Powered by Deep Web Technologies
Note: This page contains sample records for the topic "manager bugs permit" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting...  

Energy Savers (EERE)

V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions V-026: RSA Data Protection Manager Bugs Permit...

2

V-146: HP Service Manager Bugs Permit Cross-Site Scripting and Information  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: HP Service Manager Bugs Permit Cross-Site Scripting and 6: HP Service Manager Bugs Permit Cross-Site Scripting and Information Disclosure Attacks V-146: HP Service Manager Bugs Permit Cross-Site Scripting and Information Disclosure Attacks May 1, 2013 - 12:43am Addthis PROBLEM: HP Service Manager Bugs Permit Cross-Site Scripting and Information Disclosure Attacks PLATFORM: Service Manager v9.31 Web Tier ABSTRACT: Two vulnerabilities were reported in HP Service Manager REFERENCE LINKS: HP Document ID: c03748875 SecurityTracker Alert ID: 1028496 CVE-2012-5222 CVE-2013-2321 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can obtain potentially sensitive information [CVE-2012-5222]. Service Manager Web Tier does not properly filter HTML code from user-supplied input before displaying the input [CVE-2013-2321]. A remote

3

V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: RSA Data Protection Manager Bugs Permit Cross-Site Scripting 6: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions November 16, 2012 - 6:00am Addthis PROBLEM: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions. PLATFORM: RSA Data Protection Manager Appliance versions 2.7.x and 3.x ABSTRACT: Two vulnerabilities were reported in RSA Data Protection Manager. REFERENCE LINKS: SecurityTracker Alert ID: 1027781 EMC Identifier: ESA-2012-055 RSA Worldwide Customer Support CVE-2012-4612 CVE-2012-4613 IMPACT ASSESSMENT: Medium DISCUSSION: Two vulnerabilities were reported in RSA Data Protection Manager. A remote

4

V-146: HP Service Manager Bugs Permit Cross-Site Scripting and...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

the update from The HP Software Support Online (SSO). Addthis Related Articles V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting...

5

V-202: Cisco Video Surveillance Manager Bugs Let Remote Users...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain Potentially Sensitive Information V-202: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain Potentially...

6

U-047: Siemens Automation License Manager Bugs Let Remote Users...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or...

7

V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Mozilla Firefox 'window.location' Bugs Permit Cross-Site 2: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code October 29, 2012 - 6:00am Addthis PROBLEM: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code PLATFORM: Firefox, Thunderbird, SeaMonkey ABSTRACT: Three vulnerabilities were reported in Mozilla Firefox. REFERENCE LINKS: Mozilla Foundation Security Advisory 2012-90 SecurityTracker Alert ID: 1027701 SecurityTracker Alert ID: 1027702 Advisory: RHSA-2012:1407-1 CVE-2012-4194 CVE-2012-4195 CVE-2012-4196 IMPACT ASSESSMENT: High DISCUSSION: A remote user can exploit the valueOf() method of window.location to, in

8

U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: RSA enVision Bugs Permit Cross-Site Scripting, SQL 9: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks March 20, 2012 - 7:00am Addthis PROBLEM: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks PLATFORM: 4.x, prior to 4.1 Patch 4 ABSTRACT: Several vulnerabilities were reported in RSA enVision. A remote user can access the system. A remote authenticated user can conduct cross-site scripting attacks. A remote authenticated user can inject SQL commands. A remote authenticated user can view files on the target system. Reference LINKS: SecurityTracker Alert ID: 1026819 CVE-2012-0403 IMPACT ASSESSMENT: High Discussion: The system does not properly filter HTML code from user-supplied input

9

V-078: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: WordPress Bugs Permit Cross-Site Scripting and Port Scanning 8: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks V-078: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks January 28, 2013 - 12:32am Addthis PROBLEM: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks PLATFORM: WordPress all versions are affected prior to 3.5.1 ABSTRACT: WordPress 3.5.1 Maintenance and Security Release REFERENCE LINKS: WordPress News SecurityTracker Alert ID: 1028045 Secunia Advisory SA51967 IMPACT ASSESSMENT: Medium DISCUSSION: Several scripts do not properly filter HTML code from user-supplied input before displaying the input. A remote user can cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the site running the WordPress software and will run in the security

10

V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Mozilla Firefox 'window.location' Bugs Permit Cross-Site 2: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code October 29, 2012 - 6:00am Addthis PROBLEM: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code PLATFORM: Firefox, Thunderbird, SeaMonkey ABSTRACT: Three vulnerabilities were reported in Mozilla Firefox. REFERENCE LINKS: Mozilla Foundation Security Advisory 2012-90 SecurityTracker Alert ID: 1027701 SecurityTracker Alert ID: 1027702 Advisory: RHSA-2012:1407-1 CVE-2012-4194 CVE-2012-4195 CVE-2012-4196 IMPACT ASSESSMENT: High DISCUSSION: A remote user can exploit the valueOf() method of window.location to, in

11

U-052: HP Protect Tools Device Access Manager Unspecified Bug...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Flaw Lets Remote Users Update Firmware with Arbitrary Code U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code U-049:...

12

U-201: HP System Management Homepage Bugs Let Remote Users Deny...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

01: HP System Management Homepage Bugs Let Remote Users Deny Service U-201: HP System Management Homepage Bugs Let Remote Users Deny Service June 28, 2012 - 7:00am Addthis PROBLEM:...

13

Hawaii Individual Wastewater Management Permit Packet | Open...  

Open Energy Info (EERE)

to library PermittingRegulatory Guidance - Supplemental Material: Hawaii Individual Wastewater Management Permit PacketPermittingRegulatory GuidanceSupplemental Material Author...

14

U-027: RSA Key Manager Appliance Session Logout Bug Fails to Terminate  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: RSA Key Manager Appliance Session Logout Bug Fails to 7: RSA Key Manager Appliance Session Logout Bug Fails to Terminate Sessions U-027: RSA Key Manager Appliance Session Logout Bug Fails to Terminate Sessions November 4, 2011 - 8:00am Addthis PROBLEM: RSA Key Manager Appliance Session Logout Bug Fails to Terminate Sessions. PLATFORM: RSA Key Manager Appliance 2.7 Service Pack 1 ABSTRACT: A remote authenticated user session may not terminate properly. reference LINKS: SecurityTracker Alert ID: 1026276 SecurityFocus Bug Traq Seclists: ESA-2011-035 CVE-2011-2740 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in RSA Key Manager Appliance. A remote authenticated user session may not terminate properly. When using Firefox 4 and 5, an authenticated user session is not terminated properly when logging out.

15

U-168: EMC Documentum Information Rights Management Server Bugs Let Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

168: EMC Documentum Information Rights Management Server Bugs Let 168: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service U-168: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service May 14, 2012 - 7:00am Addthis PROBLEM: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service PLATFORM: Information Rights Management Server 4.x, 5.x ABSTRACT: Two vulnerabilities were reported in EMC Documentum Information Rights Management Server. A remote authenticated user can cause denial of service conditions. Reference links: SecurityTracker Alert ID: 1027058 CVE-2012-2276 CVE-2012-2277 IMPACT ASSESSMENT: High Discussion: A remote authenticated user can send specially crafted data to trigger a NULL pointer dereference and cause the target service to crash. A remote

16

U-047: Siemens Automation License Manager Bugs Let Remote Users Deny  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Siemens Automation License Manager Bugs Let Remote Users 7: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code November 29, 2011 - 9:00am Addthis PROBLEM: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code. PLATFORM: Siemens Automation License Manager 500.0.122.1 ABSTRACT: Several vulnerabilities were reported in Siemens Automation License Manager. reference LINKS: SecurityTracker Alert ID: 1026354 Bugtraq Siemens Advisory Services IMPACT ASSESSMENT: Medium Discussion: A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions. A remote user can send specially crafted *_licensekey commands to trigger a

17

U-025: HP OpenView Network Node Manager Bugs Let Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-025: HP OpenView Network Node Manager Bugs Let Remote Users U-025: HP OpenView Network Node Manager Bugs Let Remote Users Execute Arbitrary Code U-025: HP OpenView Network Node Manager Bugs Let Remote Users Execute Arbitrary Code November 2, 2011 - 8:00am Addthis PROBLEM: HP OpenView Network Node Manager Bugs Let Remote Users Execute Arbitrary Code. PLATFORM: HP OpenView Network Node Manager (OV NNM) v7.51, v7.53 running on HP-UX, Linux, Solaris, and Windows ABSTRACT: A remote user can execute arbitrary code on the target system. reference LINKS: HP Support Center Document ID: c03054052 SecurityTracker Alert ID: 1026260 CVE-2011-1365 CVE-2011-1366 CVE-2011-1367 IMPACT ASSESSMENT: Medium Discussion: Several vulnerabilities were reported in HP OpenView Network Node Manager. A remote user can execute arbitrary code on the target system.

18

U-137: HP Performance Manager Unspecified Bug Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: HP Performance Manager Unspecified Bug Lets Remote Users 7: HP Performance Manager Unspecified Bug Lets Remote Users Execute Arbitrary Codes U-137: HP Performance Manager Unspecified Bug Lets Remote Users Execute Arbitrary Codes March 30, 2012 - 9:15am Addthis PROBLEM: HP Performance Manager Unspecified Bug Lets Remote Users Execute Arbitrary Codes PLATFORM: HP-UX B.11.31 HP-UX B.11.23 ABSTRACT: A remote user can execute arbitrary code on the target system. REFERENCE LINKS: HP Support Document ID: c03255321 SecurityTracker Alert ID: 1026869 CVE-2012-0127 IMPACT ASSESSMENT: High Discussion: A potential security vulnerability has been identified with HP Performance Manager running on HP-UX, Linux, Solaris, and Windows. The vulnerability could be exploited remotely to execute arbitrary code and to create a Denial of Service (DoS).

19

U-052: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: HP Protect Tools Device Access Manager Unspecified Bug Lets 2: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code U-052: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code December 6, 2011 - 7:00am Addthis PROBLEM: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code. PLATFORM: HP Protect Tools Device Access Manager for Windows earlier than v.6.1.0.1 running on the following HP PCs: HP EliteBook 2560p Notebook PC HP EliteBook 2760p Notebook PC HP EliteBook 8460p Notebook PC HP EliteBook 8460w Mobile Workstation HP EliteBook 8560p Notebook PC HP EliteBook 8560w Mobile Workstation HP EliteBook 8760w Mobile Workstation HP ProBook 4230s Notebook PC

20

U-052: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: HP Protect Tools Device Access Manager Unspecified Bug Lets 2: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code U-052: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code December 6, 2011 - 7:00am Addthis PROBLEM: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code. PLATFORM: HP Protect Tools Device Access Manager for Windows earlier than v.6.1.0.1 running on the following HP PCs: HP EliteBook 2560p Notebook PC HP EliteBook 2760p Notebook PC HP EliteBook 8460p Notebook PC HP EliteBook 8460w Mobile Workstation HP EliteBook 8560p Notebook PC HP EliteBook 8560w Mobile Workstation HP EliteBook 8760w Mobile Workstation HP ProBook 4230s Notebook PC

Note: This page contains sample records for the topic "manager bugs permit" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

V-202: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Cisco Video Surveillance Manager Bugs Let Remote Users 2: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain Potentially Sensitive Information V-202: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain Potentially Sensitive Information July 25, 2013 - 2:52am Addthis PROBLEM: A remote user can obtain potentially sensitive information and modify some configuration settings. A remote user can exploit this to create, modify, and remove camera feeds, archives, logs, and users. PLATFORM: Cisco Video Surveillance Manager 7.1, 7.5 ABSTRACT: Two vulnerabilities were reported in Cisco Video Surveillance Manager REFERENCE LINKS: Security Tracker Alert ID: 1028827 CVE-2013-3429 CVE-2013-3430 CVE-2013-3431 IMPACT ASSESSMENT: Medium DISCUSSION: The vulnerability is due to an access control error that occurred. The

22

U-201: HP System Management Homepage Bugs Let Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: HP System Management Homepage Bugs Let Remote Users Deny 1: HP System Management Homepage Bugs Let Remote Users Deny Service U-201: HP System Management Homepage Bugs Let Remote Users Deny Service June 28, 2012 - 7:00am Addthis PROBLEM: A vulnerability was reported in HP System Management Homepage. PLATFORM: Version(s): prior to 7.1.1 ABSTRACT: The vulnerabilities could be exploited remotely resulting in unauthorized access, disclosure of information, data modification, Denial of Service (DoS), and execution of arbitrary code. Reference links: Original Advisory Security Tracker ID 1027209 CVE-2012-2012, CVE-2012-2013, CVE-2012-2014 CVE-2012-2015, CVE-2012-2016 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in HP System Management Homepage. A remote authenticated user can gain elevated privileges. A remote authenticated

23

Hawaii Permit Application for Solid Waste Management Facility...  

Open Energy Info (EERE)

to receive a permit for a solid waste management facility. Form Type CertificateForm of Completion Form Topic Permit Application for Solid Waste Management Facility Organization...

24

Idaho DEQ Waste Management and Permitting Webpage | Open Energy...  

Open Energy Info (EERE)

Permitting Webpage Jump to: navigation, search OpenEI Reference LibraryAdd to library Web Site: Idaho DEQ Waste Management and Permitting Webpage Abstract This webpage provides...

25

Bureau of Land Management - Geothermal Drilling Permit | Open...  

Open Energy Info (EERE)

Bureau of Land Management - Geothermal Drilling Permit Jump to: navigation, search OpenEI Reference LibraryAdd to library Form: Bureau of Land Management - Geothermal Drilling...

26

T-693: Symantec Endpoint Protection Manager Input Validation Hole Permits  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Symantec Endpoint Protection Manager Input Validation Hole 3: Symantec Endpoint Protection Manager Input Validation Hole Permits Cross-Site Scripting and Cross-Site Request Forgery Attacks T-693: Symantec Endpoint Protection Manager Input Validation Hole Permits Cross-Site Scripting and Cross-Site Request Forgery Attacks August 15, 2011 - 3:42pm Addthis PROBLEM: Two vulnerabilities were reported in Symantec Endpoint Protection Manager. A remote user can conduct cross-site scripting attacks. A remote user can conduct cross-site request forgery attacks. PLATFORM: Version(s): 11.0 RU6(11.0.600x), 11.0 RU6-MP1(11.0.6100), 11.0 RU6-MP2(11.0.6200), 11.0 RU6-MP3(11.0.6300) ABSTRACT: Symantec Endpoint Protection Manager Input Validation Hole Permits Cross-Site Scripting and Cross-Site Request Forgery Attacks. reference LINKS:

27

V-192: Symantec Security Information Manager Input Validation Flaws Permit  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

92: Symantec Security Information Manager Input Validation Flaws 92: Symantec Security Information Manager Input Validation Flaws Permit Cross-Site Scripting, SQL Injection, and Information Disclosure Attacks V-192: Symantec Security Information Manager Input Validation Flaws Permit Cross-Site Scripting, SQL Injection, and Information Disclosure Attacks July 4, 2013 - 6:00am Addthis PROBLEM: Several vulnerabilities were reported in Symantec Security Information Manager PLATFORM: Symantec Security Information Manager Appliance Version 4.7.x and 4.8.0 ABSTRACT: Symantec was notified of multiple security issues impacting the SSIM management console REFERENCE LINKS: SecurityTracker Alert ID: 1028727 Symantec Security Advisory SYM13-006 CVE-2013-1613 CVE-2013-1614 CVE-2013-1615 IMPACT ASSESSMENT: Medium DISCUSSION: The console does not properly filter HTML code from user-supplied input

28

Water Bugs  

NLE Websites -- All DOE Office Websites (Extended Search)

Bugs Bugs Nature Bulletin No. 221-A March 12, 1966 Forest Preserve District of Cook County Seymour Simon, President Roland F. Eisenbeis, Supt. of Conservation WATER BUGS It is fascinating to lie in a boat or on a log at the edge of the water and watch the drama that unfolds among the small water animals. Among the star performers in small streams and ponds are the Water Bugs. These are aquatic members of that large group of insects called the "true bugs", most of which live on land. Moreover, unlike many other types of water insects, they do not have gills but get their oxygen directly from the air. Those that do go beneath the surface usually carry an oxygen supply with them in the form of a shiny glistening sheath of air imprisoned among a covering of fine waterproof hairs. The common water insect known to small boys at the "Whirligig Bug" is not a water bug but a beetle.

