 54,672 53,185 2000's 49,190 51,004 53,184 53,192 47,362 51,329 54,361 51,103 50,536 53,495 2010's 54,813 51,303 52,541 - = No Data Reported; -- = Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Release Date: 12/12/2013 Next Release Date: 1/7/2014 Referring Pages: Total Supplemental Supply of Natural Gas

347

New Jersey Natural Gas Input Supplemental Fuels (Million Cubic Feet)  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (Million Cubic Feet) Input Supplemental Fuels (Million Cubic Feet) New Jersey Natural Gas Input Supplemental Fuels (Million Cubic Feet) Decade Year-0 Year-1 Year-2 Year-3 Year-4 Year-5 Year-6 Year-7 Year-8 Year-9 1960's 0 0 0 1970's 0 0 0 0 0 0 0 0 0 0 1980's 9,574 11,504 9,786 9,896 8,616 13,421 12,099 13,774 14,846 14,539 1990's 9,962 14,789 14,362 14,950 7,737 7,291 6,778 6,464 9,082 5,761 2000's 8,296 12,330 3,526 473 530 435 175 379 489 454 2010's 457 392 139 - = No Data Reported; -- = Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Release Date: 12/12/2013 Next Release Date: 1/7/2014 Referring Pages: Total Supplemental Supply of Natural Gas New Jersey Supplemental Supplies of Natural Gas

348

Nebraska Natural Gas Input Supplemental Fuels (Million Cubic Feet)  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (Million Cubic Feet) Input Supplemental Fuels (Million Cubic Feet) Nebraska Natural Gas Input Supplemental Fuels (Million Cubic Feet) Decade Year-0 Year-1 Year-2 Year-3 Year-4 Year-5 Year-6 Year-7 Year-8 Year-9 1960's 0 0 0 1970's 0 0 0 0 0 0 0 0 0 0 1980's 9 1,838 63 2,006 2,470 2,689 2,142 2,199 1,948 2,088 1990's 2,361 2,032 1,437 791 890 15 315 134 11 4 2000's 339 6 1 13 39 16 19 33 28 18 2010's 12 9 4 - = No Data Reported; -- = Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Release Date: 12/12/2013 Next Release Date: 1/7/2014 Referring Pages: Total Supplemental Supply of Natural Gas Nebraska Supplemental Supplies of Natural Gas Supplies of Natural Gas Supplemental Fuels (Annual Supply &

349

Michigan Natural Gas Input Supplemental Fuels (Million Cubic Feet)  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (Million Cubic Feet) Input Supplemental Fuels (Million Cubic Feet) Michigan Natural Gas Input Supplemental Fuels (Million Cubic Feet) Decade Year-0 Year-1 Year-2 Year-3 Year-4 Year-5 Year-6 Year-7 Year-8 Year-9 1960's 0 0 0 1970's 0 0 0 0 0 0 0 0 0 0 1980's 3 3,038 2,473 2,956 2,773 2,789 2,754 2,483 2,402 2,402 1990's 19,106 15,016 14,694 12,795 13,688 21,378 21,848 22,238 21,967 20,896 2000's 12,423 4,054 0 0 0 0 0 0 0 0 2010's 0 0 0 - = No Data Reported; -- = Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Release Date: 12/12/2013 Next Release Date: 1/7/2014 Referring Pages: Total Supplemental Supply of Natural Gas Michigan Supplemental Supplies of Natural Gas

350

Colorado Natural Gas Input Supplemental Fuels (Million Cubic Feet)  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (Million Cubic Feet) Input Supplemental Fuels (Million Cubic Feet) Colorado Natural Gas Input Supplemental Fuels (Million Cubic Feet) Decade Year-0 Year-1 Year-2 Year-3 Year-4 Year-5 Year-6 Year-7 Year-8 Year-9 1960's 0 0 0 1970's 0 0 0 0 0 0 0 0 0 0 1980's 9,868 9,133 8,877 7,927 9,137 8,934 8,095 8,612 10,322 9,190 1990's 15,379 6,778 7,158 8,456 8,168 7,170 6,787 6,314 5,292 4,526 2000's 4,772 5,625 5,771 5,409 5,308 5,285 6,149 6,869 6,258 7,527 2010's 5,148 4,268 4,412 - = No Data Reported; -- = Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Release Date: 12/12/2013 Next Release Date: 1/7/2014 Referring Pages: Total Supplemental Supply of Natural Gas Colorado Supplemental Supplies of Natural Gas

351

Ohio Natural Gas Input Supplemental Fuels (Million Cubic Feet)  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (Million Cubic Feet) Input Supplemental Fuels (Million Cubic Feet) Ohio Natural Gas Input Supplemental Fuels (Million Cubic Feet) Decade Year-0 Year-1 Year-2 Year-3 Year-4 Year-5 Year-6 Year-7 Year-8 Year-9 1960's 0 0 0 1970's 0 0 0 0 0 0 0 0 0 0 1980's 69,169 69,850 64,812 62,032 43,866 24,444 5,182 18 44 348 1990's 849 891 1,051 992 1,432 904 1,828 1,423 1,194 1,200 2000's 1,442 1,149 79 1,002 492 579 423 608 460 522 2010's 353 296 366 - = No Data Reported; -- = Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Release Date: 12/12/2013 Next Release Date: 1/7/2014 Referring Pages: Total Supplemental Supply of Natural Gas Ohio Supplemental Supplies of Natural Gas Supplies of Natural Gas Supplemental Fuels (Annual Supply &

352

Hawaii Natural Gas Input Supplemental Fuels (Million Cubic Feet)  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (Million Cubic Feet) Input Supplemental Fuels (Million Cubic Feet) Hawaii Natural Gas Input Supplemental Fuels (Million Cubic Feet) Decade Year-0 Year-1 Year-2 Year-3 Year-4 Year-5 Year-6 Year-7 Year-8 Year-9 1980's 3,190 2,993 2,899 2,775 2,449 2,655 2,630 2,461 2,801 2,844 1990's 2,817 2,725 2,711 2,705 2,831 2,793 2,761 2,617 2,715 2,752 2000's 2,769 2,689 2,602 2,602 2,626 2,606 2,613 2,683 2,559 2,447 2010's 2,472 2,467 2,510 - = No Data Reported; -- = Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Release Date: 12/12/2013 Next Release Date: 1/7/2014 Referring Pages: Total Supplemental Supply of Natural Gas Hawaii Supplemental Supplies of Natural Gas Supplies of Natural Gas Supplemental Fuels (Annual Supply &

353

Massachusetts Natural Gas Input Supplemental Fuels (Million Cubic Feet)  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (Million Cubic Feet) Input Supplemental Fuels (Million Cubic Feet) Massachusetts Natural Gas Input Supplemental Fuels (Million Cubic Feet) Decade Year-0 Year-1 Year-2 Year-3 Year-4 Year-5 Year-6 Year-7 Year-8 Year-9 1960's 0 0 0 1970's 0 0 0 0 0 0 0 0 0 0 1980's 15,366 21,828 17,586 10,732 6,545 3,668 2,379 1,404 876 692 1990's 317 120 105 61 154 420 426 147 68 134 2000's 26 16 137 324 80 46 51 15 13 10 2010's 0 - = No Data Reported; -- = Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Release Date: 12/12/2013 Next Release Date: 1/7/2014 Referring Pages: Total Supplemental Supply of Natural Gas Massachusetts Supplemental Supplies of Natural Gas Supplies of Natural Gas Supplemental Fuels (Annual Supply &

354

Indiana Natural Gas Input Supplemental Fuels (Million Cubic Feet)  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (Million Cubic Feet) Input Supplemental Fuels (Million Cubic Feet) Indiana Natural Gas Input Supplemental Fuels (Million Cubic Feet) Decade Year-0 Year-1 Year-2 Year-3 Year-4 Year-5 Year-6 Year-7 Year-8 Year-9 1960's 0 0 0 1970's 0 0 0 0 0 0 0 0 0 0 1980's 1,602 5,056 3,496 4,142 4,027 2,711 2,351 3,890 4,243 3,512 1990's 3,015 3,077 3,507 3,232 2,457 3,199 3,194 3,580 3,149 5,442 2000's 5,583 5,219 1,748 2,376 2,164 1,988 1,642 635 30 1 2010's 1 5 1 - = No Data Reported; -- = Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Release Date: 12/12/2013 Next Release Date: 1/7/2014 Referring Pages: Total Supplemental Supply of Natural Gas Indiana Supplemental Supplies of Natural Gas

355

PERSPECTIVES ON A DOE CONSEQUENCE INPUTS FOR ACCIDENT ANALYSIS APPLICATIONS  

Science Conference Proceedings (OSTI)

Department of Energy (DOE) accident analysis for establishing the required control sets for nuclear facility safety applies a series of simplifying, reasonably conservative assumptions regarding inputs and methodologies for quantifying dose consequences. Most of the analytical practices are conservative, have a technical basis, and are based on regulatory precedent. However, others are judgmental and based on older understanding of phenomenology. The latter type of practices can be found in modeling hypothetical releases into the atmosphere and the subsequent exposure. Often the judgments applied are not based on current technical understanding but on work that has been superseded. The objective of this paper is to review the technical basis for the major inputs and assumptions in the quantification of consequence estimates supporting DOE accident analysis, and to identify those that could be reassessed in light of current understanding of atmospheric dispersion and radiological exposure. Inputs and assumptions of interest include: Meteorological data basis; Breathing rate; and Inhalation dose conversion factor. A simple dose calculation is provided to show the relative difference achieved by improving the technical bases.

(NOEMAIL), K; Jonathan Lowrie, J; David Thoman (NOEMAIL), D; Austin Keller (NOEMAIL), A

2008-07-30T23:59:59.000Z

356

Illinois Natural Gas Input Supplemental Fuels (Million Cubic Feet)  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (Million Cubic Feet) Input Supplemental Fuels (Million Cubic Feet) Illinois Natural Gas Input Supplemental Fuels (Million Cubic Feet) Decade Year-0 Year-1 Year-2 Year-3 Year-4 Year-5 Year-6 Year-7 Year-8 Year-9 1960's 0 0 0 1970's 0 0 0 0 0 0 0 0 0 0 1980's 36,713 29,509 19,005 19,734 17,308 19,805 22,980 12,514 9,803 9,477 1990's 8,140 6,869 8,042 9,760 7,871 6,256 3,912 4,165 2,736 2,527 2000's 1,955 763 456 52 14 15 13 11 15 20 2010's 17 1 1 - = No Data Reported; -- = Not Applicable; NA = Not Available; W = Withheld to avoid disclosure of individual company data. Release Date: 12/12/2013 Next Release Date: 1/7/2014 Referring Pages: Total Supplemental Supply of Natural Gas Illinois Supplemental Supplies of Natural Gas

357

Navy Technology Validation (Techval)  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Technology Technology Validation (Techval) FUPWG Spring Meeting 2008 April 15, 2008 Destin, FL Paul Kistler, PE CEM NAVFAC Engineering Service Center Port Hueneme CA Navy Techval CURRENT PROJECTS * Cool Roof reflective roof coating  NS Pearl Harbor HI * Thermal Destratifiers  NAS Oceana VA * Boiler Combustion Controls  USNA Annapolis MD * Sand Filters  NAS Lemoore CA * Spectrally Enhanced Lighting  Navy Yard Washington DC * Desuperheater  NS Norfolk VA  NAS North Island CA * HVAC CO2 Controls  NAB Little Creek VA  NAVSUPPACT Mid-South TN  NB Kitsap Bremerton WA *HVAC Occupancy Controls NAS Oceana VA *Electromagnetic Pulse Water Treatment NADEP San Diego CA NSY Puget Sound WA *LED Parking Lot Lighting NBVC Port Hueneme CA Techval

358

Design and analysis tool validation  

DOE Green Energy (OSTI)

The Solar Energy Research Institute (SERI) is developing a procedure for the validation of Building Energy Analysis Simulation Codes (BEAS). These codes are being used increasingly in the building design process, both directly and as the basis for simplified design tools and guidelines. The importance of the validity of the BEAS in predicting building energy performance is obvious when one considers the money and energy that could be wasted by energy-inefficient designs. However, to date, little or no systematic effort has been made to ensure the validity of the various BEAS. The validation work at SERI consists of three distinct parts: Comparative Study, Analytical Verification, and Empirical Validation. The procedures have been developed for the first two parts and have been implemented on a sampling of the major BEAS; results have shown major problems in one of the BEAS tested. Furthermore, when one building design was run using several of the BEAS, large differences were found in the predicted annual cooling and heating loads. The empirical validation procedure has been developed, and five two-zone test cells have been constructed for validation; a summer validation run will take place as soon as the data acquisition system is completed. Additionally, a test validation exercise is now in progress using the low-cal house to fine-tune the empirical validation procedure and better define monitoring data requirements.

Judkoff, R.

1981-07-01T23:59:59.000Z

359

Current mode instrumentation amplifier with rail-to-rail input and output  

Science Conference Proceedings (OSTI)

A Current Mode Instrumentation Amplifier with rail-to-rail input and output is presented. It is based on constant gm input stages, and cascode output stages. Although this CMIA structure has a good Input Common Mode Voltage, it suffers from a poor output ... Keywords: analog integrated circuits, current mode instrumentation amplifier, rail-to-rail input and output

Filipe Costa Beber Vieira; Cesar Augusto Prior; Cesar Ramos Rodrigues; Leonardo Perin; Joao Baptista dos Santos Martins

2007-09-01T23:59:59.000Z

360

Development and validation of bonded composite doubler repairs for commercial aircraft.  

Science Conference Proceedings (OSTI)

A typical aircraft can experience over 2,000 fatigue cycles (cabin pressurizations) and even greater flight hours in a single year. An unavoidable by-product of aircraft use is that crack, impact, and corrosion flaws develop throughout the aircraft's skin and substructure elements. Economic barriers to the purchase of new aircraft have placed even greater demands on efficient and safe repair methods. The use of bonded composite doublers offers the airframe manufacturers and aircraft maintenance facilities a cost effective method to safely extend the lives of their aircraft. Instead of riveting multiple steel or aluminum plates to facilitate an aircraft repair, it is now possible to bond a single Boron-Epoxy composite doubler to the damaged structure. The FAA's Airworthiness Assurance Center at Sandia National Labs (AANC), Boeing, and Federal Express completed a pilot program to validate and introduce composite doubler repair technology to the U.S. commercial aircraft industry. This project focused on repair of DC-10 fuselage structure and its primary goal was to demonstrate routine use of this repair technology using niche applications that streamline the design-to-installation process. As composite doubler repairs gradually appear in the commercial aircraft arena, successful flight operation data is being accumulated. These commercial aircraft repairs are not only demonstrating the engineering and economic advantages of composite doubler technology but they are also establishing the ability of commercial maintenance depots to safely adopt this repair technique. This report presents the array of engineering activities that were completed in order to make this technology available for widespread commercial aircraft use. Focused laboratory testing was conducted to compliment the field data and to address specific issues regarding damage tolerance and flaw growth in composite doubler repairs. Fatigue and strength tests were performed on a simulated wing repair using a substandard design and a flawed installation. In addition, the new Sol-Gel surface preparation technique was evaluated. Fatigue coupon tests produced Sol-Gel results that could be compared with a large performance database from conventional, riveted repairs. It was demonstrated that not only can composite doublers perform well in severe off-design conditions (low doubler stiffness and presence of defects in doubler installation) but that the Sol-Gel surface preparation technique is easier and quicker to carry out while still producing optimum bonding properties. Nondestructive inspection (NDI) methods were developed so that the potential for disbond and delamination growth could be monitored and crack growth mitigation could be quantified. The NDI methods were validated using full-scale test articles and the FedEx aircraft installations. It was demonstrated that specialized NDI techniques can detect flaws in composite doubler installations before they reach critical size. Probability of Detection studies were integrated into the FedEx training in order to quantify the ability of aircraft maintenance depots to properly monitor these repairs. In addition, Boeing Structural Repair and Nondestructive Testing Manuals were modified to include composite doubler repair and inspection procedures. This report presents the results from the FedEx Pilot Program that involved installation and surveillance of numerous repairs on operating aircraft. Results from critical NDI evaluations are reported in light of damage tolerance assessments for bonded composite doublers. This work has produced significant interest from airlines and aircraft manufacturers. The successful Pilot Program produced flight performance history to establish the durability of bonded composite patches as a permanent repair on commercial aircraft structures. This report discusses both the laboratory data and Pilot Program results from repair installations on operating aircraft to introduce composite doubler repairs into mainstream commercial aircraft use.

Roach, Dennis Patrick; Rackow, Kirk A.

2007-07-01T23:59:59.000Z

Note: This page contains sample records for the topic "input validation flaw" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

September 10, 2012 September 10, 2012 U-254: Webmin Flaws Let Remote Authenticated Users Execute Arbitrary Code and View Arbitrary Files Webmin Multiple Input Validation Vulnerabilities September 6, 2012 U-252: Barracuda Web Filter Input Validation Flaws Permit Cross-Site Scripting Attacks Barracuda Web Filter Authentification Module Multiple HTML Injection Vulnerabilities September 5, 2012 U-251: Bugzilla LDAP Injection and Information Disclosure Vulnerabilities Bugzilla is prone to an LDAP-injection vulnerability and an information-disclosure vulnerability September 4, 2012 U-250: Wireshark DRDA Dissector Flaw Lets Remote Users Deny Service Wireshark is prone to a denial-of-service vulnerability. August 30, 2012 U-248: Symantec Messaging Gateway Multiple Flaws Let Remote Users Access

362

Characterization of industrial process waste heat and input heat streams  

SciTech Connect

The nature and extent of industrial waste heat associated with the manufacturing sector of the US economy are identified. Industry energy information is reviewed and the energy content in waste heat streams emanating from 108 energy-intensive industrial processes is estimated. Generic types of process equipment are identified and the energy content in gaseous, liquid, and steam waste streams emanating from this equipment is evaluated. Matchups between the energy content of waste heat streams and candidate uses are identified. The resultant matrix identifies 256 source/sink (waste heat/candidate input heat) temperature combinations. (MHR)

Wilfert, G.L.; Huber, H.B.; Dodge, R.E.; Garrett-Price, B.A.; Fassbender, L.L.; Griffin, E.A.; Brown, D.R.; Moore, N.L.

1984-05-01T23:59:59.000Z

363

Separate Training Influences Relative Validity  

E-Print Network (OSTI)

concurrent inhibitory training of B were to alter respondingComparative Psychology Separate Training Influences RelativeDuring relative validity training, X was reinforced when

Mehta, Rick; Dumont, Jamie-Lynne; Combiadakis, Sharon; Williams, Douglas A.

2004-01-01T23:59:59.000Z

364

Residential oil burners with low input and two stages firing  

SciTech Connect

The residential oil burner market is currently dominated by the pressure-atomized, retention head burner. At low firing rates pressure atomizing nozzles suffer rapid fouling of the small internal passages, leading to bad spray patterns and poor combustion performance. To overcome the low input limitations of conventional burners, a low pressure air-atomized burner has been developed watch can operate at fining rates as low as 0.25 gallons of oil per hour (10 kW). In addition, the burner can be operated in a high/low fining rate mode. Field tests with this burner have been conducted at a fixed input rate of 0.35 gph (14 kW) with a side-wall vented boiler/water storage tank combination. At the test home, instrumentation was installed to measure fuel and energy flows and record trends in system temperatures. Laboratory efficiency testing with water heaters and boilers has been completed using standard single purpose and combined appliance test procedures. The tests quantify benefits due to low firing rates and other burner features. A two stage oil burner gains a strong advantage in rated efficiency while maintaining capacity for high domestic hot water and space heating loads.

Butcher, T.; Krajewski, R.; Leigh, R. [and others

1997-12-31T23:59:59.000Z

365

Design of the spoke cavity ED&D input coupler.  

DOE Green Energy (OSTI)

The current design of the Accelerator Driven Test Facility (ADTF) accelerator contains multiple {beta}, superconducting, resonant cavities. Spoke-type resonators ({beta} = 0.175 and {beta} = 0.34) are proposed for the low energy linac immediately following the radio frequency quadrupole. A continuous wave power requirement of 8.5 - 211.8 kW, 350 MHz has been established for the input couplers of these spoke cavities. The coupler design approach was to have a single input coupler design for beam currents of 13.3 mA and 100 mA and both cavity {beta}'s. The baseline design consists of a half-height WR2300 waveguide section merged with a shorted coaxial conductor. At the transition is a 4.8-mm thick cylindrical ceramic window creating the air/vacuum barrier. The coax is 103-mm inner diameter, 75 Ohm. The coax extends from the short through the waveguide and terminates with an antenna tip in the sidewall of the cavity. A full diameter pumping port is located in the quarter-wave stub to facilitate good vacuum. The coaxial geometry chosen was based on multipacting and thermal design considerations. The coupling coefficient is adjusted by statically adjusting the outer conductor length. The RF-physics, thermal, vacuum, and structural design considerations will be discussed in this paper, in addition to future room temperature testing plans.

Schmierer, E. N. (Eric N.); Chan, K. D. (Kwok-Chi D.); Gentzlinger, R.C. (Robert C.); Haynes, W. B. (William B.); Krawczyk, F. L. (Frank L.); Montoya, D. I. (Debbie I.); Roybal, P. L. (Phillip L.); Schrage, D. L. (Dale L.); Tajima, T. (Tsuyoshi)

2001-01-01T23:59:59.000Z

366

US Nuclear Regulatory Commission Input to DOE Request for Information Smart  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

US Nuclear Regulatory Commission Input to DOE Request for US Nuclear Regulatory Commission Input to DOE Request for Information Smart Grid Implementation Input US Nuclear Regulatory Commission Input to DOE Request for Information Smart Grid Implementation Input US Nuclear Regulatory Commission Input to DOE Request for Information Smart Grid Implementation Input. Comments relevant to the following two sections of the RFI: "Long Term Issues: Managing a Grid with High Penetration of New Technologies" and "Reliability and Cyber-Security," US Nuclear Regulatory Commission Input to DOE Request for Information Smart Grid Implementation Input More Documents & Publications Comments of DRSG to DOE Smart Grid RFI: Addressing Policy and Logistical Challenges Reply Comments of Entergy Services, Inc. Progress Energy draft regarding Smart Grid RFI: Addressing Policy and

367

Prototype Validation Exercise (PROVE) Project  

NLE Websites -- All DOE Office Websites (Extended Search)

Validation > PROVE Validation > PROVE The Prototype Validation Exercise (PROVE) Project Overview The Prototype Validation Exercise (PROVE) was a mini field campaign conducted at the Jornada Experimental Range in the Chihuahuan Desert, near Las Cruces, New Mexico in May 1997. The goals of PROVE were to: Gain experience in the collection and use of field data for EOS product validation Develop protocols for coordination, measurement, and data archival Compile a synoptic land and atmospheric data set for testing algorithms The remote-sensing portion of PROVE involved investigators from three NASA Earth Observing System (EOS) instrument teams: MODIS (Moderate-Resolution Imaging Spectrometer) ASTER (Advanced Space-borne Thermal Emission and Reflectance Radiometer) MISR (Multi-Angle Imaging Spectro Radiometer)

368

MULTIPLE INPUT BINARY ADDER EMPLOYING MAGNETIC DRUM DIGITAL COMPUTING APPARATUS  

DOE Patents (OSTI)

A digital computing apparatus is described for adding a plurality of multi-digit binary numbers. The apparatus comprises a rotating magnetic drum, a recording head, first and second reading heads disposed adjacent to the first and second recording tracks, and a series of timing signals recorded on the first track. A series of N groups of digit-representing signals is delivered to the recording head at time intervals corresponding to the timing signals, each group consisting of digits of the same significance in the numbers, and the signal series is recorded on the second track of the drum in synchronism with the timing signals on the first track. The multistage registers are stepped cyclically through all positions, and each of the multistage registers is coupled to the control lead of a separate gate circuit to open the corresponding gate at only one selected position in each cycle. One of the gates has its input coupled to the bistable element to receive the sum digit, and the output lead of this gate is coupled to the recording device. The inputs of the other gates receive the digits to be added from the second reading head, and the outputs of these gates are coupled to the adding register. A phase-setting pulse source is connected to each of the multistage registers individually to step the multistage registers to different initial positions in the cycle, and the phase-setting pulse source is actuated each N time interval to shift a sum digit to the bistable element, where the multistage register coupled to bistable element is operated by the phase- setting pulse source to that position in its cycle N steps before opening the first gate, so that this gate opens in synchronism with each of the shifts to pass the sum digits to the recording head.

Cooke-Yarborough, E.H.

1960-12-01T23:59:59.000Z

369

Validation of the RESRAD-RECYCLE computer code.  

SciTech Connect

The RESRAD-RECYCLE computer code was developed by Argonne National Laboratory under the sponsorship of the U.S. Department of Energy. It was designed to analyze potential radiation exposures resulting from the reuse and recycling of radioactively contaminated scrap metal and equipment. It was one of two codes selected in an international model validation study concerning recycling of radioactively contaminated metals. In the validation study, dose measurements at various stages of melting a spent nuclear fuel rack at Studsvik RadWaste AB, Sweden, were collected and compared with modeling results. The comparison shows that the RESRAD-RECYCLE results agree fairly well with the measurement data. Among the scenarios considered, dose results and measurement data agree within a factor of 6. Discrepancies may be explained by the geometrical limitation of the RESRAD-RECYCLE's external exposure model, the dynamic nature of the recycling activities, and inaccuracy in the input parameter values used in dose calculations.

Cheng, J.-J.; Yu, C.; Williams, W. A.; Murphie, W.