29

State of Tennessee Hazardous Waste Management Permit, TNHW-127  

NLE Websites -- All DOE Office Websites (Extended Search)

Class 1 1 Modification, Dated: 10/20/06 TABLE OF CONTENTS U.S. DEPARTMENT OF ENERGY, Y-12 NATIONAL SECURITY COMPLEX OAK RIDGE, TENNESSEE HAZARDOUS WASTE CONTAINER STORAGE AND TREATMENT UNITS BUILDINGS 9206, 9212, 9720-12, 9811-9, AND 9812 AND THE ORGANIC HANDLING UNIT EPA ID NUMBER: TN3 89 009 0001 Page Number I. STANDARD CONDITIONS A. EFFECT OF PERMIT I-1 B. SEVERABILITY I-1 C. DEFINITIONS I-2 D. GENERAL DUTIES AND REQUIREMENTS I-4 E. CONFIDENTIAL INFORMATION I-10 F. DOCUMENTS TO BE MAINTAINED AT THE FACILITY I-10 G. ANNUAL MAINTENANCE FEE I-10 H. REQUIRED NOTICES I-10 I. ORDER OF PRECEDENCE I-11 J. PERMIT STRUCTURE I-11 II. GENERAL FACILITY CONDITIONS A. HAZARDOUS WASTES TO BE MANAGED II-1 B. MAINTENANCE OF THE FACILITY II-1

30

State of Tennessee Hazardous Waste Management Permit, TNHW-122  

NLE Websites -- All DOE Office Websites (Extended Search)

Class 1 1 Modification, Dated: 12/18/06 TABLE OF CONTENTS U.S. DEPARTMENT OF ENERGY, Y-12 NATIONAL SECURITY COMPLEX OAK RIDGE, TENNESSEE HAZARDOUS WASTE CONTAINER STORAGE AND TREATMENT UNITS BUILDINGS 9720-9, 9720-25, AND 9720-31 EPA ID NUMBER: TN3 89 009 0001 Page Number I. STANDARD CONDITIONS A. EFFECT OF PERMIT I-1 B. SEVERABILITY I-1 C. DEFINITIONS I-2 D. GENERAL DUTIES AND REQUIREMENTS I-4 E. CONFIDENTIAL INFORMATION I-10 F. DOCUMENTS TO BE MAINTAINED AT THE FACILITY I-10 G. ANNUAL MAINTENANCE FEE I-10 H. REQUIRED NOTICES I-10 I. ORDER OF PRECEDENCE I-11 J. PERMIT STRUCTURE I-11 II. GENERAL FACILITY CONDITIONS A. HAZARDOUS WASTES TO BE MANAGED II-1 B. MAINTENANCE OF THE FACILITY II-1 C. SAMPLING, ANALYSIS, AND MONITORING II-1

31

U-204: HP Network Node Manager i Input Validation Hole Permits Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: HP Network Node Manager i Input Validation Hole Permits 4: HP Network Node Manager i Input Validation Hole Permits Cross-Site Scripting Attacks U-204: HP Network Node Manager i Input Validation Hole Permits Cross-Site Scripting Attacks July 3, 2012 - 7:00am Addthis PROBLEM: HP Network Node Manager i Input Validation Hole Permits Cross-Site Scripting Attacks PLATFORM: Version(s): 8.x, 9.0x, 9.1x ABSTRACT: Potential security vulnerabilities have been identified with HP Network Node Manager I (NNMi) for HP-UX, Linux, Solaris, and Windows. The vulnerabilities could be remotely exploited resulting in cross site scripting (XSS). reference LINKS: The Vendor's Advisory SecurityTracker Alert ID: 1027215 CVE-2012-2018 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in HP Network Node Manager i. The software does not properly filter HTML code from user-supplied input before

32

U-212: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: RSA Authentication Manager Flaws Permit Cross-Site and 2: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks U-212: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks July 13, 2012 - 7:00am Addthis PROBLEM: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks PLATFORM: RSA Authentication Manager 7.1 is vulnerable; other versions may also be affected. ABSTRACT: RSA Authentication Manager is prone to multiple security vulnerabilities because it fails to properly sanitize user-supplied input. Attackers can exploit these issues to execute arbitrary script or HTML code, steal cookie-based authentication credentials, and conduct phishing attacks. Other attacks may also be possible.

33

U-238: HP Service Manager Input Validation Flaw Permits Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: HP Service Manager Input Validation Flaw Permits Cross-Site 8: HP Service Manager Input Validation Flaw Permits Cross-Site Scripting Attacks U-238: HP Service Manager Input Validation Flaw Permits Cross-Site Scripting Attacks August 17, 2012 - 7:00am Addthis PROBLEM: HP Service Manager Input Validation Flaw Permits Cross-Site Scripting Attacks PLATFORM: Version(s): 7.11, 9.21, 9.30 ABSTRACT: Cross-site scripting (XSS) vulnerability in HP Service Manager Web Tier 7.11, 9.21, and 9.30, and HP Service Center Web Tier 6.28, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. REFERENCE LINKS: www2.hp.com http://www.securitytracker.com/id/1027399 CVE-2012-3251 IMPACT ASSESSMENT: Moderate Discussion: A vulnerability was reported in HP Service Manager. A remote user can conduct cross-site scripting attacks. The software does not properly filter

34

U-229: HP Network Node Manager i Input Validation Flaw Permits Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: HP Network Node Manager i Input Validation Flaw Permits 9: HP Network Node Manager i Input Validation Flaw Permits Cross-Site Scripting Attacks U-229: HP Network Node Manager i Input Validation Flaw Permits Cross-Site Scripting Attacks August 7, 2012 - 7:00am Addthis PROBLEM: HP Network Node Manager i Input Validation Flaw Permits Cross-Site Scripting Attacks PLATFORM: HP Network Node Manager I (NNMi) v8.x, v9.0x, v9.1x, v9.20 for HP-UX, Linux, Solaris, and Windows ABSTRACT: Potential security vulnerabilities have been identified with HP Network Node Manager i (NNMi) for HP-UX, Linux, Solaris, and Windows. The vulnerabilities could be remotely exploited resulting in cross site scripting (XSS). Reference LINKS: HP Document ID: c03405705 SecurityTracker Alert ID: 1027345 Bugtraq ID: 54815 CVE-2012-2022 IMPACT ASSESSMENT:

35

U-238: HP Service Manager Input Validation Flaw Permits Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

38: HP Service Manager Input Validation Flaw Permits Cross-Site 38: HP Service Manager Input Validation Flaw Permits Cross-Site Scripting Attacks U-238: HP Service Manager Input Validation Flaw Permits Cross-Site Scripting Attacks August 17, 2012 - 7:00am Addthis PROBLEM: HP Service Manager Input Validation Flaw Permits Cross-Site Scripting Attacks PLATFORM: Version(s): 7.11, 9.21, 9.30 ABSTRACT: Cross-site scripting (XSS) vulnerability in HP Service Manager Web Tier 7.11, 9.21, and 9.30, and HP Service Center Web Tier 6.28, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. REFERENCE LINKS: www2.hp.com http://www.securitytracker.com/id/1027399 CVE-2012-3251 IMPACT ASSESSMENT: Moderate Discussion: A vulnerability was reported in HP Service Manager. A remote user can conduct cross-site scripting attacks. The software does not properly filter

36

U-204: HP Network Node Manager i Input Validation Hole Permits Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

204: HP Network Node Manager i Input Validation Hole Permits 204: HP Network Node Manager i Input Validation Hole Permits Cross-Site Scripting Attacks U-204: HP Network Node Manager i Input Validation Hole Permits Cross-Site Scripting Attacks July 3, 2012 - 7:00am Addthis PROBLEM: HP Network Node Manager i Input Validation Hole Permits Cross-Site Scripting Attacks PLATFORM: Version(s): 8.x, 9.0x, 9.1x ABSTRACT: Potential security vulnerabilities have been identified with HP Network Node Manager I (NNMi) for HP-UX, Linux, Solaris, and Windows. The vulnerabilities could be remotely exploited resulting in cross site scripting (XSS). reference LINKS: The Vendor's Advisory SecurityTracker Alert ID: 1027215 CVE-2012-2018 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in HP Network Node Manager i. The software does not properly filter HTML code from user-supplied input before

37

A bug's leaf | EMSL  

NLE Websites -- All DOE Office Websites (Extended Search)

A bug's leaf A bug's leaf Leaf-cutter ant fungus gardens give bioenergy-relevant information Leafcutter ants cultivate gardens of fungi and bacteria. Photo courtesy of Alejandro...

38

U-238: HP Service Manager Input Validation Flaw Permits Cross...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9.21, 9.30 ABSTRACT: Cross-site scripting (XSS) vulnerability in HP Service Manager Web Tier 7.11, 9.21, and 9.30, and HP Service Center Web Tier 6.28, allows remote attackers...

39

Massive June Bug Emergence  

NLE Websites -- All DOE Office Websites (Extended Search)

Massive June Bug Emergence Massive June Bug Emergence Name: Cordell Location: N/A Country: N/A Date: N/A Question: We are infested with june bugs next to the street light near the end of my driveway. They have burrowed into the ground and underneath my driveway. Yesterday we shoveled 2/3 of a 33-gallon trash bag of just bugs. What can we spray or do to kill these june bugs? Replies: Not knowing which part of the country you are from and I could be wrong because of this fact buy this does not sound like June Bugs. This has to be a Circadia outbreak which are relatives to the June Bug. They run in 13, 17 or other year cycles and this depends upon the part of the country you are from. Ask a local garden center or naturalist and you'll probably see that this won't happen again for a number of years to come.

40

U-049: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users...  

Energy Savers (EERE)

Netcool Reporter Support and Downloads . Addthis Related Articles U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code U-048:...

Note: This page contains sample records for the topic "manager bugs permit" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

U-045: Windows Win32k.sys Keyboard Layout Bug Lets Local Users...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Restrict access to trusted users only. Addthis Related Articles U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code U-046:...

42

V-149: Microsoft Internet Explorer Object Access Bug Lets Remote...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code...

43

RCRA Permit for a Hazardous Waste Management Facility, Permit Number NEV HW0101, Annual Summary/Waste Minimization Report  

SciTech Connect

This report summarizes the EPA identification number of each generator from which the Permittee received a waste stream, a description and quantity of each waste stream in tons and cubic feet received at the facility, the method of treatment, storage, and/or disposal for each waste stream, a description of the waste minimization efforts undertaken, a description of the changes in volume and toxicity of waste actually received, any unusual occurrences, and the results of tank integrity assessments. This Annual Summary/Waste Minimization Report is prepared in accordance with Section 2.13.3 of Permit Number NEV HW0101.

Arnold, Patrick [NSTec] [NSTec

2014-02-14T23:59:59.000Z

44

V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-255: Apache Wicket Input Validation Flaw Permits Cross-Site Scripting Attacks U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting...

45

Method-level bug prediction  

Science Journals Connector (OSTI)

Researchers proposed a wide range of approaches to build effective bug prediction models that take into account multiple aspects of the software development process. Such models achieved good prediction performance, guiding developers towards those parts ... Keywords: code metrics, fine-grained source code changes, method-level bug prediction

Emanuel Giger; Marco D'Ambros; Martin Pinzger; Harald C. Gall

2012-09-01T23:59:59.000Z

46

bug | OpenEI Community  

Open Energy Info (EERE)

bug bug Home Rmckeel's picture Submitted by Rmckeel(297) Contributor 20 July, 2012 - 07:55 Image upload with broken thumbnail image bug images wiki OpenEI users can upload images to the wiki by typing a new file name http://en.openei.org/wiki/File:My_new_file.jpg However, due to a caching timing issue, right after upload, the 120px-wide thumbnail has not yet been created by the time the fetier cache goes after it. Thus, the thumbnail appears broken. Is anyone up for debugging? For users uploading images, this can be fixed by forcing a reload of the page: Rmckeel's picture Submitted by Rmckeel(297) Contributor 19 June, 2012 - 08:04 "Ghost" entries bug utility rate There is an issue that Illinois State University has come across. From Nick B: Syndicate content 429 Throttled (bot load)

47

Chinch Bugs in St. Augustine Lawns  

E-Print Network (OSTI)

Chinch bugs can be extremely damaging to home lawns. Their feeding causes small yellow or brown areas in lawns. Chinch bugs can usually be seen on careful inspection of the soil surface. Insecticides provide effective control....

Merchant, Michael E.; Mott, Dale

2006-10-17T23:59:59.000Z

48

Team Bug Bag Biogas For Nicaragua  

E-Print Network (OSTI)

Team Bug Bag Biogas For Nicaragua Project Recap The task for Team Bug Bag was to create for under $100 (USD), and be able to produce biogas that could boil water for a thirty minute time period

Demirel, Melik C.

49

Summary of Bugs Database Jeremy Kepner  

E-Print Network (OSTI)

written to create the current version of the bugs database. 1.2 Brief Project History Development1 Summary of Bugs Database Jeremy Kepner September, 1993 1. Introduction 1.1 Document Purpose of the Bugs database began in May of 1992. Initially, a very simple database model was used. By July

Kepner, Jeremy

50

U-212: RSA Authentication Manager Flaws Permit Cross-Site and...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

actions on the site acting as the target user. Solution: The vendor has issued a fix (Patch 14 (P14) for RSA Authentication Manager 7.1 SP4 and Appliance 3.0 SP4). Addthis...