2002-02-01T23:59:59.000Z

370

Input-output theory for waveguide QED with an ensemble of inhomogeneous atoms  

E-Print Network (OSTI)

We study the collective effects that emerge in waveguide quantum electrodynamics where several (artificial) atoms are coupled to a one-dimensional (1D) superconducting transmission line. Since single microwave photons can travel without loss for a long distance along the line, real and virtual photons emitted by one atom can be reabsorbed or scattered by a second atom. Depending on the distance between the atoms, this collective effect can lead to super- and subradiance or to a coherent exchange-type interaction between the atoms. Changing the artificial atoms transition frequencies, something which can be easily done with superconducting qubits (two levels artificial atoms), is equivalent to changing the atom-atom separation and thereby opens the possibility to study the characteristics of these collective effects. To study this waveguide quantum electrodynamics system, we extend previous work and present an effective master equation valid for an ensemble of inhomogeneous atoms. Using input-output theory, we compute analytically and numerically the elastic and inelastic scattering and show how these quantities reveal information about collective effects. These theoretical results are compatible with recent experimental results using transmon qubits coupled to a superconducting one-dimensional transmission line [A.F. van Loo {\\it et al.} (2013)].

Kevin Lalumire; Barry C. Sanders; Arjan F. van Loo; Arkady Fedorov; Andreas Wallraff; Alexandre Blais

2013-05-30T23:59:59.000Z

371

Simplified modeling of solar process heating systems using stochastic weather input  

SciTech Connect

A model has been developed which accurately predicts solar district heating and industrial process heating collection performance on a daily basis. The model is system specific with no storage and constant load return temperature. This model was tested for its statistical significance and found to be highly significant. Performance data to construct the model were generated through numerous TRNSYS runs. Physically important variables were then chosen for inclusion in a statistical regression analysis. The variables, which are readily available on a daily basis, were daily radiation, mean twenty-four hour temperature, and collector and system characteristics. The weather input to the model may be real measured radiation values or artificially generated radiation values. The temperature may be daily averages when real radiation values are used or monthly averages when artificial radiation is used. It is shown that there is little difference in prediction when monthly temperature is used rather than the daily values. The performance model was developed from six months of Toronto, Canada, hourly data. The validation was performed with meteorological year locations, Albuquerque, Seattle, and Miami, chosen for climate diversity. The accuracy was excellent, even on a daily basis. A model was then developed from data of all four locations. The artificial data was tested for prediction accuracy for Toronto. Where the beta distribution fit well, the accuracy was good. Where the beta distribution did not fit as well, the accuracy was acceptable.

Boardman, E.C.

1986-01-01T23:59:59.000Z

372

Validation of Hybrid2 with the Froeya Island data set  

DOE Green Energy (OSTI)

To validate the simulation model Hybrid2, the authors simulated the performance of the Froeya system and compared it to measured data. The hybrid system, located on the Norwegian island of Froeya, is a wind/diesel with short-term battery storage and a dump load. Almost 17 days of system operation data are available from EFI, the Norwegian Electrical Research Institute of Norway. The same data set has been used to validate the European Wind Diesel Logistic Modeling Package (WDL) (Infield 1993, 1994). The authors input the measured time series of primary load and wind speed for this validation. As was the case for the validation of WDL, they modified the primary load to account for a gap in the measured energy balance. The wind speed was also corrected to account for the temporary unavailability of the wind turbine. When the Hybrid2 simulation is performed using the EFI input parameters for these components, the simulated energy production of the wind turbine and diesel is within 2% of the measured values. The simulated battery efficiency is much lower than was indicated in the measurements (which may be the case because the Alcad battery that was used in the simulation is not the same as the battery used in the Froeya system). Even so, the role of this short-term storage and the dispatch strategy is well represented, as shown by the good correspondence of 31% between the measured and simulated number of diesel starts. In addition, simulated fuel consumption was within 2% of the measured value, an accuracy sufficient for most design studies.

Dijk, V. van; Baring-Gould, E.I.

1996-06-01T23:59:59.000Z

373

U.S. Natural Gas Input Supplemental Fuels (Million Cubic Feet...  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (Million Cubic Feet) U.S. Natural Gas Input Supplemental Fuels (Million Cubic Feet) Decade Year-0 Year-1 Year-2 Year-3 Year-4 Year-5 Year-6 Year-7 Year-8...

374

Integrating surprisal and uncertain-input models in online sentence comprehension: formal techniques and empirical results  

Science Conference Proceedings (OSTI)

A system making optimal use of available information in incremental language comprehension might be expected to use linguistic knowledge together with current input to revise beliefs about previous input. Under some circumstances, such an error-correction ...

Roger Levy

2011-06-01T23:59:59.000Z

375

Materials Reliability Program: Input for Pressurized Thermal Shock Rulemaking (MRP-248)  

Science Conference Proceedings (OSTI)

The Pressurized Thermal Shock (PTS) rule addresses the risk of a nuclear power plant reactor vessel failing due to propagation of a crack through the vessel wall. If a plant has an emergency cool-down event that superimposes a large thermal transient stress on a large pressure stress in the presence of a pre-existing flaw, it is possible that a crack could initiate and propagate through the vessel wall. The resistance of a vessel to crack initiation and propagation declines as the vessel ages. As a resul...

2008-12-23T23:59:59.000Z

376

Validation of Polarimetric Hail Detection  

Science Conference Proceedings (OSTI)

This study describes, illustrates, and validates hail detection by a simplified version of the National Severe Storms Laboratorys fuzzy logic polarimetric hydrometeor classification algorithm (HCA). The HCA uses four radar variables: ...

Pamela L. Heinselman; Alexander V. Ryzhkov

2006-10-01T23:59:59.000Z

377

A CMOS Voltage Comparator with Rail-to-Rail Input-Range  

Science Conference Proceedings (OSTI)

A simple new continuous-time CMOS comparator circuit with rail-to-rail input common-mode range and rail-to-rail output is presented. This design uses parallel complementary decision paths to accommodate power-supply-valued inputs. The 2 decision results ... Keywords: CMOS continuous-time voltage comparator, rail-to-rail input range

Wei-Shang Chu; K. Wayne Current

1999-05-01T23:59:59.000Z

378

Gross Input to Atmospheric Crude Oil Distillation Units  

U.S. Energy Information Administration (EIA) Indexed Site

Day) Day) Process: Gross Input to Atmospheric Crude Oil Dist. Units Operable Capacity (Calendar Day) Operating Capacity Idle Operable Capacity Operable Utilization Rate Period: Monthly Annual Download Series History Download Series History Definitions, Sources & Notes Definitions, Sources & Notes Show Data By: Process Area Apr-13 May-13 Jun-13 Jul-13 Aug-13 Sep-13 View History U.S. 15,283 15,709 16,327 16,490 16,306 16,162 1985-2013 PADD 1 1,134 1,188 1,178 1,142 1,122 1,130 1985-2013 East Coast 1,077 1,103 1,080 1,058 1,031 1,032 1985-2013 Appalachian No. 1 57 85 98 84 90 97 1985-2013 PADD 2 3,151 3,087 3,336 3,572 3,538 3,420 1985-2013 Ind., Ill. and Ky. 2,044 1,947 2,069 2,299 2,330 2,266 1985-2013

379

,"U.S. Blender Net Input"  

U.S. Energy Information Administration (EIA) Indexed Site

Monthly","9/2013","1/15/2005" Monthly","9/2013","1/15/2005" ,"Release Date:","11/27/2013" ,"Next Release Date:","Last Week of December 2013" ,"Excel File Name:","pet_pnp_inpt3_dc_nus_mbbl_m.xls" ,"Available from Web Page:","http://www.eia.gov/dnav/pet/pet_pnp_inpt3_dc_nus_mbbl_m.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.gov" ,,"(202) 586-8800",,,"11/25/2013 11:22:43 AM" "Back to Contents","Data 1: U.S. Blender Net Input" "Sourcekey","MTXRB_NUS_1","M_EPL0_YIB_NUS_MBBL","MPPRB_NUS_1","M_EPLL_YIB_NUS_MBBL","MBNRB_NUS_1","MBIRB_NUS_1","M_EPOL_YIB_NUS_MBBL","M_EPOOXR_YIB_NUS_MBBL","MMTRB_NUS_1","M_EPOOR_YIB_NUS_MBBL","MFERB_NUS_1","M_EPOORD_YIB_NUS_MBBL","M_EPOORO_YIB_NUS_MBBL","M_EPPU_YIB_NUS_MBBL","M_EPOUN_YIB_NUS_MBBL","M_EPOUK_YIB_NUS_MBBL","M_EPOUH_YIB_NUS_MBBL","M_EPOUR_YIB_NUS_MBBL","MBCRB_NUS_1","MO1RB_NUS_1","M_EPOBGRR_YIB_NUS_MBBL","MO3RB_NUS_1","MO4RB_NUS_1","MO2RB_NUS_1","MO5RB_NUS_1","MO6RB_NUS_1","MO7RB_NUS_1","MO9RB_NUS_1"

380

Interface module for transverse energy input to dye laser modules  

SciTech Connect

An interface module (10) for transverse energy input to dye laser modules is provided particularly for the purpose of delivering enhancing transverse energy beams (36) in the form of illumination bar (54) to the lasing zone (18) of a dye laser device, in particular to a dye laser amplifier (12). The preferred interface module (10) includes an optical fiber array (30) having a plurality of optical fibers (38) arrayed in a co-planar fashion with their distal ends (44) receiving coherent laser energy from an enhancing laser source (46), and their proximal ends (4) delivered into a relay structure (3). The proximal ends (42) of the optical fibers (38) are arrayed so as to be coplanar and to be aimed generally at a common point. The transverse energy beam array (36) delivered from the optical fiber array (30) is acted upon by an optical element array (34) to produce an illumination bar (54) which has a cross section in the form of a elongated rectangle at the position of the lasing window (18). The illumination bar (54) is selected to have substantially uniform intensity throughout.

English, Jr., Ronald E. (Tracy, CA); Johnson, Steve A. (Tracy, CA)

1994-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "input validation flaw" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Interface module for transverse energy input to dye laser modules  

DOE Patents (OSTI)

An interface module for transverse energy input to dye laser modules is provided particularly for the purpose of delivering enhancing transverse energy beams in the form of illumination bar to the lasing zone of a dye laser device, in particular to a dye laser amplifier. The preferred interface module includes an optical fiber array having a plurality of optical fibers arrayed in a co-planar fashion with their distal ends receiving coherent laser energy from an enhancing laser source, and their proximal ends delivered into a relay structure. The proximal ends of the optical fibers are arrayed so as to be coplanar and to be aimed generally at a common point. The transverse energy beam array delivered from the optical fiber array is acted upon by an optical element array to produce an illumination bar which has a cross section in the form of a elongated rectangle at the position of the lasing window. The illumination bar is selected to have substantially uniform intensity throughout. 5 figs.

English, R.E. Jr.; Johnson, S.A.

1994-10-11T23:59:59.000Z

382

KEPLER INPUT CATALOG: PHOTOMETRIC CALIBRATION AND STELLAR CLASSIFICATION  

Science Conference Proceedings (OSTI)

We describe the photometric calibration and stellar classification methods used by the Stellar Classification Project to produce the Kepler Input Catalog (KIC). The KIC is a catalog containing photometric and physical data for sources in the Kepler mission field of view; it is used by the mission to select optimal targets. Four of the visible-light (g, r, i, z) magnitudes used in the KIC are tied to Sloan Digital Sky Survey magnitudes; the fifth (D51) is an AB magnitude calibrated to be consistent with Castelli and Kurucz (CK) model atmosphere fluxes. We derived atmospheric extinction corrections from hourly observations of secondary standard fields within the Kepler field of view. For these filters and extinction estimates, repeatability of absolute photometry for stars brighter than magnitude 15 is typically 2%. We estimated stellar parameters {l_brace}T{sub eff}, log (g), log (Z), E{sub B-V}{r_brace} using Bayesian posterior probability maximization to match observed colors to CK stellar atmosphere models. We applied Bayesian priors describing the distribution of solar-neighborhood stars in the color-magnitude diagram, in log (Z), and in height above the galactic plane. Several comparisons with samples of stars classified by other means indicate that for 4500 K {data archive.

Brown, Timothy M. [Las Cumbres Observatory Global Telescope, Goleta, CA 93117 (United States); Latham, David W.; Esquerdo, Gilbert A. [Harvard-Smithsonian Center for Astrophysics, Cambridge, MA 02138 (United States); Everett, Mark E., E-mail: tbrown@lcogt.net, E-mail: latham@cfa.harvard.edu, E-mail: gesquerd@cfa.harvard.edu, E-mail: everett@noao.edu [National Optical Astronomy Observatories, Tucson, AZ 85721 (United States)

2011-10-15T23:59:59.000Z

383

Verification and validation of simulation models  

Science Conference Proceedings (OSTI)

In this paper we discuss verification and validation of simulation models. Four different approaches to deciding model validity are described; two different paradigms that relate verification and validation to the model development process are presented; ...

Robert G. Sargent

2009-12-01T23:59:59.000Z

384

Proper input phase-space filling for accurate beam-dynamics codes  

Science Conference Proceedings (OSTI)

In the future, more attention will be required concerning the filling of the input phase space used by particle-simulation codes. The prospect of greatly improved particle-tracking codes implies that code input distributions must be accurate models of real input distributions. Much of present simulation work is done using artificial phase-space distributions (K-V, waterbag, etc.). Real beams can differ dramatically from such ideal input. We have already developed a method for deriving code input distributions from measurements. This paper addresses the problem of determining the number of pseudoparticles needed to model the measured distribution properly.

Boicourt, G.P.; Vasquez, M.C.

1986-01-01T23:59:59.000Z

385

On the Value of Input-Efficiency, Capacity-Efficiency, and the Flexibility to Rebalance Them  

E-Print Network (OSTI)

Abstract: A common characteristic of basic material manufacturers (which account for 85 % of all industrial energy use) and of cleantech manufacturers is that they are price-takers in their input and output markets. Variability in those prices has implications for how much a manufacturer should invest in three fundamental types of process improvement. Input price variability reduces the value of improving input-efficiency (output produced per unit input) but increases that of capacityefficiency (the rate at which a production facility can convert input into output). Output price variability increases the value of capacity-efficiency, but it increases the value of input-efficiency if and only if the expected margin is small. Moreover, as the expected input cost rises, the value of input-efficiency decreases. A third type of process improvement is to develop flexibility in inputefficiency versus capacity-efficiency (the ability to respond to a rise in input cost or fall in output price by increasing input-efficiency at the expense of capacity-efficiency). The value of this flexibility decreases with variability in input and output prices, if and only if the expected margin is thin. Together, these results suggest that a carbon tax or cap-and-trade system may reduce investment by basic material manufacturers in improving energy-efficiency.

Erica L. Plambeck; Terry A. Taylor

2013-01-01T23:59:59.000Z

386

FIMS Data Validation | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

FIMS Data Validation FIMS Data Validation Aviation Management Executive Secretariat Energy Reduction at HQ Facilities and Infrastructure Federal Advisory Committee Management...

387

FIMS Data Validation | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Information Systems FIMS Data Validation FIMS Data Validation Aviation Management Executive Secretariat Energy Reduction at HQ Facilities and Infrastructure Federal Advisory...

388

Fuel Cell Technologies Office: Technology Validation  

NLE Websites -- All DOE Office Websites (Extended Search)

Fuel Cell Technologies Office: Technology Validation to someone by E-mail Share Fuel Cell Technologies Office: Technology Validation on Facebook Tweet about Fuel Cell Technologies...

389

Validation of Innovative Exploration Technologies for Newberry...  

Open Energy Info (EERE)

Validation of Innovative Exploration Technologies for Newberry Volcano Geothermal Project Jump to: navigation, search Last modified on July 22, 2011. Project Title Validation of...

390

,"U.S. Refinery Net Input"  

U.S. Energy Information Administration (EIA) Indexed Site

2,"Annual",2012,"6/30/2005" 2,"Annual",2012,"6/30/2005" ,"Data 2","Alaskan Crude Oil Receipts",1,"Annual",2012,"6/30/1986" ,"Release Date:","9/27/2013" ,"Next Release Date:","9/26/2014" ,"Excel File Name:","pet_pnp_inpt2_dc_nus_mbbl_a.xls" ,"Available from Web Page:","http://www.eia.gov/dnav/pet/pet_pnp_inpt2_dc_nus_mbbl_a.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.gov" ,,"(202) 586-8800",,,"11/25/2013 11:21:04 AM" "Back to Contents","Data 1: Refinery Net Input" "Sourcekey","MTTRO_NUS_1","MCRRO_NUS_1","MNGRO_NUS_1","MPPRO_NUS_1","MLPRO_NUS_1","MBNRO_NUS_1","MBIRO_NUS_1","MOLRO_NUS_1","MOHRO_NUS_1","M_EPOOOH_YIY_NUS_MBBL","M_EPOOXXFE_YIY_NUS_MBBL","MMTRO_NUS_1","MOORO_NUS_1","M_EPOOR_YIY_NUS_MBBL","MFERO_NUS_1","M_EPOORD_YIY_NUS_MBBL","M_EPOOOXH_YIY_NUS_MBBL","MUORO_NUS_1","MNLRO_NUS_1","MKORO_NUS_1","MH1RO_NUS_1","MRURO_NUS_1","MBCRO_NUS_1","MO1RO_NUS_1","M_EPOBGRR_YIY_NUS_MBBL","MO3RO_NUS_1","MO4RO_NUS_1","MO5RO_NUS_1","MO6RO_NUS_1","MO7RO_NUS_1","MO9RO_NUS_1","MBARO_NUS_1"

391

,"U.S. Refinery Net Input"  

U.S. Energy Information Administration (EIA) Indexed Site

3,"Monthly","9/2013","1/15/2005" 3,"Monthly","9/2013","1/15/2005" ,"Data 2","Alaskan Crude Oil Receipts",1,"Monthly","9/2013","1/15/1986" ,"Release Date:","11/27/2013" ,"Next Release Date:","Last Week of December 2013" ,"Excel File Name:","pet_pnp_inpt2_dc_nus_mbbl_m.xls" ,"Available from Web Page:","http://www.eia.gov/dnav/pet/pet_pnp_inpt2_dc_nus_mbbl_m.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.gov" ,,"(202) 586-8800",,,"11/25/2013 11:21:05 AM" "Back to Contents","Data 1: Refinery Net Input" "Sourcekey","MTTRO_NUS_1","MCRRO_NUS_1","MNGRO_NUS_1","MPPRO_NUS_1","MLPRO_NUS_1","MBNRO_NUS_1","MBIRO_NUS_1","MOLRO_NUS_1","MOHRO_NUS_1","M_EPOOOH_YIY_NUS_MBBL","M_EPOOXXFE_YIY_NUS_MBBL","MMTRO_NUS_1","MOORO_NUS_1","M_EPOOR_YIY_NUS_MBBL","MFERO_NUS_1","M_EPOORD_YIY_NUS_MBBL","M_EPOORO_YIY_NUS_MBBL","M_EPOOOXH_YIY_NUS_MBBL","MUORO_NUS_1","MNLRO_NUS_1","MKORO_NUS_1","MH1RO_NUS_1","MRURO_NUS_1","MBCRO_NUS_1","MO1RO_NUS_1","M_EPOBGRR_YIY_NUS_MBBL","MO3RO_NUS_1","MO4RO_NUS_1","MO5RO_NUS_1","MO6RO_NUS_1","MO7RO_NUS_1","MO9RO_NUS_1","MBARO_NUS_1"

392

Combined Effects of Gravity, Bending Moment, Bearing Clearance, and Input Torque on Wind Turbine Planetary Gear Load Sharing: Preprint  

DOE Green Energy (OSTI)

This computational work investigates planetary gear load sharing of three-mount suspension wind turbine gearboxes. A three dimensional multibody dynamic model is established, including gravity, bending moments, fluctuating mesh stiffness, nonlinear tooth contact, and bearing clearance. A flexible main shaft, planetary carrier, housing, and gear shafts are modeled using reduced degrees-of-freedom through modal compensation. This drivetrain model is validated against the experimental data of Gearbox Reliability Collaborative for gearbox internal loads. Planet load sharing is a combined effect of gravity, bending moment, bearing clearance, and input torque. Influences of each of these parameters and their combined effects on the resulting planet load sharing are investigated. Bending moments and gravity induce fundamental excitations in the rotating carrier frame, which can increase gearbox internal loads and disturb load sharing. Clearance in carrier bearings reduces the bearing load carrying capacity and thus the bending moment from the rotor can be transmitted into gear meshes. With bearing clearance, the bending moment can cause tooth micropitting and can induce planet bearing fatigue, leading to reduced gearbox life. Planet bearings are susceptible to skidding at low input torque.

Guo, Y.; Keller, J.; LaCava, W.

2012-09-01T23:59:59.000Z

393

Development of Earthquake Ground Motion Input for Preclosure Seismic Design and Postclosure Performance Assessment of a Geologic Repository at Yucca Mountain, NV  

Science Conference Proceedings (OSTI)

This report describes a site-response model and its implementation for developing earthquake ground motion input for preclosure seismic design and postclosure assessment of the proposed geologic repository at Yucca Mountain, Nevada. The model implements a random-vibration theory (RVT), one-dimensional (1D) equivalent-linear approach to calculate site response effects on ground motions. The model provides results in terms of spectral acceleration including peak ground acceleration, peak ground velocity, and dynamically-induced strains as a function of depth. In addition to documenting and validating this model for use in the Yucca Mountain Project, this report also describes the development of model inputs, implementation of the model, its results, and the development of earthquake time history inputs based on the model results. The purpose of the site-response ground motion model is to incorporate the effects on earthquake ground motions of (1) the approximately 300 m of rock above the emplacement levels beneath Yucca Mountain and (2) soil and rock beneath the site of the Surface Facilities Area. A previously performed probabilistic seismic hazard analysis (PSHA) (CRWMS M&O 1998a [DIRS 103731]) estimated ground motions at a reference rock outcrop for the Yucca Mountain site (Point A), but those results do not include these site response effects. Thus, the additional step of applying the site-response ground motion model is required to develop ground motion inputs that are used for preclosure and postclosure purposes.

I. Wong

2004-11-05T23:59:59.000Z

394

MARMOT Validation | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Validation Validation MARMOT Validation January 29, 2013 - 10:35am Addthis The composition-dependent mobility in the formulism of the phase-field modeling is implemented into the MARMOT phase-field algorithm. Benchmarking was done for the MARMOT, finite element (FE)-based phase-field framework that utilizes the new implementation of the variable splitting algorithm. The results indicate that while the variable splitting algorithm executes about eight times faster, the use of higher-order Hermite elements offers faster convergence. A manuscript summarizing these results has been submitted for publication. Work is also continuing on implementing a J2 von-Mises' time-dependent and independent plasticity into the Marmot phase-field algorithm. The current studies do not include adoptive meshing,

395

Validation of Criticality Safety Calculations with SCALE 6.2  

SciTech Connect

SCALE 6.2 provides numerous updates in nuclear data, nuclear data processing, and computational tools utilized in the criticality safety calculational sequences relative to SCALE 6.1. A new 252-group ENDF/B-VII.0 multigroup neutron library, improved ENDF/B-VII.0 continuous energy data, as well as the previously deployed 238-group ENDF/B-VII.0 neutron library are included in SCALE 6.2 for criticality safety analysis. The performance of all three libraries for keff calculations is examined with a broad sampling of critical experiment models covering a range of fuels and moderators. Critical experiments from the International Handbook of Evaluated Criticality Safety Benchmark Experiments (IHECSBE) that are available in the SCALE Verified, Archived Library of Inputs and Data (VALID) are used in this validation effort. Over 300 cases are used in the validation of KENO V.a, and a more limited set of approximately 50 configurations are used for KENO-VI validation. Additionally, some KENO V.a cases are converted to KENO-VI models so that an equivalent set of experiments can be used to validate both codes. For continuous-energy calculations, SCALE 6.2 provides improved performance relative to SCALE 6.1 in most areas with notable improvements in fuel pin lattice cases, particularly those with mixed oxide fuel. Multigroup calculations with the 252-group library also demonstrate improved performance for fuel lattices, uranium (high and intermediate enrichment) and plutonium metal experiments, and plutonium solution systems. Overall, SCALE 6.2 provides equivalent or smaller biases than SCALE 6.1, and the two versions of KENO provide similar results on the same suite of problems.

Marshall, William BJ J [ORNL; Wiarda, Dorothea [ORNL; Celik, Cihangir [ORNL; Rearden, Bradley T [ORNL

2013-01-01T23:59:59.000Z

396

Validation of a Geothermal Simulator  

DOE Green Energy (OSTI)

A geothermal simulator, TETRAD, is validated against the Stanford Geothermal Problem Set. The governing equations, formulation, and solution technique employed by TETRAD are first outlined. Each problem in the Stanford Problem Set is then discussed in detail, and results from the simulations are presented. The results obtained using TETRAD are compared against several other geothermal simulators. Favorable comparison between results indicates that TETRAD is capable of solving the highly non-linear equations describing the flow of mass and energy in porous media. This validation exercise allows for the use of TETRAD in studying geothermal problems with a high degree of confidence.

Shook, G.M.; Faulder, D.D.

1991-10-01T23:59:59.000Z

397

Measures of agreement between computation and experiment:validation metrics.  

SciTech Connect

With the increasing role of computational modeling in engineering design, performance estimation, and safety assessment, improved methods are needed for comparing computational results and experimental measurements. Traditional methods of graphically comparing computational and experimental results, though valuable, are essentially qualitative. Computable measures are needed that can quantitatively compare computational and experimental results over a range of input, or control, variables and sharpen assessment of computational accuracy. This type of measure has been recently referred to as a validation metric. We discuss various features that we believe should be incorporated in a validation metric and also features that should be excluded. We develop a new validation metric that is based on the statistical concept of confidence intervals. Using this fundamental concept, we construct two specific metrics: one that requires interpolation of experimental data and one that requires regression (curve fitting) of experimental data. We apply the metrics to three example problems: thermal decomposition of a polyurethane foam, a turbulent buoyant plume of helium, and compressibility effects on the growth rate of a turbulent free-shear layer. We discuss how the present metrics are easily interpretable for assessing computational model accuracy, as well as the impact of experimental measurement uncertainty on the accuracy assessment.