51

RCRA Permit for a Hazardous Waste Management Facility Permit Number NEV HW0101 Annual Summary/Waste Minimization Report Calendar Year 2012, Nevada National Security Site, Nevada  

SciTech Connect

This report summarizes the U.S. Environmental Protection Agency (EPA) identification number of each generator from which the Permittee received a waste stream, a description and quantity of each waste stream in tons and cubic feet received at the facility, the method of treatment, storage, and/or disposal for each waste stream, a description of the waste minimization efforts undertaken, a description of the changes in volume and toxicity of waste actually received, any unusual occurrences, and the results of tank integrity assessments. This Annual Summary/Waste Minimization Report is prepared in accordance with Section 2.13.3 of Permit Number NEV HW0101, issued 10/17/10.

,

2013-02-21T23:59:59.000Z

52

RCRA Permit for a Hazardous Waste Management Facility Permit Number NEV HW0101 Annual Summary/Waste Minimization Report Calendar Year 2011  

SciTech Connect

This report summarizes the U.S. Environmental Protection Agency (EPA) identification number of each generator from which the Permittee received a waste stream; a description and quantity of each waste stream in tons and cubic feet received at the facility; the method of treatment, storage, and/or disposal for each waste stream; a description of the waste minimization efforts undertaken; a description of the changes in volume and toxicity of waste actually received; any unusual occurrences; and the results of tank integrity assessments. This Annual Summary/Waste Minimization Report is prepared in accordance with Section 2.13.3 of Permit Number NEV HW0101.

NSTec Environmental Restoration

2012-02-16T23:59:59.000Z

53

U-012: BlackBerry Enterprise Server Collaboration Service Bug...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

12: BlackBerry Enterprise Server Collaboration Service Bug Lets Remote Users Impersonate Intra-organization Messages U-012: BlackBerry Enterprise Server Collaboration Service Bug...

54

V-127: Samba Bug Lets Remote Authenticated Users Modify Files | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Samba Bug Lets Remote Authenticated Users Modify Files 7: Samba Bug Lets Remote Authenticated Users Modify Files V-127: Samba Bug Lets Remote Authenticated Users Modify Files April 5, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Samba. PLATFORM: The vulnerabilities are reported in version(s): 3.6.0 - 3.6.5 ABSTRACT: A remote authenticated user can modify files on the target share REFERENCE LINKS: SecurityTracker Alert ID: 1028389 Samba Security Announcement CVE-2013-0454 IMPACT ASSESSMENT: Medium DISCUSSION: A remote authenticated user can perform operations on the target CIFS export that are not permitted by the CIFS share access control settings. This may include writing to read-only shares. IMPACT: Modification of user information SOLUTION: Update to 3.6.6 and higher or apply the following patch Addthis

55

V-127: Samba Bug Lets Remote Authenticated Users Modify Files | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Samba Bug Lets Remote Authenticated Users Modify Files 7: Samba Bug Lets Remote Authenticated Users Modify Files V-127: Samba Bug Lets Remote Authenticated Users Modify Files April 5, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Samba. PLATFORM: The vulnerabilities are reported in version(s): 3.6.0 - 3.6.5 ABSTRACT: A remote authenticated user can modify files on the target share REFERENCE LINKS: SecurityTracker Alert ID: 1028389 Samba Security Announcement CVE-2013-0454 IMPACT ASSESSMENT: Medium DISCUSSION: A remote authenticated user can perform operations on the target CIFS export that are not permitted by the CIFS share access control settings. This may include writing to read-only shares. IMPACT: Modification of user information SOLUTION: Update to 3.6.6 and higher or apply the following patch Addthis

56

Scale Insects and Mealy Bugs  

NLE Websites -- All DOE Office Websites (Extended Search)

Scale Insects and Mealy Bugs Scale Insects and Mealy Bugs Nature Bulletin No. 404-A January 30, 1971 Forest Preserve District of Cook County George W. Dunne, President Roland F. Eisenbeis, Supt. of Conservation SCALE INSECTS AND MEALY BUGS The insect world contains an enormous number and variety of species but, of them all, the Scale Insects and Mealy Bugs come nearest to being vegetables. Most insects are active animals that fly, hop, scamper, crawl or burrow, but these queer creatures spend most of their lives merely sitting in one spot, sucking plant juices from a branch, twig, leaf, or fruit. Some of our most destructive pests are included among the several hundred kinds of these highly specialized insects. They are so small that the average person seldom realizes that they are responsible for the sickly or dying condition of a tree or shrub. Adult scale insects are extremely variable in shape, and range in size from that of a pinhead up to forms which are a quarter of an inch long. Each hides under a hard protective shell, or scale, of wax secreted by pores on its body, and are frequently so numerous that they form a dense crust. The females molt a few times, and usually discard their legs and wings, before they mature. She lays eggs under the scale and then dies. These hatch into young (called "crawlers") which move around for a period varying from a few hours to a day or two before they settle down and build scales. Unlike the female, the male -always the smaller of the two -- goes through a cocoon stage from which he emerges with a pair of wings but with no means of taking food. He merely mates and dies. Males are scarce In most kinds and in many species have never been seen.

57

QA procedures and emissions from nonstandard sources in AQUIS, a PC-based emission inventory and air permit manager  

SciTech Connect

The Air Quality Utility Information System (AQUIS) is a database management system that operates under dBASE IV. It runs on an IBM-compatible personal computer (PC) with MS DOS 5.0 or later, 4 megabytes of memory, and 30 megabytes of disk space. AQUIS calculates emissions for both traditional and toxic pollutants and reports emissions in user-defined formats. The system was originally designed for use at 7 facilities of the Air Force Materiel Command, and now more than 50 facilities use it. Within the last two years, the system has been used in support of Title V permit applications at Department of Defense facilities. Growth in the user community, changes and additions to reference emission factor data, and changing regulatory requirements have demanded additions and enhancements to the system. These changes have ranged from adding or updating an emission factor to restructuring databases and adding new capabilities. Quality assurance (QA) procedures have been developed to ensure that emission calculations are correct even when databases are reconfigured and major changes in calculation procedures are implemented. This paper describes these QA and updating procedures. Some user facilities include light industrial operations associated with aircraft maintenance. These facilities have operations such as fiberglass and composite layup and plating operations for which standard emission factors are not available or are inadequate. In addition, generally applied procedures such as material balances may need special treatment to work in an automated environment, for example, in the use of oils and greases and when materials such as polyurethane paints react chemically during application. Some techniques used in these situations are highlighted here. To provide a framework for the main discussions, this paper begins with a description of AQUIS.

Smith, A.E.; Tschanz, J.; Monarch, M.

1996-05-01T23:59:59.000Z

58

Permitted Mercury Storage Facility Notifications | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Services Waste Management Waste Disposition Long-Term Management and Storage of Elemental Mercury is in the Planning Stages Permitted Mercury Storage Facility...

59

Dynamically fighting bugs : prevention, detection and elimination  

E-Print Network (OSTI)

This dissertation presents three test-generation techniques that are used to improve software quality. Each of our techniques targets bugs that are found by different stake-holders: developers, testers, and maintainers. ...

Artzi, Shay

2009-01-01T23:59:59.000Z

60

Bed Bugs: Clinical Relevance and Control Options  

Science Journals Connector (OSTI)

...most do not come with quality efficacy data; an industry standard can review these...Anonymous. 2010. Bedbug bites becoming bigger battle. CMAJ 182 : 1606. 19. Anonymous...bug (Hemiptera: Cimicidae) by static electricity and air currents. J. Entomol. Sci...

Stephen L. Doggett; Dominic E. Dwyer; Pablo F. Peas; Richard C. Russell

2012-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "manager bugs permit" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Pollution Prevention and Best Management Practices Plan for State Waste Discharge Permits ST-4508 - ST-4509 and ST-4510  

SciTech Connect

On December 23, 1991, the U.S. Department of Energy, Richland Operations Office (DOE-RL) and the Washington State Department of Ecology (Ecology) agreed to adhere to the provisions of Department of Ecology Consent Order No. DE 91NM- 177 (Consent Order). The Consent Order lists regulatory milestones for liquid effluent streams on the Hanford Site to comply with the permitting requirements of Washington Administrative Code (WAC) 173-216, State Waste Discharge Permit Program, or WAC 173-21 8, Washington Underground Injection Control Program, where applicable. Hanford Site liquid effluent streams discharging to the soil column are categorized in the Consent Order as follows: Phase I Streams; Phase II Streams; and Miscellaneous Streams. Phase I and Phase II Streams are addressed in two reports: Plan and Schedule to Discontinue Disposal of Contaminated Liquids into the Soil Column at the Hanford Site (DOE-RL 1987), and Annual Status of the Report of the Plan and schedule to Discontinue Disposal of Contaminated Liquids into the Soil Column at the Hanford Site (WHC-EP-0196-1). There originally were 33 Phase I and Phase II Streams; however, some streams have been eliminated. Miscellaneous streams are those liquid effluent streams discharged to the ground that arc not categorized as Phase I or Phase II Streams. Source waters of miscellaneous streams originate directly from the Columbia River, from treated Columbia River water, or from groundwater and demineralized water. Miscellaneous streams result primarily from source water used in processes such as cooling, hydrotesting, and steam generation. Miscellaneous streams also occur through the use of these source waters for maintenance and construction activities such as draining, flushing, and washing. Miscellaneous streams discharging to the soil column on the Hanford Site were subject to the requirements of several milestones identified in the Consent Order (DE 91NM-177). The Plan and Schedule for Disposition and Regulatory Compliance for Miscellaneous Streams (DOE/RL-93-94) provides for the disposition of miscellaneous streams to satisfy one of the Consent Order Section 6 requirements. Additional commitments established in the plan and schedule (Activity 6.2.3,6.2.4, and 6.2.6) were to submit WAC 173-216 Categorical State Waste Discharge Permit applications for hydrotest, maintenance, and Construction waste water, cooling water and condensate, and storm water discharges. Activity 6.2.5 required the submittal of a WAC 173-216 Categorical State Waste Discharge Permit application for surface water discharges from coal ramp washdown, vehicle washing, and safety shower discharges. However, through stream elimination and through permitting streams under existing Categorical Permits, Ecology agreed to eliminate the requirements under activity 6.2.5.

WILLIAMS, J.F.

2000-01-01T23:59:59.000Z

62

U-153: EMC Data Protection Advisor Server and Collector Bugs...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

53: EMC Data Protection Advisor Server and Collector Bugs Let Remote Users Deny Service U-153: EMC Data Protection Advisor Server and Collector Bugs Let Remote Users Deny Service...

63

Individual Permit for Storm Water  

NLE Websites -- All DOE Office Websites (Extended Search)

Individual Permit Individual Permit Individual Permit for Storm Water The Individual Permit authorizes the discharge of storm water associated with historical industrial activities at LANL from specified solid waste management units and areas of concern, collectively referred to as Sites. October 15, 2012 Sandia Canyon Wetlands Sandia Canyon Wetlands in the early morning looking north. Get Expertise Environmental Communications & Public Involvement Email In the Individual Permit, to 'minimize' means to reduce and/or eliminate discharges of pollutants in storm water to the extent achievable. What is the Individual Permit for Storm Water? The Permit - NPDES No. NM0030759 - was issued by the U.S. Environmental Protection Agency, Region 6, on September 30, 2010 to Los Alamos National

64

Identification of permit and waste acceptance criteria provisions requiring modification for acceptance of commercial mixed waste. National Low-Level Waste Management Program  

SciTech Connect

In October 1990, representatives of States and compact regions requested that the US Department of Energy (DOE) explore an agreement with host States and compact regions under which DOE would accept commercial mixed low-level radioactive waste (LLW) at DOE`s own treatment and disposal facilities. A program for DOE management of commercial mixed waste is made potentially more attractive in light of the low commercial mixed waste volumes, high regulatory burdens, public opposition to new disposal sites, and relatively high cost of constructing commercial disposal facilities. Several studies were identified as essential in determining the feasibility of DOE accepting commercial mixed waste for disposal. The purpose of this report is to identify any current or proposed waste acceptance criteria (WAC) or Resource Conservation and Recovery Act (RCRA) provisions that would have to be modified for commercial mixed waste acceptance at specified DOE facilities. Following the introduction, Section 2 of this report (a) provides a background summary of existing and proposed mixed waste disposal facilities at each DOE site, and (b) summarizes the status of any RCRA Part B permit and WAC provisions relating to the disposal of mixed waste, including provisions relating to acceptance of offsite waste. Section 3 provides overall conclusions regarding the current status and permit modifications that must be implemented in order to grant DOE sites authority under their permits to accept commercial mixed waste for disposal. Section 4 contains a list of references.

Not Available

1994-03-01T23:59:59.000Z

65

State Waste Discharge Permit ST-4502 Implementation Plan  

SciTech Connect

Plan has been developed to demonstrate compliance with regulatory requirements set forth in Permit ST-3502 and as a line management tool for use in maintaining configuration control of permit as well as documentation used to implement permit requirements.

BROWN, M.J.; LECLAIR, M.D.

2000-09-27T23:59:59.000Z

66

Bed Bugs: Clinical Relevance and Control Options  

Science Journals Connector (OSTI)

...assist those who cannot pay the high price of control, bed bugs are set to...antigen and bronchial asthma in Egypt. J. Egypt. Soc. Parasitol. 21 : 735-746...Doggett, SL . 2009. Identification natural history, p 13-22. InSL Doggett...

Stephen L. Doggett; Dominic E. Dwyer; Pablo F. Peas; Richard C. Russell

2012-01-01T23:59:59.000Z

67

Water Permits (Louisiana)  

Energy.gov (U.S. Department of Energy (DOE))

The Water Permits Division authorizes permits administered under the Water Quality Regulations. Louisiana's Water Quality Regulations require permits for the discharge of pollutants from any point...

68

WIPP Hazardous Waste Permit - Approved Modifications  

NLE Websites -- All DOE Office Websites (Extended Search)

Modification to Add South Access Road for Transportation of TRU Mixed Waste dated March 17, 2011 Class 1 Permit Modification Notification to Revise TRU-Pact III Management...

69

Permitting and solid waste management issues for the Bailly Station wet limestone Advanced Flue Gas Desulfurization (AFGD) system  

SciTech Connect

Pure Air (a general partnership between Air Products and Chemicals, Inc., and Mitsubishi Heavy Industries America, Inc.). is constructing a wet limestone co-current advanced flue gas desulfurization (AFGD) system that has technological and commercial advantages over conventional FGD systems in the United States. The AFGD system is being installed at the Northern Indiana Public Service Company's Bailly Generating Station near Gary, Indiana. The AFGD system is scheduled to be operational by the Summer, 1992. The AFGD system will remove at least 90 percent of the sulfur dioxide (SO{sub 2}) in the flue gas from Boilers 7 and 8 at the Station while burning 3.2 percent sulfur coal. Also as part of testing the AFGD system, 95 percent removal of SO{sub 2} will be demonstrated on coals containing up to 4.5 percent sulfur. At the same time that SO{sub 2} is removed from the flue gas, a gypsum by-product will be produced which will be used for wallboard manufacturing. Since the AFGD system is a pollution control device, one would expect its installation to be received favorably by the public and regulatory agencies. Although the project was well received by regulatory agencies, on public group (Save the Dunes Council) was initially concerned since the project is located adjacent to the Indiana Dunes National Lakeshore. The purpose of this paper is to describe the project team's experiences in obtaining permits/approvals from regulatory agencies and in dealing with the public. 1 ref., 1 fig., 2 tabs.

Bolinsky, F.T. (Pure Air, Allentown, PA (United States)); Ross, J. (Northern Indiana Public Service Co., Hammond, IN (United States)); Dennis, D.S. (United Engineers and Constructors, Inc., Denver, CO (United States). Stearns-Roger Div.); Huston, J.S. (Environmental Alternatives, Inc., Warren NJ (USA))

1991-01-01T23:59:59.000Z

70

V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Bug Lets Local Users Deny Service V-098: Linux Kernel Extended Verification Module Bug Lets Local Users Deny Service U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...

71

U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass...

72

U-163: PHP Command Parameter Bug Lets Remote Users Obtain Potentially...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

63: PHP Command Parameter Bug Lets Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code U-163: PHP Command Parameter Bug Lets Remote Users Obtain...

73

Microsoft Word - Final BUGS article final.docx  

NLE Websites -- All DOE Office Websites (Extended Search)

of a good peak resource (Figure 1). Characteristics of a Good Peak Resource Demand Response Program Central- Station Peaker BUGS for Peaks Close to the Load ...

74

Class 1 Permit Modification Notification  

NLE Websites -- All DOE Office Websites (Extended Search)

Class 1 Permit Modification to the Hazardous Waste Facility Permit, Permit Number: NM4890139088-TSDF Dear Mr. Kieling : Enclosed is a Class 1 Permit Modification Notification 1 0:...

75

U-073: Bugzilla Flaws Permit Cross-Site Scripting and Cross-Site Request  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

73: Bugzilla Flaws Permit Cross-Site Scripting and Cross-Site 73: Bugzilla Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks U-073: Bugzilla Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks January 3, 2012 - 10:30am Addthis PROBLEM: Bugzilla Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks PLATFORM: Version(s): prior to 3.4.13, 3.6.7, 4.0.3, 4.2rc1 ABSTRACT: Several vulnerabilities were reported in Bugzilla. A remote user can conduct cross-site scripting attacks. reverence LINKS: SecurityTracker Alert ID: 1026480 3.4.12 Security Advisory Bug 697699 Bug 703975 Bug 703983 IMPACT ASSESSMENT: Medium Discussion: Tabular and graphical reports, as well as new charts have a debug mode which displays raw data as plain text. This text is not correctly escaped and a crafted URL could use this vulnerability to inject code leading to

76

History's Worst Software Bugs By Simson Garfinkel Story location: http://www.wired.com/news/technology/bugs/0,2924,69355,00.html  

E-Print Network (OSTI)

they lurk within our cell phones and our pacemakers, our power plants and medical equipment. And now, in our working for the U.S. Central Intelligence Agency allegedly (.pdf) plant a bug in a Canadian computer: "first actual case of a bug being found." Sixty years later, computer bugs are still with us, and show

Overstreet, C. Michael

77

U-141: Sourcefire Defense Center Bugs | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Sourcefire Defense Center Bugs 1: Sourcefire Defense Center Bugs U-141: Sourcefire Defense Center Bugs April 5, 2012 - 8:30am Addthis PROBLEM: Sourcefire Defense Center Bugs Let Remote Users Traverse the Directory, Access the Database, and Conduct Cross-Site Scripting Attacks PLATFORM: Version(s): prior to 4.10.2.3 ABSTRACT: Several vulnerabilities were reported in Sourcefire Defense Center. A remote user can conduct cross-site scripting attacks. A remote user can access the database. A remote user can view files on the target system reference LINKS: Original Advisory Security Tracker ID 1026890 Secunia Advisory 48667 IMPACT ASSESSMENT: Medium Discussion: A remote user can cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the Sourcefire Defense

78

U-141: Sourcefire Defense Center Bugs | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Sourcefire Defense Center Bugs 1: Sourcefire Defense Center Bugs U-141: Sourcefire Defense Center Bugs April 5, 2012 - 8:30am Addthis PROBLEM: Sourcefire Defense Center Bugs Let Remote Users Traverse the Directory, Access the Database, and Conduct Cross-Site Scripting Attacks PLATFORM: Version(s): prior to 4.10.2.3 ABSTRACT: Several vulnerabilities were reported in Sourcefire Defense Center. A remote user can conduct cross-site scripting attacks. A remote user can access the database. A remote user can view files on the target system reference LINKS: Original Advisory Security Tracker ID 1026890 Secunia Advisory 48667 IMPACT ASSESSMENT: Medium Discussion: A remote user can cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the Sourcefire Defense

79

V-098: Linux Kernel Extended Verification Module Bug Lets Local...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

reported in the Linux Kernel. REFERENCE LINKS: The Linux Kernel Archives Linux Kernel Red Hat Bugzilla - Bug 913266 SecurityTracker Alert ID: 1028196 CVE-2013-0313 IMPACT...

80

V-128: Xen Event Channel Tracking Pointer Bug Local Privilege...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

privileges on the target host system. SOLUTION: The vendor has issued a fix (xsa47-4.1.patch, xsa47-4.2-unstable.patch). Addthis Related Articles U-232: Xen p2mteardown() Bug...

Note: This page contains sample records for the topic "manager bugs permit" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Zoning and Permitting Resources  

Energy.gov (U.S. Department of Energy (DOE))

Zoning and permitting is commonly controlled by local governments and may be applicable to both residential and commercial properties.

82

T-633: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

33: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets Remote Users Deny Service T-633: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets Remote Users Deny Service May 31,...

83

T-579: BlackBerry Device Software Bug in WebKit Lets Remote Users...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

79: BlackBerry Device Software Bug in WebKit Lets Remote Users Execute Code T-579: BlackBerry Device Software Bug in WebKit Lets Remote Users Execute Code March 15, 2011 - 5:05pm...

84

T-563: Red Hat Directory Server Bugs Let Local Users Gain Elevated...  

Office of Environmental Management (EM)

T-563: Red Hat Directory Server Bugs Let Local Users Gain Elevated Privileges and Remote and Local Users Deny Service T-563: Red Hat Directory Server Bugs Let Local Users Gain...

85

U-053: Linux kexec Bugs Let Local and Remote Users Obtain Potentially...  

Energy Savers (EERE)

and enhancement update U-068:Linux Kernel SGIO ioctl Bug Lets Local Users Gain Elevated Privileges T-712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update...

86

V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets...  

Office of Environmental Management (EM)

71: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service...

87

V-015: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information V-015: Apple iOS Bugs Let Remote...

88

V-203: HP LoadRunner Multiple Bugs Let Remote Users Deny Service...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

system. SOLUTION: The vendor has issued a fix(11.52) Addthis Related Articles V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code V-171: Apple Safari Bugs Let...

89

U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

21: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-121: Apple iOS Bugs Let Remote...

90

Permitting Guides | Department of Energy  

Energy Savers (EERE)

Permitting Guides Permitting Guides Standardized procedures for permitting hydrogen technologies and systems are not yet well established. As a first step, DOE sponsored...

91

U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Scripting, SQL Injection, and Directory Traversal Attacks PLATFORM: 4.x, prior to 4.1 Patch 4 ABSTRACT: Several vulnerabilities were reported in RSA enVision. A remote user can...

92

Stormwater Permits (Vermont)  

Energy.gov (U.S. Department of Energy (DOE))

Stormwater permits are required for the construction of a new generation facility, the reconstruction or expansion of a facility, the operation of a generation facility which discharges stormwater...

93

Hanford Dangerous Waste Permit  

NLE Websites -- All DOE Office Websites (Extended Search)

training, security) * Closure plan Tank-Related Permit Units New * 149 single-shell tanks (SSTs) * 28 double-shell tanks (DSTs) Existing * 242-A Evaporator * Waste Treatment...

94

HQ Work Control Permit | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

HQ Work Control Permit HQ Work Control Permit HQ Work Control Permit To ensure safe operations when undertaking work at DOE Headquarters, the Office of Headquarters Health and Safety has developed a Work Permit document (doc) to help ensure the safety of all workers and headquarters employees. The form should be completed and brought to the Office of Headquarters Safety, Health and Security office at GE-112 at the Forrestal facility, or the Germantown Building Manager's office at E-076 for review and sign off. Any questions can be directed to the HQ Health and Safety office on (202) 586-1005. HQ_Work_Control_Permit.docx More Documents & Publications Preliminary Notice of Violation, Petsco and Son, Inc - EA-96-06 OSS 19.10 Barriers and Postings 5/26/95 OSS 19.3 Confined Space Entry 5/23/95

95

HQ Work Control Permit | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

HQ Work Control Permit HQ Work Control Permit HQ Work Control Permit To ensure safe operations when undertaking work at DOE Headquarters, the Office of Headquarters Health and Safety has developed a Work Permit document (doc) to help ensure the safety of all workers and headquarters employees. The form should be completed and brought to the Office of Headquarters Safety, Health and Security office at GE-112 at the Forrestal facility, or the Germantown Building Manager's office at E-076 for review and sign off. Any questions can be directed to the HQ Health and Safety office on (202) 586-1005. HQ_Work_Control_Permit.docx More Documents & Publications Preliminary Notice of Violation, Petsco and Son, Inc - EA-96-06 OSS 19.3 Confined Space Entry 5/23/95 WA_02_026_UNITED_TECHNOLOGIES_Waiver_of_Domestic_and_Foreign

96

Microsoft Word - Final BUGS article final.docx  

NLE Websites -- All DOE Office Websites (Extended Search)

October 18, 2010 DOE/NETL-2010/1435 BUGS: The Next Smart Grid Peak Resource? BUGS: The Next Smart Grid Peak Resource? 2 Prepared by: Booz Allen Hamilton (BAH) Steve Pullins Horizon Energy Group DOE Contract number: DE-FE000400 BUGS: The Next Smart Grid Peak Resource? 3 Acknowledgements This report was prepared by Booz Allen Hamilton, Inc. (BAH) for the United States Department of Energy's National Energy Technology Laboratory. This work was completed under DOE NETL Contract Number DE-FE000400, and performed under BAH Task 430.04. The authors wish to acknowledge the excellent guidance, contributions, and cooperation of the NETL staff, particularly: Steven Bossart, Integrated Electric Power Systems Division Director Keith Dodrill, Integrated Electric Power Systems Division NETL Technical Monitor

97

Direct Discharge Permit (Vermont)  

Energy.gov (U.S. Department of Energy (DOE))

A direct discharge permit is required if a project involves the discharge of pollutants to state waters. For generation purposes, this involves the withdrawal of surface water for cooling purposes...

98

Presidential Permits- Procedures  

Energy.gov (U.S. Department of Energy (DOE))

Executive Order 12038 states that, before a Presidential permit may be issued, the action must be found to be consistent with the public interest. The two criteria used by DOE to determine if a...

99

Lockout: Efficient Testing for Deadlock Bugs Ali Kheradmand  

E-Print Network (OSTI)

Lockout: Efficient Testing for Deadlock Bugs Ali Kheradmand School of Computer and Communication introduce Lockout, a technique and a tool that increases the proba- bility of deadlock manifestation and the testing infrastructure. Lockout produces binaries that are more prone to deadlock compared to native

Candea, George

100

Foiling the Flu Bug Global Partnerships for Nuclear Energy  

E-Print Network (OSTI)

1 1663 Foiling the Flu Bug Global Partnerships for Nuclear Energy Dark Universe Mysteries WILL NOT NEED TESTING Expanding Nuclear Energy the Right Way GLOBAL PARTNERSHIPS AND AN ADVANCED FUEL CYCLE sense.The Laboratory is operated by Los Alamos National Security, LLC, for the Department of Energy

Note: This page contains sample records for the topic "manager bugs permit" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

U-061: RSA Adaptive Authentication Bugs Let Remote Users Bypass...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Bugs Let Remote Users Bypass Certain Security Controls. PLATFORM: 6.0.2.1 SP1 Patch 2 and SP1 Patch 3 6.0.2.1 SP2 and SP2 Patch 1 6.0.2.1 SP3 ABSTRACT: A remote user may...

102

EIS-0442: Reauthorization of Permits, Maintenance, and Vegetation Management on Western Area Power Administration Transmission Lines on Forest Service Lands, Colorado, Nebraska, and Utah  

Energy.gov (U.S. Department of Energy (DOE))

This EIS is being prepared jointly by DOEs Western Area Power Administration and the U.S. Forest Service. The EIS evaluates the potential environmental impacts of Westerns proposed changes to vegetation management along its transmission line rights-of-way on National Forest System lands in Colorado, Utah, and Nebraska.

103

Annual Hanford Site environmental permitting status report  

SciTech Connect

The information contained and/or referenced in this Annual Hanford Site Environmental Permitting Status Report (Status Report) addresses the State Environmental Policy Act (SEPA) of 1971 and Condition II.W. of the Resource Conservation and Recovery Act (RCRA) of 1976 Permit, Dangerous Waste Portion (DW Portion). Condition II.W. of the RCRA Permit specifies the Permittees are responsible for all other applicable federal, state, and local permits for the development and operation of the Hanford Facility. Condition II.W. of the RCRA Permit specifies that the Permittees are to use their best efforts to obtain such permits. For the purposes of permit condition, `best efforts` means submittal of documentation and/or approval(s) in accordance with schedules specified in applicable regulations, or as determined through negotiations with the applicable regulatory agencies. This Status Report includes information on all existing and anticipated environmental permitting. Environmental permitting required by RCRA, the Hazardous and Solid Waste Amendments (HSWA) of 1984, and non-RCRA permitting (solid waste handling, Clean Air Act Amendments of 1990, Clean Water Act Amendments of 1987, Washington State waste discharge, and onsite sewage system) is addressed. Information on RCRA and non-RCRA is current as of July 31, 1998. For the purposes of RCRA and the State of Washington Hazardous Waste Management Act of 1976 [as administered through the Dangerous Waste Regulations, Washington Active Code (WAC) 173-303], the Hanford Facility is considered a single facility. As such, the Hanford Facility has been issued one US Environmental Protection Agency (EPA)/State Identification Number (WA7890008967). This EPA/State identification number encompasses over 60 treatment, storage, and/or disposal (TSD) units. The Washington State Department of Ecology (Ecology) has been delegated authority by the EPA to administer the RCRA, including mixed waste authority. The RCRA permitting approach for the Hanford Facility is addressed in the Hanford Federal Facility Agreement and Consent Order (Tri-Party Agreement). Pursuant to the Tri-Party Agreement, a single RCRA permit was issued by Ecology and the EPA to cover the Hanford Facility. The RCRA Permit, through the permit modification process, eventually will incorporate all TSD units.

Sonnichsen, J.C.

1998-09-17T23:59:59.000Z

104

Hanford Facility RCRA permit handbook  

SciTech Connect

Purpose of this Hanford Facility (HF) RCRA Permit Handbook is to provide, in one document, information to be used for clarification of permit conditions and guidance for implementing the HF RCRA Permit.