Barone, Matthew Franklin; Oberkampf, William Louis

2005-08-01T23:59:59.000Z

398

Methodology supporting architecture validations (MAVS)  

Science Conference Proceedings (OSTI)

Defense Information Technology Architecture is a complex business. Furthermore, the multitude and magnitude of the tasks and operations that are executed simultaneously on a battlefield to conduct a single mission are simply staggering. From the performance ... Keywords: DEVS, DoDAF, executable architectures, modeling and simulation, validation

Johnny Garcia

2010-04-01T23:59:59.000Z

399

Directional Validation of Wave Predictions  

Science Conference Proceedings (OSTI)

A methodology for quantitative, directional validation of a long-term wave model hindcast is described and applied. Buoy observations are used as ground truth and the method does not require the application of a parametric model or data-adaptive ...

W. Erick Rogers; David W. C. Wang

2007-03-01T23:59:59.000Z

400

SunShot Initiative: Technology Validation  

NLE Websites -- All DOE Office Websites (Extended Search)

Technology Validation to someone Technology Validation to someone by E-mail Share SunShot Initiative: Technology Validation on Facebook Tweet about SunShot Initiative: Technology Validation on Twitter Bookmark SunShot Initiative: Technology Validation on Google Bookmark SunShot Initiative: Technology Validation on Delicious Rank SunShot Initiative: Technology Validation on Digg Find More places to share SunShot Initiative: Technology Validation on AddThis.com... Concentrating Solar Power Photovoltaics Systems Integration Research, Development, & Demonstration Distribution Grid Integration Transmission Grid Integration Solar Resource Assessment Technology Validation Power Electronics & Balance of System Hardware Technologies Competitive Awards Balance of Systems Technology Validation To reduce solar technology risks, DOE and its partners evaluate the

Note: This page contains sample records for the topic "input validation flaw" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Validation:  

Science Conference Proceedings (OSTI)

... Measurements. Lewis Publishers: Chelsea, MI, p. 193 Page 15. ... hands. I've trusted system manufacturers to handle this. Should I have? ...

2007-09-07T23:59:59.000Z

402

Methodology for Validating Building Energy Analysis Simulations  

SciTech Connect

The objective of this report was to develop a validation methodology for building energy analysis simulations, collect high-quality, unambiguous empirical data for validation, and apply the validation methodology to the DOE-2.1, BLAST-2MRT, BLAST-3.0, DEROB-3, DEROB-4, and SUNCAT 2.4 computer programs. This report covers background information, literature survey, validation methodology, comparative studies, analytical verification, empirical validation, comparative evaluation of codes, and conclusions.

Judkoff, R.; Wortman, D.; O'Doherty, B.; Burch, J.

2008-04-01T23:59:59.000Z

403

[Composite analysis E-area vaults and saltstone disposal facilities]. PORFLOW and FACT input files  

Science Conference Proceedings (OSTI)

This diskette contains the PORFLOW and FACT input files described in Appendix B of the accompanying report `Composite Analysis E-Area Vaults and Saltstone Disposal Facilities`.

Cook, J.R.

1997-09-01T23:59:59.000Z

404

SRTC input to DOE-HQ R and D database for FY99  

SciTech Connect

This is a database of the Savannah River Site input to the DOE Research and Development database. The report contains approximately 50 project abstracts.

Chandler, L.R. Jr.

2000-01-05T23:59:59.000Z

405

Table A4. Total Inputs of Energy for Heat, Power, and Electricity...  

U.S. Energy Information Administration (EIA) Indexed Site

"Table A4. Total Inputs of Energy for Heat, Power, and Electricity Generation" " by Census Region, Census Division, Industry Group, and Selected Industries, 1994: Part 2" "...

406

Table A36. Total Inputs of Energy for Heat, Power, and Electricity  

U.S. Energy Information Administration (EIA) Indexed Site

"Table A36. Total Inputs of Energy for Heat, Power, and Electricity" " Generation by Fuel Type, Industry Group, Selected Industries, and End Use, 1991:" " Part 2" " (Estimates in...

407

Table A10. Total Inputs of Energy for Heat, Power, and Electricity...  

U.S. Energy Information Administration (EIA) Indexed Site

"Table A10. Total Inputs of Energy for Heat, Power, and Electricity Generation" " by Fuel Type, Industry Group, Selected Industries, and End Use, 1994:" " Part 2" " (Estimates in...

408

Use of probabilistic inversion to model qualitative expert input when selecting a new nuclear reactor technology.  

E-Print Network (OSTI)

?? Complex investment decisions by corporate executives often require the comparison of dissimilar attributes and competing technologies. A technique to evaluate qualitative input from experts (more)

Merritt, Charles R., Jr.

2008-01-01T23:59:59.000Z

409

DOE Seeks Public Input on an Integrated, Interagency Pre-Application...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

on an Integrated, Interagency Pre-Application Process for Transmission Authorizations August 29, 2013 - 9:09am Addthis A Request for Information (RFI) seeking public input for...

410

Table A12. Total Inputs of Energy for Heat, Power, and Electricity...  

U.S. Energy Information Administration (EIA) Indexed Site

2. Total Inputs of Energy for Heat, Power, and Electricity Generation" " by Census Region and Economic Characteristics of the Establishment, 1991" " (Estimates in Btu or Physical...

411

Calibration of a distributed flood forecasting model with input uncertainty using a Bayesian framework  

E-Print Network (OSTI)

Calibrated probabilistic forecasting using ensemble modelSutcliffe (1970), River flow forecasting through conceptuala Distributed Flood Forecasting Model with Input Uncertainty

Li, M.

2013-01-01T23:59:59.000Z

412

Fossil energy use in conventional and low-external-input cropping systems.  

E-Print Network (OSTI)

??The production of fossil fuels will crest within the next decade and with reliance of modern conventional agriculture on fossil fuel energy inputs, food production (more)

Cruse, Michael James

2009-01-01T23:59:59.000Z

413

Criticality Safety Validation of SCALE 6.1 with ENDF/B-VII.0 Libraries  

SciTech Connect

ANSI/ANS-8.1-1998;2007, Nuclear Criticality Safety in Operations with Fissionable Material Outside Reactors, and ANSI/ANS-8.24-2007, Validation of Neutron Transport Methods for Nuclear Criticality Safety Calculations, require validation of a computer code and the associated data through benchmark evaluations based on physical experiments. The performance of the code and data are validated by comparing the calculated and the benchmark results. A SCALE procedure has been established to generate a Verified, Archived Library of Inputs and Data (VALID). This procedure provides a framework for preparing, peer reviewing, and controlling models and data sets derived from benchmark definitions so that the models and data can be used with confidence. The procedure ensures that the models and data were correctly generated using appropriate references with documented checks and reviews. Configuration management is implemented to prevent inadvertent modification of the models and data or inclusion of models that have not been subjected to the rigorous review process. VALID entries for criticality safety are based on critical experiments documented in the International Handbook of Evaluated Criticality Safety Benchmark Experiments (IHECSBE). The findings of a criticality safety validation of SCALE 6.1 utilizing the benchmark models vetted in the VALID library at Oak Ridge National Laboratory are summarized here.

Marshall, William BJ J [ORNL; Rearden, Bradley T [ORNL

2012-01-01T23:59:59.000Z

414

SOFTWARE VERIFICATION AND VALIDATION Evaluation of ...  

Science Conference Proceedings (OSTI)

... 5 null 86 "mousedown" true true window 5 5 ... possible input combinations exist to cover even a ... of tests generated in combinatorial covering arrays is ...

2012-10-11T23:59:59.000Z

415

Case study of the propagation of a small flaw under PWR loading conditions and comparison with the ASME code design life. Comparison of ASME Code Sections III and XI  

SciTech Connect

A cooperative study was performed by EG and G Idaho, Inc., and Oak Ridge National Laboratory to investigate the degree of conservatism and consistency in the ASME Boiler and Pressure Vessel Code Section III fatigue evaluation procedure and Section XI flaw acceptance standards. A single, realistic, sample problem was analyzed to determine the significance of certain points of criticism made of an earlier parametric study by staff members of the Division of Engineering Standards of the Nuclear Regulatory Commission. The problem was based on a semielliptical flaw located on the inside surface of the hot-leg piping at the reactor vessel safe-end weld for the Zion 1 pressurized-water reactor (PWR). Two main criteria were used in selecting the problem; first, it should be a straight pipe to minimize the computational expense; second, it should exhibit as high a cumulative usage factor as possible. Although the problem selected has one of the highest cumulative usage factors of any straight pipe in the primary system of PWRs, it is still very low. The Code Section III fatigue usage factor was only 0.00046, assuming it was in the as-welded condition, and fatigue crack-growth analyses predicted negligible crack growth during the 40-year design life. When the analyses were extended past the design life, the usage factor was less than 1.0 when the flaw had propagated to failure. The current study shows that the criticism of the earlier report should not detract from the conclusion that if a component experiences a high level of cyclic stress corresponding to a fatigue usage factor near 1.0, very small cracks can propagate to unacceptable sizes.

Yahr, G.T.; Gwaltney, R.C.; Richardson, A.K.; Server, W.L.

1986-01-01T23:59:59.000Z

416

Webinar - Software Verification & Validation? - 2012-08-04  

Science Conference Proceedings (OSTI)

Webinar - Software Verification & Validation [1200]. Purpose: Webinar - Software Verification & Validation [1200]. At the ...

2013-06-03T23:59:59.000Z

417

Sensitivity of crop model predictions to entire meteorological and soil input datasets highlights vulnerability to drought  

Science Conference Proceedings (OSTI)

Crop growth models are increasingly used as part of research into areas such as climate change and bioenergy, so it is particularly important to understand the effects of environmental inputs on model results. Rather than investigating the effects of ... Keywords: Crop growth model, Drought, Input data, Parameterisation, Sensitivity analysis, Soil water

Mark Pogson; Astley Hastings; Pete Smith

2012-03-01T23:59:59.000Z

418

Technical communication: Extending the analog input capabilities of the DS1102 DSP controller board  

Science Conference Proceedings (OSTI)

The paper deals with an extention of the number of analog inputs of the DS1102 controller board which is commonly used in the area of electric machines. Manufactured with just four analog inputs, the DS1102 has been found inadequate for the implementation ... Keywords: Analog multiplexing, Analog to digital converters, Digital signal processor, Doubly-fed machine, Field oriented control

Badreddine Louhichi; Ahmed Masmoudi; Luc Loron

2005-01-01T23:59:59.000Z

419

Simulation for Performance Analysis of Grid-Connected Induction Generators with Input Voltage Control  

Science Conference Proceedings (OSTI)

With the increasing application of wind energy, various technologies are developed for analyzing the performance of grid-connected induction generator (GIG) based wind energy conversion systems (WECSs). Input voltage control is one among them. In the ... Keywords: grid-connected induction generators (GIGs), wind energy conversion systems (WECSs), input voltage control, performance analysis, MATLAB

Farhad Ilahi Bakhsh, Shirazul Islam, Sayeed Ahmad

2013-04-01T23:59:59.000Z

420

Call for White Papers: Soliciting Community Input for Alternate Science Investigations for the Kepler Spacecraft  

E-Print Network (OSTI)

Call for White Papers: Soliciting Community Input for Alternate Science Investigations of this call for white papers is to solicit community input for alternate science investigations that may project office personnel and expertise already in place. All white papers submitted in response

Rodriguez, Carlos

Note: This page contains sample records for the topic "input validation flaw" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

DOE Seeking Input on Alternative Uses of Nickel Inventory | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Seeking Input on Alternative Uses of Nickel Inventory Seeking Input on Alternative Uses of Nickel Inventory DOE Seeking Input on Alternative Uses of Nickel Inventory March 9, 2007 - 10:28am Addthis WASHINGTON, DC - The U.S. Department of Energy (DOE) is seeking input from industry representatives on the safe disposition of approximately 15,300 tons of nickel scrap recovered from uranium enrichment process equipment at the Department's Oak Ridge, TN, and Paducah, KY, facilities. The Expression of Interest (EOI), released today, will assist in DOE's evaluation of restricted uses of its nickel material for controlled radiological applications. These restricted uses could include use in commercial nuclear power plants, DOE nuclear facilities, or by the U.S. Navy. The Department will solicit input through May 8, 2007.

422

DOE Seeking Input on Alternative Uses of Nickel Inventory | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

DOE Seeking Input on Alternative Uses of Nickel Inventory DOE Seeking Input on Alternative Uses of Nickel Inventory DOE Seeking Input on Alternative Uses of Nickel Inventory March 9, 2007 - 10:28am Addthis WASHINGTON, DC - The U.S. Department of Energy (DOE) is seeking input from industry representatives on the safe disposition of approximately 15,300 tons of nickel scrap recovered from uranium enrichment process equipment at the Department's Oak Ridge, TN, and Paducah, KY, facilities. The Expression of Interest (EOI), released today, will assist in DOE's evaluation of restricted uses of its nickel material for controlled radiological applications. These restricted uses could include use in commercial nuclear power plants, DOE nuclear facilities, or by the U.S. Navy. The Department will solicit input through May 8, 2007.