NONE

1996-03-01T23:59:59.000Z

105

Aquatic Habitat Protection Permit (Saskatchewan, Canada) | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Aquatic Habitat Protection Permit (Saskatchewan, Canada) Aquatic Habitat Protection Permit (Saskatchewan, Canada) Aquatic Habitat Protection Permit (Saskatchewan, Canada) < Back Eligibility Agricultural Commercial Construction Developer Industrial Installer/Contractor Institutional Investor-Owned Utility Local Government Low-Income Residential Multi-Family Residential Municipal/Public Utility Nonprofit Residential Rural Electric Cooperative Schools Utility Savings Category Buying & Making Electricity Water Home Weatherization Solar Wind Program Info State Saskatchewan Program Type Environmental Regulations Siting and Permitting Provider Saskatchewan Ministry of the Environment The Environmental Management and Protection Act, 2002 (EMPA) provides for the protection of aquatic habitat and states that a permit is required: to

106

T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

68: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site 68: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request Forgery Attacks and Execute Arbitrary Code T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request Forgery Attacks and Execute Arbitrary Code March 2, 2011 - 3:05pm Addthis PROBLEM: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request Forgery Attacks and Execute Arbitrary Code. PLATFORM: Firefox, Thunderbird, SeaMonkey ABSTRACT: Mozilla developers identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and Mozilla presume that with enough effort at least some of these could be exploited to run arbitrary code. reference LINKS:

107

"Mobile money" services permit  

E-Print Network (OSTI)

"Mobile money" services permit cell phone users to send small amounts of money via text message to their friends and relatives. There are over 90 mobile money services in the world today, mainly in emergingTure oF Money october 2012 - April 2013 Muriel Ansley reynolds exhibit GAllery For the full exhibit checklist

Loudon, Catherine

108

T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct...

109

Montana Water Quality Permit Application, Nondegradation Authorization...  

Open Energy Info (EERE)

LibraryAdd to library PermittingRegulatory Guidance - Supplemental Material: Montana Water Quality Permit Application, Nondegradation Authorization, and Permit FeesPermitting...

110

OpenEI/URDB Bug? | OpenEI Community  

Open Energy Info (EERE)

OpenEI/URDB Bug? OpenEI/URDB Bug? Home > Groups > Utility Rate Clarknd's picture Submitted by Clarknd(20) Member 26 November, 2012 - 07:39 I ran into a problem today on the Utility Rate Database (URDB). Every time I select the "Assume net metering (buy = sell)" box and go to save the page for some reason it doesn't save that change and reverts back to "No" rather than "Yes". Groups: Utility Rate Login to post comments Latest discussions Rmckeel New page curation tool Posted: 7 May 2013 - 08:16 by Rmckeel Rmckeel Considering removing "Show Preview" button on utility rate form edit Posted: 22 Apr 2013 - 13:55 by Rmckeel 5 comment(s) 1 of 10 ›› Groups Menu You must login in order to post into this group. Latest discussion comments NickL

111

Permit application handbook  

SciTech Connect

The objective of this handbook is to explain how to prepare a mining permit application which will satisfy the requirements of the Federal Surface Mining Control and Reclamation Act of 1977 (SMCRA) (Public Law 95-87). The requirements described in this Handbook come from the permanent program regulations issued by the Office of Surface Mining (OSM) on March 13, 1979 and the court decisions and regulatory changes up until June 1981. This Handbook was developed to provide mine operators, particularly operators of small Appalachian mines, with an explanation of the Federal permit application requirements and the work which will be entailed in satisfying these requirements. Requirement explanations in the following areas are presented: site description; surface waters; ground waters; cultural resources; road; topsoil handling; blasting plans; water quality control; excess spoil disposal; reclamation plan; and special mining conditions. (DMC)

Not Available

1981-06-23T23:59:59.000Z

112

Maintenance and Veg Management  

NLE Websites -- All DOE Office Websites (Extended Search)

Infrastructure projects Interconnection OASIS OATT Reauthorization of Transmission Line Permits, Maintenance and Vegetation Management on Forest Service Lands in Colorado,...

113

Hawaii Application for Surface Water Use Permit for Proposed...  

Open Energy Info (EERE)

Use Permit for Proposed New Use in a Designated Surface Water Management Area (DLNR Form SWUPA-N) Jump to: navigation, search OpenEI Reference LibraryAdd to library Form: Hawaii...

114

V-177: VMware vCenter Chargeback Manager File Upload Handling...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Vendor recommends updating to version 2.5.1 Addthis Related Articles U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code U-048:...

115

Entrapment of bed bugs by leaf trichomes inspires microfabrication of biomimetic surfaces  

Science Journals Connector (OSTI)

...18 h; the total area impacted by 60 bug feet with eight locomotory cycles per minute...generally occurred on the underside of the foot. The same legs that appeared irreversibly...potential to harness the bed bug-entrapping power of natural leaf surfaces using purely physical...

2013-01-01T23:59:59.000Z

116

Using Combinatorial Benchmark Construction to Improve the Assessment of Concurrency Bug Detection Tools  

E-Print Network (OSTI)

of performance measures. The inclusion of performance measures ensure that we can assess the fitnessUsing Combinatorial Benchmark Construction to Improve the Assessment of Concurrency Bug Detection, it is difficult to assess the fitness of a particular con- currency bug detection method and to compare

Bradbury, Jeremy S.

117

Permitting of Consumptive Uses of Water (Florida) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Permitting of Consumptive Uses of Water (Florida) Permitting of Consumptive Uses of Water (Florida) Permitting of Consumptive Uses of Water (Florida) < Back Eligibility Agricultural Commercial Construction Developer Fed. Government Fuel Distributor General Public/Consumer Industrial Installer/Contractor Institutional Investor-Owned Utility Local Government Low-Income Residential Multi-Family Residential Municipal/Public Utility Nonprofit Residential Retail Supplier Rural Electric Cooperative Schools State/Provincial Govt Systems Integrator Transportation Tribal Government Utility Savings Category Water Buying & Making Electricity Home Weatherization Program Info State Florida Program Type Siting and Permitting Provider Florida Department of Environmental Protection Local water management districts are required to establish programs and

118

V-098: Linux Kernel Extended Verification Module Bug Lets Local Users Deny  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Linux Kernel Extended Verification Module Bug Lets Local 8: Linux Kernel Extended Verification Module Bug Lets Local Users Deny Service V-098: Linux Kernel Extended Verification Module Bug Lets Local Users Deny Service February 25, 2013 - 12:12am Addthis PROBLEM: Linux Kernel Extended Verification Module Bug Lets Local Users Deny Service PLATFORM: The Linux Kernel prior to 3.7.5 ABSTRACT: A vulnerability was reported in the Linux Kernel. REFERENCE LINKS: The Linux Kernel Archives Linux Kernel Red Hat Bugzilla - Bug 913266 SecurityTracker Alert ID: 1028196 CVE-2013-0313 IMPACT ASSESSMENT: Medium DISCUSSION: A local user can exploit a null pointer dereference in the evm_update_evmxattr() function in 'security/integrity/evm/evm_crypto.c' to cause the target system to crash. IMPACT: A local user can cause denial of service conditions.

119

U-068:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated 8:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated Privileges U-068:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated Privileges December 23, 2011 - 8:45am Addthis PROBLEM: Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated Privileges PLATFORM: Red Hat Enterprise Linux Desktop (v. 6) Red Hat Enterprise Linux HPC Node (v. 6) Red Hat Enterprise Linux Server (v. 6) Red Hat Enterprise Linux Server AUS (v. 6.2) Red Hat Enterprise Linux Server EUS (v. 6.2.z) Red Hat Enterprise Linux Workstation (v. 6) ABSTRACT: A local privileged user on the guest operating system can obtain elevated privileges on the target system. reference LINKS: Red Hat kernel security and bug fix update SecurityTracker Alert ID: 1026453 SecurityTracker Alert ID: 1026454

120

T-700:Red Hat: kernel security, bug fix, and enhancement update |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

700:Red Hat: kernel security, bug fix, and enhancement update 700:Red Hat: kernel security, bug fix, and enhancement update T-700:Red Hat: kernel security, bug fix, and enhancement update August 24, 2011 - 3:45pm Addthis PROBLEM: Updated kernel packages that fix several security issues, various bugs, and add two enhancements are now available for Red Hat Enterprise Linux 6. PLATFORM: Red Hat Enterprise Linux Desktop (v. 6) Red Hat Enterprise Linux HPC Node (v. 6) Red Hat Enterprise Linux Server (v. 6) Red Hat Enterprise Linux Server EUS (v. 6.1.z) Red Hat Enterprise Linux Workstation (v. 6) ABSTRACT: Red Hat: kernel security, bug fix, and enhancement update. reference LINKS: RHSA-2011: 1189-1 Secunia Advisory: SA45746 Red Hat Download CVE-2011-1182 , CVE-2011-1576 CVE-2011-1593 , CVE-2011-1776 CVE-2011-1898 , CVE-2011-2183

Note: This page contains sample records for the topic "manager bugs permit" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

V-040: Apache Tomcat Bug Lets Remote Users Bypass Security Constraints |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Apache Tomcat Bug Lets Remote Users Bypass Security 0: Apache Tomcat Bug Lets Remote Users Bypass Security Constraints V-040: Apache Tomcat Bug Lets Remote Users Bypass Security Constraints December 5, 2012 - 1:00am Addthis PROBLEM: Apache Tomcat Bug Lets Remote Users Bypass Security Constraints PLATFORM: Version(s): 6.0.0 - 6.0.35, 7.0.0 - 7.0.29 ABSTRACT: A vulnerability was reported in Apache Tomcat. REFERENCE LINKS: Apache Tomcat Red Hat Bugzilla - Bug 883634 SecurityTracker Alert ID: 1027833 CVE-2012-3546 IMPACT ASSESSMENT: High DISCUSSION: When using FORM authentication it was possible to bypass the security constraint checks in the FORM authenticator by appending /j_security_check to the end of the URL if some other component (such as the Single-Sign-On valve) had called request.setUserPrincipal() before the call to

122

Microsoft Word - Groundwater Discharge Permit  

NLE Websites -- All DOE Office Websites (Extended Search)

State Renews Groundwater Discharge Permit for WIPP CARLSBAD, N.M., September 11, 2008 - The New Mexico Environment Department (NMED) has renewed the U.S. Department of Energy's (DOE) Waste Isolation Pilot Plant (WIPP) groundwater discharge permit until 2013. The permit regulates the discharge of water from WIPP facilities and operations to lined ponds, which protect groundwater resources. The permit allows WIPP to discharge domestic wastewater, non-hazardous wastewater and storm water into 13 on-site, synthetically-lined ponds. The new permit also provides for increased daily discharge volumes to allow more flexibility in plant operations. "This permit is the result of a positive year-long effort with the New Mexico Groundwater Quality Bureau," said Jody Plum, DOE Carlsbad Field Office Permitting and

123

Presidential Permits - Procedures | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Permits - Procedures Presidential Permits - Procedures Executive Order 12038 states that, before a Presidential permit may be issued, the action must be found to be consistent with...

124

SWRCB General NPDES Permits | Open Energy Information  

Open Energy Info (EERE)

SWRCB General NPDES Permits Jump to: navigation, search OpenEI Reference LibraryAdd to library Legal Document- Permit ApplicationPermit Application: SWRCB General NPDES...

125

Washington Joint Aquatic Resources Permit Application | Open...  

Open Energy Info (EERE)

Permit Application Jump to: navigation, search OpenEI Reference LibraryAdd to library Legal Document- Permit ApplicationPermit Application: Washington Joint Aquatic...

126

Caltrans Encroachment Permit Application Guide | Open Energy...  

Open Energy Info (EERE)

Permit Application Guide Jump to: navigation, search OpenEI Reference LibraryAdd to library PermittingRegulatory Guidance - GuideHandbook: Caltrans Encroachment Permit...

127

CDPHE Industrial Individual Wastewater Discharge Permit Application...  

Open Energy Info (EERE)

Legal Document- Permit ApplicationPermit Application: CDPHE Industrial Individual Wastewater Discharge Permit ApplicationLegal Abstract Application provided by the Colorado...

128

WIPP Hazardous Waste Facility Permit Update  

SciTech Connect

The Waste Isolation Pilot Plant (WIPP) Hazardous Waste Facility Permit (HWFP) was issued on October 27, 1999 [1]. Since that time, the WIPP has sought modifications to clarify the permit language, provide alternative methods for meeting permit requirements and to update permit conditions. Significant advancements have been made in transuranic (TRU) waste management as the result of modifications to the HWFP. Among these advancements is a modification to obtain a drum age criteria (DAC) value to perform headspace gas sampling on drums to be super-compacted and placed in a 100-gallon overpack drum. In addition, the Section 311 permit modification request that would allow for more efficient waste characterization, and the modification to authorize the shipment and disposal of Remote-Handled (RH) TRU waste were merged together and submitted to the regulator as the Consolidated Permit Modification Request (PMR). The submittal of the Consolidated PMR came at the request of the regulator as part of responses to Notices of Deficiency (NODs) for the separate PMRs which had been submitted in previous years. Section 311 of the fiscal year 2004 Energy and Water Developments Appropriations Act (Public Law 108-137) [2] directs the Department of Energy to submit a permit modification that limits waste confirmation to radiography or visual examination of a statistical subpopulation of containers. Section 311 also specifically directs that disposal room performance standards be to be met by monitoring for volatile organic compounds in the underground disposal rooms. This statute translates into the elimination of other waste confirmation methods such as headspace gas sampling and analysis and solids sampling and analysis. These methods, as appropriate, will continue to be used by the generator sites during hazardous waste determinations or characterization activities. This modification is expected to reduce the overall cost of waste analysis by hundreds of millions of dollars [3]. Combining both the chap. 311 and RH TRU waste permit modification requests allows for both the regulator and DOE to expedite action on the modification requests. The Combined PMR reduces costs by having only one administrative process for both modification requests. (authors)

Kehrman, B.; Most, W. [Washington Regulatory and Environmental Services, 4021 National Parks Highway, Carlsbad, NM 88220 (United States)

2006-07-01T23:59:59.000Z

129

ODEQ - Construction Stormwater Best Management Practices Manual...  

Open Energy Info (EERE)

search OpenEI Reference LibraryAdd to library PermittingRegulatory Guidance - GuideHandbook: ODEQ - Construction Stormwater Best Management Practices ManualPermittingRegulatory...

130

Environment/Health/Safety (EHS): Operating Permits for LBNL Activities  

NLE Websites -- All DOE Office Websites (Extended Search)

Operating Permits for LBNL Activities Operating Permits for LBNL Activities LBNL Main Site Agency Expiration Date Certified Unified Program Agency Permit and Registration Hazardous Materials Release Response Plan (Hazardous Materials Business Plan) Aboveground Petroleum Storage Tanks, Spill Prevention Control and Countermeasures Plan Underground Storage Tank Program Hazardous Waste Generator Program Tiered Permit Program for Onsite Treatment of Hazardous Wastes City of Berkeley March 1, 2014 Fuel Dispensing Sources at Building 76: E85 Unleaded Bay Area Air Quality Management District July 1, 2014 Stationary Air Emission Sources (28 permits): Diesel-powered Emergency Standby Generators: Buildings 2, 31, 37(2), 48, 50A, 50B, 55, 62, 64(2), 66, 67, 68, 70, 70A, 72, 74, 77, 84B, 85 and three (3) portable units

131

U-210: Linux Kernel epoll_ctl() Bug Lets Local Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

10: Linux Kernel epoll_ctl() Bug Lets Local Users Deny Service 10: Linux Kernel epoll_ctl() Bug Lets Local Users Deny Service U-210: Linux Kernel epoll_ctl() Bug Lets Local Users Deny Service July 11, 2012 - 7:00am Addthis PROBLEM: Linux Kernel epoll_ctl() Bug Lets Local Users Deny Service PLATFORM: Version(s): 2.6.x ABSTRACT: A vulnerability was reported in the Linux Kernel. A local user can cause denial of service conditions. reference LINKS: The Vendor's Advisory SecurityTracker Alert ID: 1027237 SecurityTracker Alert ID: 1027240 Red Hat advisory CVE-2012-3375 IMPACT ASSESSMENT: Medium Discussion: The Linux kernel's Event Poll (epoll) subsystem does not properly handle resource clean up when an ELOOP error code is returned. A local user can exploit this to cause the target system to crash. Impact: A local user can cause the target system to crash.

132

U-008: Symantec Data Loss Prevention Bugs in KeyView Filter Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

08: Symantec Data Loss Prevention Bugs in KeyView Filter Lets 08: Symantec Data Loss Prevention Bugs in KeyView Filter Lets Remote Users Deny Service U-008: Symantec Data Loss Prevention Bugs in KeyView Filter Lets Remote Users Deny Service October 11, 2011 - 8:00am Addthis PROBLEM: Symantec Data Loss Prevention Bugs in KeyView Filter Lets Remote Users Deny Service PLATFORM: Symantec Data Loss Prevention Enforce/Detection Servers for Windows 10.x, 11.x ABSTRACT: A remote user can create a file that, when processed by the target filter, will cause partial denial of service conditions. reference LINKS: Symantec Security Advisory SYM11-013 SecurityTracker Alert ID: 1026157 IMPACT ASSESSMENT: Medium Discussion: Multiple vulnerabilities were reported in Symantec Data Loss Prevention. A remote user can cause denial of service conditions on the target system.A

133

U-217: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Red Hat Certificate System Bugs Let Remote Users Conduct 7: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site Scripting and Denial of Service Attacks U-217: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site Scripting and Denial of Service Attacks July 20, 2012 - 7:00am Addthis PROBLEM: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site Scripting and Denial of Service Attacks PLATFORM: Red Hat Certificate System v8 ABSTRACT: Two vulnerabilities were reported in Red Hat Certificate System. A remote user can conduct cross-site scripting attacks. A remote authenticated user can revoke the CA certificate. reference LINKS: Advisory: RHSA-2012:1103-1 SecurityTracker Alert ID: 1027284 CVE-2012-2662 CVE-2012-3367 IMPACT ASSESSMENT: Medium Discussion: The Agent and End Entity pages do not properly filter HTML code from

134

U-130: JBoss Operations Network LDAP Authentication Bug Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: JBoss Operations Network LDAP Authentication Bug Lets Remote 0: JBoss Operations Network LDAP Authentication Bug Lets Remote Users Bypass Authentication U-130: JBoss Operations Network LDAP Authentication Bug Lets Remote Users Bypass Authentication March 21, 2012 - 7:00am Addthis PROBLEM: JBoss Operations Network LDAP Authentication Bug Lets Remote Users Bypass Authentication PLATFORM: JBoss Operations Network 2.x ABSTRACT: A vulnerability was reported in JBoss Operations Network. A remote user can login with an arbitrary password in certain cases. reference LINKS: SecurityTracker Alert ID: 1026826 Secunia Advisory SA48471 CVE-2012-1100 IMPACT ASSESSMENT: Medium Discussion: The vulnerability is caused due to an error within the Lightweight Directory Access Protocol (LDAP) authentication when handling invalid bind account credentials, which can be exploited to log-in to LDAP-based

135

V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

10: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 10: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code March 13, 2013 - 12:04am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): 1.6.602.171 and prior for Windows/Mac; other versions on other platforms ABSTRACT: Several vulnerabilities were reported in Adobe Flash Player. REFERENCE LINKS: Adobe Vulnerability identifier: APSB13-09 SecurityTracker Alert ID: 1028277 CVE-2013-0646 CVE-2013-0650 CVE-2013-1371 CVE-2013-1375 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user.

136

U-074: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Microsoft .NET Bugs Let Remote Users Execute Arbitrary 4: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users U-074: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users January 4, 2012 - 8:00am Addthis PROBLEM: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users . PLATFORM: Windows XP Service Pack 3 Windows XP Professional x64 Edition Service Pack 2 Windows Server 2003 Service Pack 2 Windows Server 2003 x64 Edition Service Pack 2 Windows Server 2003 with SP2 for Itanium-based Systems Windows Vista Service Pack 2 Windows Vista x64 Edition Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 Windows Server 2008 for x64-based Systems Service Pack 2

137

U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain 9: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication May 1, 2012 - 7:00am Addthis PROBLEM: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication PLATFORM: Red Hat Enterprise MRG v2 for Red Hat Enterprise Linux (version 6) ABSTRACT: A vulnerability was reported in Red Hat Enterprise MRG Messaging. A remote user can access cluster messages and view the internal configuration. reference LINKS: SecurityTracker Alert ID: 1026990 CVE-2011-3620 Red Hat advisory IMPACT ASSESSMENT: High Discussion: Qpid may accept arbitrary passwords and SASL mechanims. A remote user on the local private interconnect network with knowledge of a valid cluster

138

V-016: HP Performance Insight Bugs with Sybase Database Let Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: HP Performance Insight Bugs with Sybase Database Let Remote 6: HP Performance Insight Bugs with Sybase Database Let Remote Users Deny Service and Take Full Control of the Target System V-016: HP Performance Insight Bugs with Sybase Database Let Remote Users Deny Service and Take Full Control of the Target System November 5, 2012 - 6:00am Addthis PROBLEM: HP Performance Insight Bugs with Sybase Database Let Remote Users Deny Service and Take Full Control of the Target System PLATFORM: HP Performance Insight v5.31, v5.40 and v5.41 running on HP-UX, Solaris, Linux, and Windows and using Sybase as the database ABSTRACT: Two vulnerabilities were reported in HP Performance Insight. REFERENCE LINKS: HP Support Document ID: c03555488 SecurityTracker Alert ID: 1027719 CVE-2012-3269 CVE-2012-3270 IMPACT ASSESSMENT: High DISCUSSION:

139

U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

57: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny 57: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service September 12, 2012 - 6:00am Addthis PROBLEM: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service PLATFORM: ColdFusion 10, 9.0.2, 9.0.1, 9.0, 8.0.1, and 8.0 for Windows, Macintosh and UNIX ABSTRACT: Adobe ColdFusion is prone to a remote denial-of-service vulnerability. reference LINKS: Adobe Security bulletins and advisories Adobe Vulnerability identifier: APSB12-21 SecurityTracker Alert ID: 1027516 Bugtraq ID: 55499 CVE-2012-2048 IMPACT ASSESSMENT: Medium Discussion: Adobe has released a security hotfix for ColdFusion 10 and earlier versions for Windows, Macintosh and UNIX. This update resolves a vulnerability which

140

U-079: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

79: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute 79: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code U-079: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code January 11, 2012 - 8:00am Addthis PROBLEM: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code. PLATFORM: Adobe Acrobat/Reader Version(s): 9.x prior to 9.5, 10.x prior to 10.1.2 ABSTRACT: A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026496 Adobe Security Bulletin APSB12-01 CVE-2011-2462, CVE-2011-4369, CVE-2011-4370, CVE-2011-4371, CVE-2011-4372, CVE-2011-4373. IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in Adobe Acrobat/Reader. A remote

Note: This page contains sample records for the topic "manager bugs permit" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

21: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, 21: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information March 9, 2012 - 7:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information PLATFORM: Apple iOS Version(s): prior to 5.1 ABSTRACT: Multiple vulnerabilities were reported in Apple iOS. reference LINKS: SecurityTracker Alert ID: 1026774 Apple Security Updates About the security content of iOS 5.1 Software Update CVE-2012-0641, CVE-2012-0642, CVE-2012-0643, CVE-2011-3453, CVE-2012-0644,

142

U-233: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote 3: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote Authenticated Users Gain Elevated Privileges U-233: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote Authenticated Users Gain Elevated Privileges August 13, 2012 - 7:00am Addthis PROBLEM: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote Authenticated Users Gain Elevated Privileges PLATFORM: Oracle Database Server versions 10.2.0.3, 10.2.0.4, 10.2.0.5, 11.1.0.7, 11.2.0.2, 11.2.0.3 ABSTRACT: A remote authenticated user with 'Create Table' privileges can gain 'SYS' privileges on the target system. Reference LINKS: Oracle Security Alert Oracle Security Alert - CVE-2012-3132 Risk Matrices SecurityTracker Alert ID: 1027367 CVE-2012-3132 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Oracle Database. This vulnerability is not

143

U-026: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Cisco Small Business SRP500 Series Bug Lets Remote Users 6: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject Commands U-026: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject Commands November 3, 2011 - 8:15am Addthis PROBLEM: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject Commands. PLATFORM: The following models are affected when running firmware prior to version 1.1.24: Cisco SRP521W Cisco SRP526W Cisco SRP527W The following models are affected when running firmware prior to version 1.2.1: Cisco SRP541W Cisco SRP546W Cisco SRP547W ABSTRACT: A remote user can create a URL that, when loaded by the target authenticated administrative user, will execute arbitrary commands on the target system. reference LINKS: Advisory ID: cisco-sa-20111102-srp500 SecurityTracker Alert ID: 1026266

144

U-155: WebCalendar Access Control and File Inclusion Bugs Let Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: WebCalendar Access Control and File Inclusion Bugs Let 5: WebCalendar Access Control and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code U-155: WebCalendar Access Control and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code April 25, 2012 - 7:00am Addthis PROBLEM: WebCalendar Access Control and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code PLATFORM: 1.2.4 and prior versions ABSTRACT: Two vulnerabilities were reported in WebCalendar. A remote user may be able to execute arbitrary PHP code on the target system. reference links: SecurityTracker Alert ID: 1026966 CVE-2012-1495 CVE-2012-1496 IMPACT ASSESSMENT: Medium Discussion: A remote user can access '/install/index.php' to potentially modify '/includes/settings/' with arbitrary values or PHP code. A remote

145

T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3:Adobe Flash Player Multiple Bugs Let Remote Users Obtain 3:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code September 22, 2011 - 8:00am Addthis PROBLEM: Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code. PLATFORM: Adobe Flash Player 10.3.183.7 and earlier versions for Windows, Macintosh, Linux and Solaris. Adobe Flash Player 10.3.186.6 and earlier versions for Android. ABSTRACT: An attacker can exploit this issue by enticing an unsuspecting victim into visiting a malicious website. reference LINKS: Adobe Security Bulletin

146

V-037: Wireshark Multiple Bugs Let Remote Users Deny Service | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Wireshark Multiple Bugs Let Remote Users Deny Service 7: Wireshark Multiple Bugs Let Remote Users Deny Service V-037: Wireshark Multiple Bugs Let Remote Users Deny Service November 30, 2012 - 3:30am Addthis PROBLEM: Wireshark Multiple Bugs Let Remote Users Deny Service PLATFORM: Version(s): prior to 1.6.12, 1.8.4 ABSTRACT: Several vulnerabilities were reported in Wireshark. REFERENCE LINKS: Wireshark Security Advisories Secunia Advisory SA51422 Seclists SecurityTracker Alert ID: 1027822 CVE-2012-5592 CVE-2012-5593 CVE-2012-5594 CVE-2012-5595 CVE-2012-5596 CVE-2012-5597 CVE-2012-5598 CVE-2012-5599 CVE-2012-5600 CVE-2012-5601 CVE-2012-5602 IMPACT ASSESSMENT: Medium DISCUSSION: Several vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions. A user can obtain potentially sensitive information.

147

U-163: PHP Command Parameter Bug Lets Remote Users Obtain Potentially  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: PHP Command Parameter Bug Lets Remote Users Obtain 3: PHP Command Parameter Bug Lets Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code U-163: PHP Command Parameter Bug Lets Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code May 7, 2012 - 7:00am Addthis PROBLEM: PHP Command Parameter Bug Lets Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code PLATFORM: Prior to 5.3.12 and 5.4.2 ABSTRACT: A vulnerability was reported in PHP. A remote user can obtain potentially sensitive information. A remote user can execute arbitrary code on the target system. reference LINKS: SecurityTracker Alert ID: 1027022 CVE-2012-1823 CVE-2012-2311 IMPACT ASSESSMENT: High Discussion: A remote user can submit a specially crafted request containing a command

148

V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Apple Safari Bugs Let Remote Users Execute Arbitrary Code 1: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks June 5, 2013 - 1:05am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks PLATFORM: Apple Safari prior to 6.0.5 ABSTRACT: Several vulnerabilities were reported in Apple Safari. REFERENCE LINKS: Apple Article: HT5785 SecurityTracker Alert ID: 1028627 CVE-2013-0926 CVE-2013-1009 CVE-2013-1012 CVE-2013-1013 CVE-2013-1023 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary

149

U-076: OpenSSL Bugs Let Remote Users Deny Service, Obtain Information, and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

76: OpenSSL Bugs Let Remote Users Deny Service, Obtain 76: OpenSSL Bugs Let Remote Users Deny Service, Obtain Information, and Potentially Execute Arbitrary Code U-076: OpenSSL Bugs Let Remote Users Deny Service, Obtain Information, and Potentially Execute Arbitrary Code January 6, 2012 - 8:15am Addthis PROBLEM: OpenSSL Bugs Let Remote Users Deny Service, Obtain Information, and Potentially Execute Arbitrary Code PLATFORM: OpenSSL prior to 0.9.8s; 1.x prior to 1.0.0f ABSTRACT: A remote user may be able to execute arbitrary code on the target system. reference LINKS: SecurityTracker Alert ID: 1026485 OpenSSL Security Advisory IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in OpenSSL. A remote user can cause denial of service conditions. A remote user can obtain sensitive information. A remote user may be able to execute arbitrary code on the

150

V-135: Cisco ASA Multiple Bugs Let Remote Users Deny Service | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Cisco ASA Multiple Bugs Let Remote Users Deny Service 5: Cisco ASA Multiple Bugs Let Remote Users Deny Service V-135: Cisco ASA Multiple Bugs Let Remote Users Deny Service April 16, 2013 - 12:21am Addthis PROBLEM: Cisco ASA Multiple Bugs Let Remote Users Deny Service PLATFORM: Cisco ASA Software for Cisco ASA 5500 Series Adaptive Security Appliances, Cisco ASA Services Module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers, and Cisco ASA 1000V Cloud Firewall are affected by multiple vulnerabilities. Affected versions of Cisco ASA Software will vary depending on the specific vulnerability. ABSTRACT: Several vulnerabilities were reported in Cisco ASA. REFERENCE LINKS: Cisco Security Advisory Secunia Advisory SA52989 SecurityTracker Alert ID: 1028415 CVE-2013-1149 CVE-2013-1150 CVE-2013-1151 CVE-2013-1152