423

Oak Ridge's EM Program Seeks Public Input on Cleanup | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Seeks Public Input on Cleanup Seeks Public Input on Cleanup Oak Ridge's EM Program Seeks Public Input on Cleanup April 25, 2013 - 12:00pm Addthis Oak Ridge’s EM leadership informed members of the public about projects and goals and answered questions during a public workshop this week. Oak Ridge's EM leadership informed members of the public about projects and goals and answered questions during a public workshop this week. Local residents and other stakeholders listen to Oak Ridge's EM senior leadership in a public workshop to learn about EM and provide input about future mission work. Local residents and other stakeholders listen to Oak Ridge's EM senior leadership in a public workshop to learn about EM and provide input about future mission work. Oak Ridge EM Manager Mark Whitney addresses participants on EM’s mission and priorities.

424

How are basement walls input in REScheck? | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

basement walls input in REScheck? basement walls input in REScheck? After selecting a basement wall type, a basement wall illustration will appear with input boxes for the basement wall height, depth below grade, and depth of insulation. The illustration helps identify the dimensions being requested. You may enter basement wall dimensions directly into this illustration and select the OK button to have them transferred to the corresponding row in the table on the Envelope screen. If you prefer to enter the dimensions directly into the table on the Envelope screen, you can select Cancel to remove the illustration without entering dimensions. To view the basement wall illustration and inputs at a later time, click the right-mouse button anywhere on the basement row and select Edit Basement Inputs from the popup menu.

425

Oak Ridge's EM Program Seeks Public Input on Cleanup | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Oak Ridge's EM Program Seeks Public Input on Cleanup Oak Ridge's EM Program Seeks Public Input on Cleanup Oak Ridge's EM Program Seeks Public Input on Cleanup April 25, 2013 - 12:00pm Addthis Oak Ridge’s EM leadership informed members of the public about projects and goals and answered questions during a public workshop this week. Oak Ridge's EM leadership informed members of the public about projects and goals and answered questions during a public workshop this week. Local residents and other stakeholders listen to Oak Ridge's EM senior leadership in a public workshop to learn about EM and provide input about future mission work. Local residents and other stakeholders listen to Oak Ridge's EM senior leadership in a public workshop to learn about EM and provide input about future mission work. Oak Ridge EM Manager Mark Whitney addresses participants on EM’s mission and priorities.

426

Full-Scale Structural and NDI Validation Tests of Bonded Composite Doublers for Commercial Aircraft Applications  

Science Conference Proceedings (OSTI)

Composite doublers, or repair patches, provide an innovative repair technique which can enhance the way aircraft are maintained. Instead of riveting multiple steel or aluminum plates to facilitate an aircraft repair, it is possible to bond a single Boron-Epoxy composite doubler to the damaged structure. Most of the concerns surrounding composite doubler technology pertain to long-term survivability, especially in the presence of non-optimum installations, and the validation of appropriate inspection procedures. This report focuses on a series of full-scale structural and nondestructive inspection (NDI) tests that were conducted to investigate the performance of Boron-Epoxy composite doublers. Full-scale tests were conducted on fuselage panels cut from retired aircraft. These full-scale tests studied stress reductions, crack mitigation, and load transfer capabilities of composite doublers using simulated flight conditions of cabin pressure and axial stress. Also, structures which modeled key aspects of aircraft structure repairs were subjected to extreme tension, shear and bending loads to examine the composite laminate's resistance to disbond and delamination flaws. Several of the structures were loaded to failure in order to determine doubler design margins. Nondestructive inspections were conducted throughout the test series in order to validate appropriate techniques on actual aircraft structure. The test results showed that a properly designed and installed composite doubler is able to enhance fatigue life, transfer load away from damaged structure, and avoid the introduction of new stress risers (i.e. eliminate global reduction in the fatigue life of the structure). Comparisons with test data obtained prior to the doubler installation revealed that stresses in the parent material can be reduced 30%--60% through the use of the composite doubler. Tests to failure demonstrated that the bondline is able to transfer plastic strains into the doubler and that the parent aluminum skin must experience significant yield strains before any damage to the doubler will occur.

Roach, D.; Walkington, P.

1999-02-01T23:59:59.000Z

427

Validation of a Hot Water Distribution Model Using Laboratory and Field Data  

SciTech Connect

Characterizing the performance of hot water distribution systems is a critical step in developing best practice guidelines for the design and installation of high performance hot water systems. Developing and validating simulation models is critical to this effort, as well as collecting accurate input data to drive the models. In this project, the ARBI team validated the newly developed TRNSYS Type 604 pipe model against both detailed laboratory and field distribution system performance data. Validation efforts indicate that the model performs very well in handling different pipe materials, insulation cases, and varying hot water load conditions. Limitations of the model include the complexity of setting up the input file and long simulation run times. In addition to completing validation activities, this project looked at recent field hot water studies to better understand use patterns and potential behavioral changes as homeowners convert from conventional storage water heaters to gas tankless units. Based on these datasets, we conclude that the current Energy Factor test procedure overestimates typical use and underestimates the number of hot water draws. This has implications for both equipment and distribution system performance. Gas tankless water heaters were found to impact how people use hot water, but the data does not necessarily suggest an increase in usage. Further study in hot water usage and patterns is needed to better define these characteristics in different climates and home vintages.

Backman, C.; Hoeschele, M.

2013-07-01T23:59:59.000Z

428

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

81 - 28590 of 31,917 results. 81 - 28590 of 31,917 results. Article U-229: HP Network Node Manager i Input Validation Flaw Permits Cross-Site Scripting Attacks Potential security vulnerabilities have been identified with HP Network Node Manager i (NNMi) for HP-UX, Linux, Solaris, and Windows. The vulnerabilities could be remotely exploited resulting in cross site scripting (XSS). http://energy.gov/cio/articles/u-229-hp-network-node-manager-i-input-validation-flaw-permits-cross-site-scripting Article Passive Housing for an Aggressive Region A telling perspective of Washingtonian's connection with their energy consumption, architecture and ambition in their professional and personal lives. http://energy.gov/energysaver/articles/passive-housing-aggressive-region Article U-258: Adobe Flash Player Flaw Lets Remote Users Execute Arbitrary

429

Assessing Forecast Skill through Cross Validation  

Science Conference Proceedings (OSTI)

This study explains the method of cross validation for assessing forecast skill of empirical prediction models. Cross validation provides a relatively accurate measure of an empirical procedure's ability to produce a useful prediction rule from a ...

J. B. Elsner; C. P. Schmertmann

1994-12-01T23:59:59.000Z

430

Advanced Encryption Standard Algorithm Validation List  

Science Conference Proceedings (OSTI)

Advanced Encryption Standard Algorithm Validation List. Last Update: 8/28/2013. The page provides technical information ...

431

Process Monitoring & Signal Validation - Nuclear Engineering...  

NLE Websites -- All DOE Office Websites (Extended Search)

Process Monitoring & Signal Validation Capabilities Nuclear Systems Technologies Nuclear Criticality Safety Research Reactor Analysis Decontamination and Decommissioning Systems...

432

Security Testing, Validation and Measurement Group  

Science Conference Proceedings (OSTI)

Security Testing, Validation and Measurement Group. Welcome. ... The overall security of an enterprise network cannot be Contact. ...

2013-01-17T23:59:59.000Z

433

,"Arkansas Natural Gas Input Supplemental Fuels (MMcf)"  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (MMcf)" Input Supplemental Fuels (MMcf)" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","Arkansas Natural Gas Input Supplemental Fuels (MMcf)",1,"Annual",2012 ,"Release Date:","12/12/2013" ,"Next Release Date:","1/7/2014" ,"Excel File Name:","na1400_sar_2a.xls" ,"Available from Web Page:","http://tonto.eia.gov/dnav/ng/hist/na1400_sar_2a.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.doe.gov" ,,"(202) 586-8800",,,"12/19/2013 6:58:49 AM"

434

,"Illinois Natural Gas Input Supplemental Fuels (MMcf)"  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (MMcf)" Input Supplemental Fuels (MMcf)" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","Illinois Natural Gas Input Supplemental Fuels (MMcf)",1,"Annual",2012 ,"Release Date:","12/12/2013" ,"Next Release Date:","1/7/2014" ,"Excel File Name:","na1400_sil_2a.xls" ,"Available from Web Page:","http://tonto.eia.gov/dnav/ng/hist/na1400_sil_2a.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.doe.gov" ,,"(202) 586-8800",,,"12/19/2013 6:58:51 AM"

435

,"Catalytic Reforming Downstream Processing of Fresh Feed Input"  

U.S. Energy Information Administration (EIA) Indexed Site

Catalytic Reforming Downstream Processing of Fresh Feed Input" Catalytic Reforming Downstream Processing of Fresh Feed Input" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","Catalytic Reforming Downstream Processing of Fresh Feed Input",16,"Monthly","9/2013","1/15/2010" ,"Release Date:","11/27/2013" ,"Next Release Date:","Last Week of December 2013" ,"Excel File Name:","pet_pnp_dwns_a_(na)_ydr_mbblpd_m.xls" ,"Available from Web Page:","http://www.eia.gov/dnav/pet/pet_pnp_dwns_a_(na)_ydr_mbblpd_m.htm" ,"Source:","Energy Information Administration"

436

,"Pennsylvania Natural Gas Input Supplemental Fuels (MMcf)"  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (MMcf)" Input Supplemental Fuels (MMcf)" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","Pennsylvania Natural Gas Input Supplemental Fuels (MMcf)",1,"Annual",2012 ,"Release Date:","12/12/2013" ,"Next Release Date:","1/7/2014" ,"Excel File Name:","na1400_spa_2a.xls" ,"Available from Web Page:","http://tonto.eia.gov/dnav/ng/hist/na1400_spa_2a.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.doe.gov" ,,"(202) 586-8800",,,"12/19/2013 6:58:55 AM"

437

,"Iowa Natural Gas Input Supplemental Fuels (MMcf)"  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (MMcf)" Input Supplemental Fuels (MMcf)" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","Iowa Natural Gas Input Supplemental Fuels (MMcf)",1,"Annual",2012 ,"Release Date:","12/12/2013" ,"Next Release Date:","1/7/2014" ,"Excel File Name:","na1400_sia_2a.xls" ,"Available from Web Page:","http://tonto.eia.gov/dnav/ng/hist/na1400_sia_2a.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.doe.gov" ,,"(202) 586-8800",,,"12/19/2013 6:58:51 AM"

438

,"Alabama Natural Gas Input Supplemental Fuels (MMcf)"  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (MMcf)" Input Supplemental Fuels (MMcf)" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","Alabama Natural Gas Input Supplemental Fuels (MMcf)",1,"Annual",2012 ,"Release Date:","12/12/2013" ,"Next Release Date:","1/7/2014" ,"Excel File Name:","na1400_sal_2a.xls" ,"Available from Web Page:","http://tonto.eia.gov/dnav/ng/hist/na1400_sal_2a.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.doe.gov" ,,"(202) 586-8800",,,"12/19/2013 6:58:49 AM"

439

,"Maryland Natural Gas Input Supplemental Fuels (MMcf)"  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (MMcf)" Input Supplemental Fuels (MMcf)" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","Maryland Natural Gas Input Supplemental Fuels (MMcf)",1,"Annual",2012 ,"Release Date:","12/12/2013" ,"Next Release Date:","1/7/2014" ,"Excel File Name:","na1400_smd_2a.xls" ,"Available from Web Page:","http://tonto.eia.gov/dnav/ng/hist/na1400_smd_2a.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.doe.gov" ,,"(202) 586-8800",,,"12/19/2013 6:58:52 AM"

440

,"New Jersey Natural Gas Input Supplemental Fuels (MMcf)"  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (MMcf)" Input Supplemental Fuels (MMcf)" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","New Jersey Natural Gas Input Supplemental Fuels (MMcf)",1,"Annual",2012 ,"Release Date:","12/12/2013" ,"Next Release Date:","1/7/2014" ,"Excel File Name:","na1400_snj_2a.xls" ,"Available from Web Page:","http://tonto.eia.gov/dnav/ng/hist/na1400_snj_2a.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.doe.gov" ,,"(202) 586-8800",,,"12/19/2013 6:58:54 AM"

Note: This page contains sample records for the topic "input validation flaw" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

,"Hawaii Natural Gas Input Supplemental Fuels (MMcf)"  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (MMcf)" Input Supplemental Fuels (MMcf)" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","Hawaii Natural Gas Input Supplemental Fuels (MMcf)",1,"Annual",2012 ,"Release Date:","12/12/2013" ,"Next Release Date:","1/7/2014" ,"Excel File Name:","na1400_shi_2a.xls" ,"Available from Web Page:","http://tonto.eia.gov/dnav/ng/hist/na1400_shi_2a.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.doe.gov" ,,"(202) 586-8800",,,"12/19/2013 6:58:51 AM"