151

V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site 0: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information April 23, 2013 - 12:26am Addthis PROBLEM: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information PLATFORM: Apache ActiveMQ versions prior to 5.8.0 ABSTRACT: Several vulnerabilities were reported in Apache ActiveMQ. REFERENCE LINKS: Apache ActiveMQ SecurityTracker Alert ID: 1028457 CVE-2012-6092 CVE-2012-6551 CVE-2013-3060 IMPACT ASSESSMENT: High DISCUSSION: Several web demos do not properly filter HTML code from user-supplied input

152

T-589: Citrix XenApp and Citrix Presentation Server Bug | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Citrix XenApp and Citrix Presentation Server Bug 9: Citrix XenApp and Citrix Presentation Server Bug T-589: Citrix XenApp and Citrix Presentation Server Bug March 28, 2011 - 3:05pm Addthis PROBLEM: Citrix XenApp and Citrix Presentation Server Bug in ActiveSync Lets Remote Users Execute Arbitrary Code. PLATFORM: Citrix XenApp Presentation versions 4.5, 5 ABSTRACT: A vulnerability was reported in Citrix XenApp (Presentation Server). A remote user can execute arbitrary code on the target system. -------------------------------------------------------------------------------- LINKS: DOE-CIRC BULLETIN: http://www.doecirc.energy.gov/bulletins/t-589.shtml OTHER LINKS: Citrix Document: CTX128366 SecurityTracker Alert ID: 1025254 Citrix Support Technical Support Downloads --------------------------------------------------------------------------------

153

U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny 7: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service September 12, 2012 - 6:00am Addthis PROBLEM: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service PLATFORM: ColdFusion 10, 9.0.2, 9.0.1, 9.0, 8.0.1, and 8.0 for Windows, Macintosh and UNIX ABSTRACT: Adobe ColdFusion is prone to a remote denial-of-service vulnerability. reference LINKS: Adobe Security bulletins and advisories Adobe Vulnerability identifier: APSB12-21 SecurityTracker Alert ID: 1027516 Bugtraq ID: 55499 CVE-2012-2048 IMPACT ASSESSMENT: Medium Discussion: Adobe has released a security hotfix for ColdFusion 10 and earlier versions for Windows, Macintosh and UNIX. This update resolves a vulnerability which

154

V-046: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

46: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 46: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code V-046: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code December 13, 2012 - 3:30am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): 11.5.502.110 and prior for Windows/Mac; 11.2.202.251 and prior for Linux ABSTRACT: Several vulnerabilities were reported in Adobe Flash Player. REFERENCE LINKS: Adobe Vulnerability identifier: APSB12-27 SecurityTracker Alert ID: 1027854 Secunia Advisory SA51560 RHSA-2012:1569-1 CVE-2012-5676 CVE-2012-5677 CVE-2012-5678 IMPACT ASSESSMENT: High DISCUSSION: A buffer overflow can trigger code execution [CVE-2012-5676]. An integer overflow can trigger code execution [CVE-2012-5677]. A memory corruption flaw can trigger code execution [CVE-2012-5678].

155

V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote  

NLE Websites -- All DOE Office Websites (Extended Search)

71: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets 71: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service January 17, 2013 - 12:00am Addthis PROBLEM: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service PLATFORM: The vulnerability is reported in versions 8.7.1 and 8.7.1.1. ABSTRACT: A vulnerability has been reported in Cisco ASA 1000V Cloud Firewall REFERENCE LINKS: Cisco Advisory ID: cisco-sa-20130116-asa1000v SecurityTracker Alert ID: 1028005 Secunia Advisory SA51897 CVE-2012-5419 IMPACT ASSESSMENT: Medium DISCUSSION: A vulnerability has been reported in Cisco ASA 1000V Cloud Firewall, which can be exploited by malicious people to cause a DoS (Denial of Service).

156

T-708:Pidgin Bugs Let Remote Users Deny Service and Potentially Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

T-708:Pidgin Bugs Let Remote Users Deny Service and Potentially T-708:Pidgin Bugs Let Remote Users Deny Service and Potentially Execute Arbitrary Code T-708:Pidgin Bugs Let Remote Users Deny Service and Potentially Execute Arbitrary Code September 1, 2011 - 12:00pm Addthis PROBLEM: gtkutils.c in Pidgin before 2.10.0 on Windows allows user-assisted remote attackers to execute arbitrary programs via a file: URL in a message. PLATFORM: Pidgin before 2.10.0 on Windows ABSTRACT: Pidgin bugs let remote users deny service and potentially execute arbitrary code. reference LINKS: CVE-2011-3185 CVE-2011-2943 CVE-2011-3184 SecurityTracker Alert ID: 1025961 Pidgin Security Advisories IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in Pidgin. A remote user can cause denial of service conditions. A remote user can cause arbitrary code to be

157

T-667: Red Hat Enterprise Linux kernel security and bug fix update |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Red Hat Enterprise Linux kernel security and bug fix update 7: Red Hat Enterprise Linux kernel security and bug fix update T-667: Red Hat Enterprise Linux kernel security and bug fix update July 13, 2011 - 7:24am Addthis PROBLEM: Red Hat Enterprise Linux kernel security and bug fix update PLATFORM: Vulnerable Linux Kernels; Red Hat Enterprise Linux Desktop (v. 6), Red Hat Enterprise Linux HPC Node (v. 6), Red Hat Enterprise Linux Server (v. 6), Red Hat Enterprise Linux Server EUS (v. 6.1.z), Red Hat Enterprise Linux Workstation (v. 6) ABSTRACT: It was found that the receive hook in the ipip_init() function in the ipip module, and in the ipgre_init() function in the ip_gre module, could be called before network namespaces setup is complete. If packets were received at the time the ipip or ip_gre module was still being loaded into

158

U-075: Apache Struts Bug Lets Remote Users Overwrite Files and Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

075: Apache Struts Bug Lets Remote Users Overwrite Files and 075: Apache Struts Bug Lets Remote Users Overwrite Files and Execute Arbitrary Code U-075: Apache Struts Bug Lets Remote Users Overwrite Files and Execute Arbitrary Code January 5, 2012 - 8:15am Addthis PROBLEM: Apache Struts Bug Lets Remote Users Overwrite Files and Execute Arbitrary Code PLATFORM: Version(s): 2.1.0 - 2.3.1 ABSTRACT: A remote user can execute arbitrary Java code on the target system. reference LINKS: SecurityTracker Alert ID: 1026484 Secunia Advisory SA47393 Bugtraq ID: 51257 Apache Struts 2 Documentation S2-008 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Apache Struts. A remote user can execute arbitrary Java code on the target system. A remote user can overwrite arbitrary files on the target system. A remote user can send specially

159

V-030: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

30: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny 30: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service V-030: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service November 21, 2012 - 3:00am Addthis PROBLEM: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service PLATFORM: ColdFusion 10 Update 1 and above for Windows ABSTRACT: Adobe ColdFusion Denial of Service Vulnerability REFERENCE LINKS: Adobe Vulnerability identifier: APSB12-25 SecurityTracker Alert ID: 1027787 Secunia Advisory SA51335 CVE-2012-5674 IMPACT ASSESSMENT: High DISCUSSION: A vulnerability was reported in Adobe ColdFusion. A remote user can cause denial of service conditions. A remote user can send specially crafted data to cause unspecified denial of service conditions on the target ColdFusion service on Windows Internet

160

U-045: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny Service  

NLE Websites -- All DOE Office Websites (Extended Search)

5: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny 5: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny Service U-045: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny Service November 25, 2011 - 9:00am Addthis PROBLEM: A vulnerability was reported in the Windows Kernel. A local user can cause denial of service conditions. PLATFORM: Windows Win32k.sys ABSTRACT: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny reference LINKS: SecurityTracker Alert ID: 1026347 Secunia ID: SA46919 IMPACT ASSESSMENT: Low Discussion: A vulnerability has been discovered in Microsoft Windows, which can be exploited by malicious, local users to cause a DoS (Denial of Service). The vulnerability is caused due to an indexing error in the win32k.sys driver when loading a keyboard layout file. This can be exploited to access

Note: This page contains sample records for the topic "manager bugs permit" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

V-091: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary 1: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary Code V-091: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary Code February 14, 2013 - 12:22am Addthis PROBLEM: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary Code PLATFORM: Adobe Reader XI (11.0.01 and earlier) for Windows and Macintosh Adobe Reader X (10.1.5 and earlier) for Windows and Macintosh Adobe Reader 9.5.3 and earlier 9.x versions for Windows and Macintosh Adobe Acrobat XI (11.0.01 and earlier) for Windows and Macintosh Adobe Acrobat X (10.1.5 and earlier) for Windows and Macintosh Adobe Acrobat 9.5.3 and earlier 9.x versions for Windows and Macintosh ABSTRACT: Adobe has identified critical vulnerabilities in Adobe Reader and Acrobat REFERENCE LINKS: Adobe Reader and Acrobat Vulnerability Report

162

V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code 3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code March 18, 2013 - 1:53am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 6.0.3 ABSTRACT: Two vulnerabilities were reported in Apple Safari. REFERENCE LINKS: Apple security update, Article: HT1222 SecurityTracker Alert ID: 1028292 CVE-2013-0960 CVE-2013-0961 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. IMPACT: A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

163

T-563: Red Hat Directory Server Bugs Let Local Users Gain Elevated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Red Hat Directory Server Bugs Let Local Users Gain Elevated 3: Red Hat Directory Server Bugs Let Local Users Gain Elevated Privileges and Remote and Local Users Deny Service T-563: Red Hat Directory Server Bugs Let Local Users Gain Elevated Privileges and Remote and Local Users Deny Service February 23, 2011 - 7:00am Addthis PROBLEM: Red Hat Directory Server Bugs Let Local Users Gain Elevated Privileges and Remote and Local Users Deny Service. PLATFORM: Red Hat Directory Server v8 EL4, Red Hat Directory Server v8 EL5 ABSTRACT: Several vulnerabilities were reported in Red Hat Directory Server. A local user can obtain elevated privileges on the target system. A remote user can cause denial of service conditions. A local user can cause denial of service conditions. A remote user can send multiple simple paged search requests to cause the

164

U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, 2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information July 27, 2012 - 7:00am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information PLATFORM: Version(s):Apple Safari prior to 6.0 ABSTRACT: Multiple vulnerabilities were reported in Apple Safari. reference LINKS: The Vendor's Advisory Bugtraq ID: 54683 SecurityTracker Alert ID: 1027307 IMPACT ASSESSMENT:

165

U-053: Linux kexec Bugs Let Local and Remote Users Obtain Potentially  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

53: Linux kexec Bugs Let Local and Remote Users Obtain 53: Linux kexec Bugs Let Local and Remote Users Obtain Potentially Sensitive Information U-053: Linux kexec Bugs Let Local and Remote Users Obtain Potentially Sensitive Information December 7, 2011 - 7:30am Addthis PROBLEM: Linux kexec Bugs Let Local and Remote Users Obtain Potentially Sensitive Information . PLATFORM: Red Hat Enterprise Linux Desktop (v. 6) Red Hat Enterprise Linux HPC Node (v. 6) Red Hat Enterprise Linux Server (v. 6) Red Hat Enterprise Linux Workstation (v. 6) ABSTRACT: Several vulnerabilities were reported in Linux kexec. A remote or local user can obtain potentially sensitive information. reference LINKS: Red Hat Security Advisory: RHSA-2011:1532-3 SecurityTracker Alert ID: 1026375 IMPACT ASSESSMENT: Medium Discussion: Kdump uses the SSH "StrictHostKeyChecking=no" option when dumping to SSH

166

U-208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary 208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code U-208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code July 10, 2012 - 7:00am Addthis PROBLEM: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code PLATFORM: HP Operations Agent for AIX, HP-UX, Linux, Solaris, and Windows prior to v11.03.12. ABSTRACT: Two vulnerabilities were reported in HP Operations Agent. A remote user can execute arbitrary code on the target system reference LINKS: The Vendor's Advisory SecurityTracker Alert ID: 1027225 CVE-2012-2019 CVE-2012-2020 IMPACT ASSESSMENT: High Discussion: Potential security vulnerabilities have been identified with HP Operations Agent for AIX, HP-UX, Linux, Solaris, and Windows. The vulnerabilities could be remotely exploited resulting in the execution of arbitrary code.

167

U-072:Apache Tomcat Hash Table Collision Bug Lets Remote Users Deny Service  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

72:Apache Tomcat Hash Table Collision Bug Lets Remote Users Deny 72:Apache Tomcat Hash Table Collision Bug Lets Remote Users Deny Service U-072:Apache Tomcat Hash Table Collision Bug Lets Remote Users Deny Service December 30, 2011 - 9:15am Addthis PROBLEM: Apache Tomcat Hash Table Collision Bug Lets Remote Users Deny Service PLATFORM: apache Tomcat 5.5.34, 6.0.34, 7.0.22; and prior versions aBSTRACT: A remote user can cause performance to degrade on the target server. reference LINKS: Apache Tomcat Security Alert SecurityTracker Alert ID: 1026477 nruns Advisory SA-2011.004 Secunia Advisory SA47411 CVE-2011-4084 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Apache Tomcat. A remote user can cause denial of service conditions. A remote user can send specially crafted POST request values to trigger hash collisions and cause significant performance

168

T-538: HP OpenView Storage Data Protector Bug Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

T-538: HP OpenView Storage Data Protector Bug Lets Remote Users T-538: HP OpenView Storage Data Protector Bug Lets Remote Users Execute Arbitrary Code T-538: HP OpenView Storage Data Protector Bug Lets Remote Users Execute Arbitrary Code January 20, 2011 - 6:39am Addthis PROBLEM: HP OpenView Storage Data Protector Bug Lets Remote Users Execute Arbitrary Code. PLATFORM: HP OpenView Storage Data Protector v6.11 ABSTRACT: A vulnerability was reported in HP OpenView Storage Data Protector. A remote user can execute arbitrary code on the target system. reference LINKS: HP Security Bulletin SecurityTracker Alert ID: 1024983 CVE-2011-0273 IMPACT ASSESSMENT: High Discussion: A potential security vulnerability has been identified with HP OpenView Storage Data Protector. The vulnerability could be remotely exploited to execute arbitrary code.