442

,"Rhode Island Natural Gas Input Supplemental Fuels (MMcf)"  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (MMcf)" Input Supplemental Fuels (MMcf)" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","Rhode Island Natural Gas Input Supplemental Fuels (MMcf)",1,"Annual",2012 ,"Release Date:","12/12/2013" ,"Next Release Date:","1/7/2014" ,"Excel File Name:","na1400_sri_2a.xls" ,"Available from Web Page:","http://tonto.eia.gov/dnav/ng/hist/na1400_sri_2a.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.doe.gov" ,,"(202) 586-8800",,,"12/19/2013 6:58:55 AM"

443

,"Louisiana Natural Gas Input Supplemental Fuels (Million Cubic Feet)"  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (Million Cubic Feet)" Input Supplemental Fuels (Million Cubic Feet)" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","Louisiana Natural Gas Input Supplemental Fuels (Million Cubic Feet)",1,"Annual",2012 ,"Release Date:","12/12/2013" ,"Next Release Date:","1/7/2014" ,"Excel File Name:","nga_epg0_ovi_sla_mmcfa.xls" ,"Available from Web Page:","http://tonto.eia.gov/dnav/ng/hist/nga_epg0_ovi_sla_mmcfa.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.doe.gov"

444

,"North Carolina Natural Gas Input Supplemental Fuels (MMcf)"  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (MMcf)" Input Supplemental Fuels (MMcf)" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","North Carolina Natural Gas Input Supplemental Fuels (MMcf)",1,"Annual",2012 ,"Release Date:","12/12/2013" ,"Next Release Date:","1/7/2014" ,"Excel File Name:","na1400_snc_2a.xls" ,"Available from Web Page:","http://tonto.eia.gov/dnav/ng/hist/na1400_snc_2a.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.doe.gov" ,,"(202) 586-8800",,,"12/19/2013 6:58:53 AM"

445

,"Alaska Natural Gas Input Supplemental Fuels (Million Cubic Feet)"  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (Million Cubic Feet)" Input Supplemental Fuels (Million Cubic Feet)" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","Alaska Natural Gas Input Supplemental Fuels (Million Cubic Feet)",1,"Annual",2012 ,"Release Date:","12/12/2013" ,"Next Release Date:","1/7/2014" ,"Excel File Name:","na_epg0_ovi_sak_2a.xls" ,"Available from Web Page:","http://tonto.eia.gov/dnav/ng/hist/na_epg0_ovi_sak_2a.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.doe.gov"

446

,"Connecticut Natural Gas Input Supplemental Fuels (MMcf)"  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (MMcf)" Input Supplemental Fuels (MMcf)" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","Connecticut Natural Gas Input Supplemental Fuels (MMcf)",1,"Annual",2012 ,"Release Date:","12/12/2013" ,"Next Release Date:","1/7/2014" ,"Excel File Name:","na1400_sct_2a.xls" ,"Available from Web Page:","http://tonto.eia.gov/dnav/ng/hist/na1400_sct_2a.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.doe.gov" ,,"(202) 586-8800",,,"12/19/2013 6:58:50 AM"

447

,"Minnesota Natural Gas Input Supplemental Fuels (MMcf)"  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (MMcf)" Input Supplemental Fuels (MMcf)" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","Minnesota Natural Gas Input Supplemental Fuels (MMcf)",1,"Annual",2012 ,"Release Date:","12/12/2013" ,"Next Release Date:","1/7/2014" ,"Excel File Name:","na1400_smn_2a.xls" ,"Available from Web Page:","http://tonto.eia.gov/dnav/ng/hist/na1400_smn_2a.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.doe.gov" ,,"(202) 586-8800",,,"12/19/2013 6:58:53 AM"

448

,"New Mexico Natural Gas Input Supplemental Fuels (MMcf)"  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (MMcf)" Input Supplemental Fuels (MMcf)" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","New Mexico Natural Gas Input Supplemental Fuels (MMcf)",1,"Annual",2012 ,"Release Date:","12/12/2013" ,"Next Release Date:","1/7/2014" ,"Excel File Name:","na1400_snm_2a.xls" ,"Available from Web Page:","http://tonto.eia.gov/dnav/ng/hist/na1400_snm_2a.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.doe.gov" ,,"(202) 586-8800",,,"12/19/2013 6:58:54 AM"

449

,"Wyoming Natural Gas Input Supplemental Fuels (MMcf)"  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (MMcf)" Input Supplemental Fuels (MMcf)" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","Wyoming Natural Gas Input Supplemental Fuels (MMcf)",1,"Annual",2012 ,"Release Date:","12/12/2013" ,"Next Release Date:","1/7/2014" ,"Excel File Name:","na1400_swy_2a.xls" ,"Available from Web Page:","http://tonto.eia.gov/dnav/ng/hist/na1400_swy_2a.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.doe.gov" ,,"(202) 586-8800",,,"12/19/2013 6:58:57 AM"

450

,"Washington Natural Gas Input Supplemental Fuels (MMcf)"  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (MMcf)" Input Supplemental Fuels (MMcf)" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","Washington Natural Gas Input Supplemental Fuels (MMcf)",1,"Annual",2012 ,"Release Date:","12/12/2013" ,"Next Release Date:","1/7/2014" ,"Excel File Name:","na1400_swa_2a.xls" ,"Available from Web Page:","http://tonto.eia.gov/dnav/ng/hist/na1400_swa_2a.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.doe.gov" ,,"(202) 586-8800",,,"12/19/2013 6:58:57 AM"

451

,"Wisconsin Natural Gas Input Supplemental Fuels (MMcf)"  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (MMcf)" Input Supplemental Fuels (MMcf)" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","Wisconsin Natural Gas Input Supplemental Fuels (MMcf)",1,"Annual",2012 ,"Release Date:","12/12/2013" ,"Next Release Date:","1/7/2014" ,"Excel File Name:","na1400_swi_2a.xls" ,"Available from Web Page:","http://tonto.eia.gov/dnav/ng/hist/na1400_swi_2a.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.doe.gov" ,,"(202) 586-8800",,,"12/19/2013 6:58:57 AM"

452

,"New Hampshire Natural Gas Input Supplemental Fuels (MMcf)"  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (MMcf)" Input Supplemental Fuels (MMcf)" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","New Hampshire Natural Gas Input Supplemental Fuels (MMcf)",1,"Annual",2012 ,"Release Date:","12/12/2013" ,"Next Release Date:","1/7/2014" ,"Excel File Name:","na1400_snh_2a.xls" ,"Available from Web Page:","http://tonto.eia.gov/dnav/ng/hist/na1400_snh_2a.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.doe.gov" ,,"(202) 586-8800",,,"12/19/2013 6:58:54 AM"

453

,"Kentucky Natural Gas Input Supplemental Fuels (MMcf)"  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (MMcf)" Input Supplemental Fuels (MMcf)" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","Kentucky Natural Gas Input Supplemental Fuels (MMcf)",1,"Annual",2012 ,"Release Date:","12/12/2013" ,"Next Release Date:","1/7/2014" ,"Excel File Name:","na1400_sky_2a.xls" ,"Available from Web Page:","http://tonto.eia.gov/dnav/ng/hist/na1400_sky_2a.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.doe.gov" ,,"(202) 586-8800",,,"12/19/2013 6:58:51 AM"

454

,"Tennessee Natural Gas Input Supplemental Fuels (MMcf)"  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (MMcf)" Input Supplemental Fuels (MMcf)" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","Tennessee Natural Gas Input Supplemental Fuels (MMcf)",1,"Annual",2012 ,"Release Date:","12/12/2013" ,"Next Release Date:","1/7/2014" ,"Excel File Name:","na1400_stn_2a.xls" ,"Available from Web Page:","http://tonto.eia.gov/dnav/ng/hist/na1400_stn_2a.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.doe.gov" ,,"(202) 586-8800",,,"12/19/2013 6:58:56 AM"

455

,"Indiana Natural Gas Input Supplemental Fuels (MMcf)"  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (MMcf)" Input Supplemental Fuels (MMcf)" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","Indiana Natural Gas Input Supplemental Fuels (MMcf)",1,"Annual",2012 ,"Release Date:","12/12/2013" ,"Next Release Date:","1/7/2014" ,"Excel File Name:","na1400_sin_2a.xls" ,"Available from Web Page:","http://tonto.eia.gov/dnav/ng/hist/na1400_sin_2a.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.doe.gov" ,,"(202) 586-8800",,,"12/19/2013 6:58:51 AM"

456

,"Michigan Natural Gas Input Supplemental Fuels (MMcf)"  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (MMcf)" Input Supplemental Fuels (MMcf)" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","Michigan Natural Gas Input Supplemental Fuels (MMcf)",1,"Annual",2012 ,"Release Date:","12/12/2013" ,"Next Release Date:","1/7/2014" ,"Excel File Name:","na1400_smi_2a.xls" ,"Available from Web Page:","http://tonto.eia.gov/dnav/ng/hist/na1400_smi_2a.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.doe.gov" ,,"(202) 586-8800",,,"12/19/2013 6:58:52 AM"

457

,"Virginia Natural Gas Input Supplemental Fuels (MMcf)"  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (MMcf)" Input Supplemental Fuels (MMcf)" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","Virginia Natural Gas Input Supplemental Fuels (MMcf)",1,"Annual",2012 ,"Release Date:","12/12/2013" ,"Next Release Date:","1/7/2014" ,"Excel File Name:","na1400_sva_2a.xls" ,"Available from Web Page:","http://tonto.eia.gov/dnav/ng/hist/na1400_sva_2a.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.doe.gov" ,,"(202) 586-8800",,,"12/19/2013 6:58:57 AM"

458

,"Georgia Natural Gas Input Supplemental Fuels (MMcf)"  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (MMcf)" Input Supplemental Fuels (MMcf)" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","Georgia Natural Gas Input Supplemental Fuels (MMcf)",1,"Annual",2012 ,"Release Date:","12/12/2013" ,"Next Release Date:","1/7/2014" ,"Excel File Name:","na1400_sga_2a.xls" ,"Available from Web Page:","http://tonto.eia.gov/dnav/ng/hist/na1400_sga_2a.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.doe.gov" ,,"(202) 586-8800",,,"12/19/2013 6:58:50 AM"

459

,"South Dakota Natural Gas Input Supplemental Fuels (MMcf)"  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (MMcf)" Input Supplemental Fuels (MMcf)" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","South Dakota Natural Gas Input Supplemental Fuels (MMcf)",1,"Annual",2012 ,"Release Date:","12/12/2013" ,"Next Release Date:","1/7/2014" ,"Excel File Name:","na1400_ssd_2a.xls" ,"Available from Web Page:","http://tonto.eia.gov/dnav/ng/hist/na1400_ssd_2a.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.doe.gov" ,,"(202) 586-8800",,,"12/19/2013 6:58:56 AM"

460

,"Nebraska Natural Gas Input Supplemental Fuels (MMcf)"  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (MMcf)" Input Supplemental Fuels (MMcf)" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","Nebraska Natural Gas Input Supplemental Fuels (MMcf)",1,"Annual",2012 ,"Release Date:","12/12/2013" ,"Next Release Date:","1/7/2014" ,"Excel File Name:","na1400_sne_2a.xls" ,"Available from Web Page:","http://tonto.eia.gov/dnav/ng/hist/na1400_sne_2a.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.doe.gov" ,,"(202) 586-8800",,,"12/19/2013 6:58:53 AM"

Note: This page contains sample records for the topic "input validation flaw" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

,"Delaware Natural Gas Input Supplemental Fuels (MMcf)"  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (MMcf)" Input Supplemental Fuels (MMcf)" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","Delaware Natural Gas Input Supplemental Fuels (MMcf)",1,"Annual",2012 ,"Release Date:","12/12/2013" ,"Next Release Date:","1/7/2014" ,"Excel File Name:","na1400_sde_2a.xls" ,"Available from Web Page:","http://tonto.eia.gov/dnav/ng/hist/na1400_sde_2a.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.doe.gov" ,,"(202) 586-8800",,,"12/19/2013 6:58:50 AM"

462

,"North Dakota Natural Gas Input Supplemental Fuels (MMcf)"  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (MMcf)" Input Supplemental Fuels (MMcf)" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","North Dakota Natural Gas Input Supplemental Fuels (MMcf)",1,"Annual",2012 ,"Release Date:","12/12/2013" ,"Next Release Date:","1/7/2014" ,"Excel File Name:","na1400_snd_2a.xls" ,"Available from Web Page:","http://tonto.eia.gov/dnav/ng/hist/na1400_snd_2a.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.doe.gov" ,,"(202) 586-8800",,,"12/19/2013 6:58:53 AM"

463

,"South Carolina Natural Gas Input Supplemental Fuels (MMcf)"  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (MMcf)" Input Supplemental Fuels (MMcf)" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","South Carolina Natural Gas Input Supplemental Fuels (MMcf)",1,"Annual",2012 ,"Release Date:","12/12/2013" ,"Next Release Date:","1/7/2014" ,"Excel File Name:","na1400_ssc_2a.xls" ,"Available from Web Page:","http://tonto.eia.gov/dnav/ng/hist/na1400_ssc_2a.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.doe.gov" ,,"(202) 586-8800",,,"12/19/2013 6:58:56 AM"

464

,"Massachusetts Natural Gas Input Supplemental Fuels (MMcf)"  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (MMcf)" Input Supplemental Fuels (MMcf)" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","Massachusetts Natural Gas Input Supplemental Fuels (MMcf)",1,"Annual",2012 ,"Release Date:","12/12/2013" ,"Next Release Date:","1/7/2014" ,"Excel File Name:","na1400_sma_2a.xls" ,"Available from Web Page:","http://tonto.eia.gov/dnav/ng/hist/na1400_sma_2a.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.doe.gov" ,,"(202) 586-8800",,,"12/19/2013 6:58:52 AM"

465

,"Nevada Natural Gas Input Supplemental Fuels (MMcf)"  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (MMcf)" Input Supplemental Fuels (MMcf)" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","Nevada Natural Gas Input Supplemental Fuels (MMcf)",1,"Annual",2012 ,"Release Date:","12/12/2013" ,"Next Release Date:","1/7/2014" ,"Excel File Name:","na1400_snv_2a.xls" ,"Available from Web Page:","http://tonto.eia.gov/dnav/ng/hist/na1400_snv_2a.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.doe.gov" ,,"(202) 586-8800",,,"12/19/2013 6:58:54 AM"

466

,"Texas Natural Gas Input Supplemental Fuels (MMcf)"  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (MMcf)" Input Supplemental Fuels (MMcf)" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","Texas Natural Gas Input Supplemental Fuels (MMcf)",1,"Annual",2012 ,"Release Date:","12/12/2013" ,"Next Release Date:","1/7/2014" ,"Excel File Name:","na1400_stx_2a.xls" ,"Available from Web Page:","http://tonto.eia.gov/dnav/ng/hist/na1400_stx_2a.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.doe.gov" ,,"(202) 586-8800",,,"12/19/2013 6:58:56 AM"

467

,"U.S. Natural Gas Input Supplemental Fuels (MMcf)"  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (MMcf)" Input Supplemental Fuels (MMcf)" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","U.S. Natural Gas Input Supplemental Fuels (MMcf)",1,"Annual",2012 ,"Release Date:","12/12/2013" ,"Next Release Date:","1/7/2014" ,"Excel File Name:","n9090us2a.xls" ,"Available from Web Page:","http://tonto.eia.gov/dnav/ng/hist/n9090us2a.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.doe.gov" ,,"(202) 586-8800",,,"12/19/2013 6:57:08 AM"

468

,"Colorado Natural Gas Input Supplemental Fuels (MMcf)"  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (MMcf)" Input Supplemental Fuels (MMcf)" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","Colorado Natural Gas Input Supplemental Fuels (MMcf)",1,"Annual",2012 ,"Release Date:","12/12/2013" ,"Next Release Date:","1/7/2014" ,"Excel File Name:","na1400_sco_2a.xls" ,"Available from Web Page:","http://tonto.eia.gov/dnav/ng/hist/na1400_sco_2a.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.doe.gov" ,,"(202) 586-8800",,,"12/19/2013 6:58:49 AM"

469

,"Oregon Natural Gas Input Supplemental Fuels (MMcf)"  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (MMcf)" Input Supplemental Fuels (MMcf)" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","Oregon Natural Gas Input Supplemental Fuels (MMcf)",1,"Annual",2012 ,"Release Date:","12/12/2013" ,"Next Release Date:","1/7/2014" ,"Excel File Name:","na1400_sor_2a.xls" ,"Available from Web Page:","http://tonto.eia.gov/dnav/ng/hist/na1400_sor_2a.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.doe.gov" ,,"(202) 586-8800",,,"12/19/2013 6:58:55 AM"

470

,"Florida Natural Gas Input Supplemental Fuels (MMcf)"  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (MMcf)" Input Supplemental Fuels (MMcf)" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","Florida Natural Gas Input Supplemental Fuels (MMcf)",1,"Annual",2012 ,"Release Date:","12/12/2013" ,"Next Release Date:","1/7/2014" ,"Excel File Name:","na1400_sfl_2a.xls" ,"Available from Web Page:","http://tonto.eia.gov/dnav/ng/hist/na1400_sfl_2a.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.doe.gov" ,,"(202) 586-8800",,,"12/19/2013 6:58:50 AM"

471

,"Vermont Natural Gas Input Supplemental Fuels (MMcf)"  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (MMcf)" Input Supplemental Fuels (MMcf)" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","Vermont Natural Gas Input Supplemental Fuels (MMcf)",1,"Annual",2012 ,"Release Date:","12/12/2013" ,"Next Release Date:","1/7/2014" ,"Excel File Name:","na1400_svt_2a.xls" ,"Available from Web Page:","http://tonto.eia.gov/dnav/ng/hist/na1400_svt_2a.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.doe.gov" ,,"(202) 586-8800",,,"12/19/2013 6:58:57 AM"

472

,"Maine Natural Gas Input Supplemental Fuels (MMcf)"  

U.S. Energy Information Administration (EIA) Indexed Site

Input Supplemental Fuels (MMcf)" Input Supplemental Fuels (MMcf)" ,"Click worksheet name or tab at bottom for data" ,"Worksheet Name","Description","# Of Series","Frequency","Latest Data for" ,"Data 1","Maine Natural Gas Input Supplemental Fuels (MMcf)",1,"Annual",2012 ,"Release Date:","12/12/2013" ,"Next Release Date:","1/7/2014" ,"Excel File Name:","na1400_sme_2a.xls" ,"Available from Web Page:","http://tonto.eia.gov/dnav/ng/hist/na1400_sme_2a.htm" ,"Source:","Energy Information Administration" ,"For Help, Contact:","infoctr@eia.doe.gov" ,,"(202) 586-8800",,,"12/19/2013 6:58:52 AM"

473

Benchmarks for GADRAS performance validation.  

SciTech Connect

The performance of the Gamma Detector Response and Analysis Software (GADRAS) was validated by comparing GADRAS model results to experimental measurements for a series of benchmark sources. Sources for the benchmark include a plutonium metal sphere, bare and shielded in polyethylene, plutonium oxide in cans, a highly enriched uranium sphere, bare and shielded in polyethylene, a depleted uranium shell and spheres, and a natural uranium sphere. The benchmark experimental data were previously acquired and consist of careful collection of background and calibration source spectra along with the source spectra. The calibration data were fit with GADRAS to determine response functions for the detector in each experiment. A one-dimensional model (pie chart) was constructed for each source based on the dimensions of the benchmark source. The GADRAS code made a forward calculation from each model to predict the radiation spectrum for the detector used in the benchmark experiment. The comparisons between the GADRAS calculation and the experimental measurements are excellent, validating that GADRAS can correctly predict the radiation spectra for these well-defined benchmark sources.

Mattingly, John K.; Mitchell, Dean James; Rhykerd, Charles L., Jr.

2009-09-01T23:59:59.000Z

474

Validation Workshop Developmental Validation Aug. 24, 2005 at NFSTC Prepared by John M. Butler 1  

E-Print Network (OSTI)

Validation? · Who? (SWGDAM Revised Validation Guidelines 1.2.1) ­ Manufacturer ­ Technical Organization http://www.fbi.gov/hq/lab/fsc/backissu/july2004/standards/2004_03_standards02.htm #12;Validation manual. SWGDAM Revised Validation Guidelines http://www.fbi.gov/hq/lab/fsc/backissu/july2004/standards

475

Validation of an Integrated Hydrogen Energy Station  

SciTech Connect

This report presents the results of a 10-year project conducted by Air Products and Chemicals, Inc. (Air Products) to determine the feasibility of coproducing hydrogen with electricity. The primary objective was to demonstrate the technical and economic viability of a hydrogen energy station using a high-temperature fuel cell designed to produce power and hydrogen. This four-phase project had intermediate go/no-go decisions and the following specific goals: ?¢???¢ Complete a technical assessment and economic analysis of the use of high-temperature fuel cells, including solid oxide and molten carbonate, for the co-production of power and hydrogen (energy park concept). ?¢???¢ Build on the experience gained at the Las Vegas H2 Energy Station and compare/contrast the two approaches for co-production. ?¢???¢ Determine the applicability of co-production from a high-temperature fuel cell for the existing merchant hydrogen market and for the emerging hydrogen economy. ?¢???¢ Demonstrate the concept on natural gas for six months at a suitable site with demand for both hydrogen and electricity. ?¢???¢ Maintain safety as the top priority in the system design and operation. ?¢???¢ Obtain adequate operational data to provide the basis for future commercial activities, including hydrogen fueling stations. Work began with the execution of the cooperative agreement with DOE on 30 September 2001. During Phase 1, Air Products identified high-temperature fuel cells as having the potential to meet the coproduction targets, and the molten carbonate fuel cell system from FuelCell Energy, Inc. (FuelCell Energy) was selected by Air Products and DOE following the feasibility assessment performed during Phase 2. Detailed design, construction and shop validation testing of a system to produce 250 kW of electricity and 100 kilograms per day of hydrogen, along with site selection to include a renewable feedstock for the fuel cell, were completed in Phase 3. The system also completed six months of demonstration operation at the wastewater treatment facility operated by Orange County Sanitation District (OCSD, Fountain Valley, CA). As part of achieving the objective of operating on a renewable feedstock, Air Products secured additional funding via an award from the California Air Resources Board. The South Coast Air Quality Management District also provided cost share which supported the objectives of this project. System operation at OCSD confirmed the results from shop validation testing performed during Phase 3. Hydrogen was produced at rates and purity that met the targets from the system design basis, and coproduction efficiency exceeded the 50% target set in conjunction with input from the DOE. Hydrogen production economics, updated from the Phase 2 analysis, showed pricing of $5 to $6 per kilogram of hydrogen using current gas purification systems. Hydrogen costs under $3 per kilogram are achievable if next-generation electrochemical separation technologies become available.

Edward C. Heydorn

2012-10-26T23:59:59.000Z

476

U-221: ISC BIND 9 DNSSEC Validation CVE-2012-3817 Denial of Service...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Off-by-one Bug Lets Remote Users Deny Service U-260: ISC BIND RDATA Processing Flaw Lets Remote Users Deny Service U-183: ISC BIND DNS Resource Records Handling Vulnerability...

477

PREDICTING THE TIME RESPONSE OF A BUILDING UNDER HEAT INPUT CONDITIONS FOR ACTIVE SOLAR HEATING SYSTEMS  

E-Print Network (OSTI)

INPUT CONDITIONS FOR ACTIVE SOLAR HEATING SYSTEMS Mashuri L.CONDITIONS FOR ACTIVE SOLAR HEATING SYSTEMS * Mashuri L.consists of a hydronic solar space heating system with heat

Warren, Mashuri L.

2013-01-01T23:59:59.000Z

478

DOE Seeks Additional Input on Next Generation Nuclear Plant | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Seeks Additional Input on Next Generation Nuclear Plant Seeks Additional Input on Next Generation Nuclear Plant DOE Seeks Additional Input on Next Generation Nuclear Plant April 17, 2008 - 10:49am Addthis WASHINGTON, DC -The U.S. Department of Energy (DOE) today announced it is seeking public and industry input on how to best achieve the goals and meet the requirements for the Next Generation Nuclear Plant (NGNP) demonstration project work at DOE's Idaho National Laboratory. DOE today issued a Request for Information and Expressions of Interest from prospective participants and interested parties on utilizing cutting-edge high temperature gas reactor technology in the effort to reduce greenhouse gas emissions by enabling nuclear energy to replace fossil fuels used by industry for process heat. "This is an opportunity to advance the development of safe, reliable, and

479

DOE Seeks Public Input on an Integrated, Interagency Pre-Application  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Seeks Public Input on an Integrated, Interagency Seeks Public Input on an Integrated, Interagency Pre-Application Process for Transmission Authorizations DOE Seeks Public Input on an Integrated, Interagency Pre-Application Process for Transmission Authorizations August 29, 2013 - 9:09am Addthis A Request for Information (RFI) seeking public input for a draft Integrated, Interagency Pre-application (IIP) Process was published in the Federal Register on August 29, 2013. The Federal Register Notice is available now for downloading. Comments must be received on or before September 30, 2013. As comments are received, they will be posted online. The proposed IIP Process is intended to improve interagency and intergovernmental coordination focused on ensuring that project proponents develop and submit accurate and complete information early in the project

480

Documentation of Calculation Methodology, Input data, and Infrastructure for the Home Energy Saver Web Site  

E-Print Network (OSTI)

Water Heater Analysis. 26 3.3 Major Appliances 28 3.3.1 Refrigerator Energy Consumption . 28 3.3.1.1 User Inputs to the Refrigerator Model .

2005-01-01T23:59:59.000Z