169

U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Cisco Firewall Services Module Bugs Let Remote Users Execute 9: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service October 11, 2012 - 6:00am Addthis PROBLEM: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service PLATFORM: Version(s): prior to 4.1(9) ABSTRACT: Several vulnerabilities were reported in Cisco Firewall Services Module. reference LINKS: Cisco Advisory ID: cisco-sa-20121010-fwsm SecurityTracker Alert ID: 1027640 CVE-2012-4661 CVE-2012-4662 CVE-2012-4663 IMPACT ASSESSMENT: High Discussion: A remote user can send specially crafted DCERPC data through the target device to trigger a stack overflow in the DCERPC inspection engine and execute arbitrary code on the target device or cause the target device to

170

U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

42: HP Onboard Administrator Bugs Let Remote Users Gain Access, 42: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks April 6, 2012 - 7:00am Addthis PROBLEM: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks PLATFORM: HP Onboard Administrator (OA) up to and including v3.32 ABSTRACT: A remote user can obtain potentially sensitive information. reference LINKS: HP Support Document ID: c03263573 SecurityTracker Alert ID: 1026889 CVE-2012-0128, CVE-2012-0129, CVE-2012-0130 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in HP Onboard Administrator. A remote

171

V-189: Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users Deny  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users 9: Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users Deny Service on the Target Host V-189: Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users Deny Service on the Target Host July 1, 2013 - 12:48am Addthis PROBLEM: Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users Deny Service on the Target Host PLATFORM: VirtualBox 4.2.12 ABSTRACT: A vulnerability was reported in Oracle VirtualBox. REFERENCE LINKS: VirtualBox ticket: 11863 SecurityTracker Alert ID: 1028712 IMPACT ASSESSMENT: Medium DISCUSSION: A local user on the guest operating system can issue a 'tracepath' command to cause the network on the target host system to become unavailable. IMPACT: A local user on a guest operating system can cause denial of service conditions on the target host system.

172

V-063: Adobe ColdFusion Bugs Let Remote Users Gain Access and Obtain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Adobe ColdFusion Bugs Let Remote Users Gain Access and 3: Adobe ColdFusion Bugs Let Remote Users Gain Access and Obtain Information V-063: Adobe ColdFusion Bugs Let Remote Users Gain Access and Obtain Information January 7, 2013 - 1:00am Addthis PROBLEM: Adobe ColdFusion Bugs Let Remote Users Gain Access and Obtain Information PLATFORM: ColdFusion 10, 9.0.2, 9.0.1 and 9.0 for Windows, Macintosh and UNIX ABSTRACT: Adobe has identified three vulnerabilities affecting ColdFusion for Windows, Macintosh and UNIX REFERENCE LINKS: Adobe Security Bulletin APSA13-01 SecurityTracker Alert ID: 1027938 CVE-2013-0625 CVE-2013-0629 CVE-2013-0631 IMPACT ASSESSMENT: High DISCUSSION: A remote user can bypass authentication and take control of the target system [CVE-2013-0625]. Systems with password protection disabled or with no password set are affected.

173

U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: HP Onboard Administrator Bugs Let Remote Users Gain Access, 2: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks April 6, 2012 - 7:00am Addthis PROBLEM: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks PLATFORM: HP Onboard Administrator (OA) up to and including v3.32 ABSTRACT: A remote user can obtain potentially sensitive information. reference LINKS: HP Support Document ID: c03263573 SecurityTracker Alert ID: 1026889 CVE-2012-0128, CVE-2012-0129, CVE-2012-0130 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in HP Onboard Administrator. A remote

174

U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Cisco IOS Intrusion Prevention System DNS Processing Bug 9: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service September 27, 2012 - 4:07am Addthis PROBLEM: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service PLATFORM: Devices configured with Cisco IOS IPS are affected ABSTRACT: A vulnerability was reported in Cisco IOS. reference LINKS: SecurityTracker Alert ID: 1027580 Cisco Security Advisory CVE-2012-3950 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Cisco IOS. A remote user can cause denial of service conditions. A remote user can send specially crafted (but legitimate) DNS packets through the target device to cause the device to

175

U-203: HP Photosmart Bug Lets Remote Users Deny Service | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

03: HP Photosmart Bug Lets Remote Users Deny Service 03: HP Photosmart Bug Lets Remote Users Deny Service U-203: HP Photosmart Bug Lets Remote Users Deny Service July 2, 2012 - 8:00am Addthis PROBLEM: HP Photosmart Bug Lets Remote Users Deny Service PLATFORM: HP Photosmart Wireless e-All-in-One Printer series - B110 HP Photosmart e-All-in-One Printer series - D110 HP Photosmart Plus e-All-in-One Printer series - B210 HP Photosmart eStation All-in-One Printer series - C510 HP Photosmart Ink Advantage e-All-in-One Printer series - K510 HP Photosmart Premium Fax e-All-in-One Printer series - C410 ABSTRACT: A vulnerability was reported in HP Photosmart. A remote user can cause denial of service conditions. Reference LINKS: The Vendor's Advisory SecurityTracker Alert ID: 1027213 CVE-2012-2017 IMPACT ASSESSMENT: High Discussion:

176

U-231: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

31: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service 31: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service U-231: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service August 9, 2012 - 7:00am Addthis PROBLEM: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service PLATFORM: Version(s): ASA 5500 Series; 8.2 - 8.4 ABSTRACT: Two vulnerabilities were reported in Cisco ASA. A remote or remote authenticated user can cause denial of service conditions. reference LINKS: Release Notes for the Cisco ASA 5500 Series, 8.4(x) SecurityTracker Alert ID: 1027355 CVE-2012-2472 CVE-2012-2474 IMPACT ASSESSMENT: Medium Discussion: Two vulnerabilities were reported in Cisco ASA. 1. On systems with SIP inspection enabled, a remote user can send specially crafted SIP traffic to cause the target device to create many identical

177

U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, 2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information July 27, 2012 - 7:00am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information PLATFORM: Version(s):Apple Safari prior to 6.0 ABSTRACT: Multiple vulnerabilities were reported in Apple Safari. reference LINKS: The Vendor's Advisory Bugtraq ID: 54683 SecurityTracker Alert ID: 1027307 IMPACT ASSESSMENT:

178

V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site 0: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information April 23, 2013 - 12:26am Addthis PROBLEM: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information PLATFORM: Apache ActiveMQ versions prior to 5.8.0 ABSTRACT: Several vulnerabilities were reported in Apache ActiveMQ. REFERENCE LINKS: Apache ActiveMQ SecurityTracker Alert ID: 1028457 CVE-2012-6092 CVE-2012-6551 CVE-2013-3060 IMPACT ASSESSMENT: High DISCUSSION: Several web demos do not properly filter HTML code from user-supplied input

179

U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

41: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 41: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information August 22, 2012 - 7:00am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information PLATFORM: Adobe Flash Player 11.3.300.271 and earlier versions for Windows, Macintosh and Linux operating systems Adobe Flash Player 11.1.115.11 and earlier versions for Android 4.x Adobe Flash Player 11.1.111.10 and earlier versions for Android 3.x and 2.x Adobe AIR 3.3.0.3670 and earlier versions for Windows and Macintosh Adobe AIR 3.3.0.3690 SDK (includes AIR for iOS) and earlier versions Adobe AIR 3.3.0.3650 and earlier versions for Android ABSTRACT:

180

T-712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement  

NLE Websites -- All DOE Office Websites (Extended Search)

712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and 712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update T-712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update September 8, 2011 - 10:30am Addthis PROBLEM: A flaw was discovered in Cumin where it would log broker authentication credentials to the Cumin log file. A vulnerability was reported in Red Hat Enterprise MRG Grid. A local user can access the broker password. PLATFORM: Red Hat Enterprise MRG v2 for Red Hat Enterprise Linux (version 5) ABSTRACT: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update. reference LINKS: RHSA-2011:1249-1 SecurityTracker Alert ID: 1026021 CVE-2011-2925 IMPACT ASSESSMENT: Medium Discussion: A local user exploiting this flaw could connect to the broker outside of Cumin's control and perform certain operations such as scheduling jobs,

Note: This page contains sample records for the topic "manager bugs permit" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users 7: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass Authentication or Obtain Information T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass Authentication or Obtain Information August 31, 2011 - 12:00pm Addthis PROBLEM: A vulnerability was reported in Apache Tomcat. A remote user can bypass authentication or obtain potentially sensitive information. PLATFORM: Apache Tomcat 5.5.0 to 5.5.33, 6.0.0 to 6.0.33, 7.0.0 to 7.0.20 ABSTRACT: Apache Tomcat AJP protocol processing bug lets remote users bypass authentication or obtain information. reference LINKS: SecurityTracker Alert ID: 1025993 CVE-2011-3190 (under review) Apache Tomcat Security Updates IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Apache Tomcat. A remote user can bypass

182

T-589: Citrix XenApp and Citrix Presentation Server Bug | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

89: Citrix XenApp and Citrix Presentation Server Bug 89: Citrix XenApp and Citrix Presentation Server Bug T-589: Citrix XenApp and Citrix Presentation Server Bug March 28, 2011 - 3:05pm Addthis PROBLEM: Citrix XenApp and Citrix Presentation Server Bug in ActiveSync Lets Remote Users Execute Arbitrary Code. PLATFORM: Citrix XenApp Presentation versions 4.5, 5 ABSTRACT: A vulnerability was reported in Citrix XenApp (Presentation Server). A remote user can execute arbitrary code on the target system. -------------------------------------------------------------------------------- LINKS: DOE-CIRC BULLETIN: http://www.doecirc.energy.gov/bulletins/t-589.shtml OTHER LINKS: Citrix Document: CTX128366 SecurityTracker Alert ID: 1025254 Citrix Support Technical Support Downloads --------------------------------------------------------------------------------

183

U-055: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 5: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code U-055: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code December 8, 2011 - 8:30am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code . PLATFORM: Adobe Flash Player 11.1.102.55 on Windows and Mac OS X and prior versions ABSTRACT: Two vulnerabilities exploited by the Intevydis vd_adobe_fp module in VulnDisco Step Ahead were reported in Adobe Flash Player. reference LINKS: Secunia Advisory: SA47161 SecurityTracker Alert ID: 1026392 CVE-2011-4693 CVE-2011-4694 IMPACT ASSESSMENT: High Discussion: A remote or local user can obtain potentially sensitive information. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a specially crafted SWF file that, when

184

U-071:HP Database Archiving Software Bugs Let Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1:HP Database Archiving Software Bugs Let Remote Users Execute 1:HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code U-071:HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code December 29, 2011 - 8:15am Addthis PROBLEM: HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code PLATFORM: HP Database Archiving Software v6.31 ABSTRACT: A remote user can execute arbitrary code on the target system. reference LINKS: HP Database Document ID: c03128302 SecurityTracker Alert ID: 1026467 CVE-2011-4163 CVE-2011-4164 CVE-2011-4165 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in HP Database Archiving Software. A remote user can execute arbitrary code on the target system. Impact: A remote user can execute arbitrary code on the target system. Solution:

185

V-015: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, 5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information V-015: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information November 2, 2012 - 6:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information PLATFORM: Apple iOS prior to 6.0.1 ABSTRACT: Three vulnerabilities were reported in Apple iOS. REFERENCE LINKS: Apple Article: HT5567 SecurityTracker Alert ID: 1027716 Bugtraq ID: 56363 CVE-2012-3748 CVE-2012-3749 CVE-2012-3750 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the

186

U-061: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: RSA Adaptive Authentication Bugs Let Remote Users Bypass 1: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain Security Controls U-061: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain Security Controls December 14, 2011 - 8:17am Addthis PROBLEM: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain Security Controls. PLATFORM: 6.0.2.1 SP1 Patch 2 and SP1 Patch 3 6.0.2.1 SP2 and SP2 Patch 1 6.0.2.1 SP3 ABSTRACT: A remote user may be able to bypass certain security controls. reference LINKS: SecurityTracker Alert ID: 1026420 Security Focus: ESA-2011-036 IMPACT ASSESSMENT: Medium Discussion: Two vulnerabilities were reported in RSA Adaptive Authentication (On-Premise). A remote user may be able to bypass certain security controls. A remote user can send specially crafted data elements to affect the Device

187

U-118: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

18: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 18: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information U-118: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information March 6, 2012 - 7:00am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information PLATFORM: Adobe Flash Player 10.x, Adobe Flash Player 11.x ABSTRACT: Two vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can obtain potentially information. reference LINKS: Secunia Advisory SA48281 CVE-2012-0769 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will trigger a memory corruption error in Matrix3D and execute

188

T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Let Remote Users Conduct Cross-Site Request Forgery Attacks and Execute Arbitrary Code T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request Forgery Attacks...

189

U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Users Deny Service and Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users...

190

U-265: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

information. Solution: The vendor has issued a fix. Addthis Related Articles U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting...

191

V-149: Microsoft Internet Explorer Object Access Bug Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Microsoft Internet Explorer Object Access Bug Lets Remote 9: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code V-149: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code May 6, 2013 - 12:07am Addthis PROBLEM: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code PLATFORM: Internet Explorer 8 ABSTRACT: A vulnerability was reported in Microsoft Internet Explorer. REFERENCE LINKS: SecurityTracker Alert ID: 1028514 Microsoft Security Advisory (2847140) CVE-2013-1347 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will access and object that has been deleted or not properly allocated and execute arbitrary code on the target system. The code will run with the privileges of the target user.

192

U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Cisco IOS Intrusion Prevention System DNS Processing Bug 9: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service September 27, 2012 - 4:07am Addthis PROBLEM: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service PLATFORM: Devices configured with Cisco IOS IPS are affected ABSTRACT: A vulnerability was reported in Cisco IOS. reference LINKS: SecurityTracker Alert ID: 1027580 Cisco Security Advisory CVE-2012-3950 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Cisco IOS. A remote user can cause denial of service conditions. A remote user can send specially crafted (but legitimate) DNS packets through the target device to cause the device to

193

V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code 3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code March 18, 2013 - 1:53am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 6.0.3 ABSTRACT: Two vulnerabilities were reported in Apple Safari. REFERENCE LINKS: Apple security update, Article: HT1222 SecurityTracker Alert ID: 1028292 CVE-2013-0960 CVE-2013-0961 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. IMPACT: A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

194

V-160: Wireshark Multiple Bugs Let Remote Users Deny Service | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

60: Wireshark Multiple Bugs Let Remote Users Deny Service 60: Wireshark Multiple Bugs Let Remote Users Deny Service V-160: Wireshark Multiple Bugs Let Remote Users Deny Service May 21, 2013 - 12:09am Addthis PROBLEM: Wireshark Multiple Bugs Let Remote Users Deny Service PLATFORM: Versions 1.8.0 to 1.8.6 ABSTRACT: Multiple vulnerabilities have been reported in Wireshark REFERENCE LINKS: Wireshark Docid: wnpa-sec-2013-23 Secunia Advisory SA53425 SecurityTracker Alert ID: 1028582 CVE-2013-2486 CVE-2013-2487 IMPACT ASSESSMENT: Medium DISCUSSION: Multiple vulnerabilities have been reported in Wireshark, which can be exploited by malicious people to cause a DoS (Denial of Service). 1) An error in the RELOAD dissector (dissectors/packet-reload.c) can be exploited to trigger infinite loops and consume CPU resources via specially

195

U-005: Apache mod_proxy Pattern Matching Bug Lets Remote Users Access  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apache mod_proxy Pattern Matching Bug Lets Remote Users 5: Apache mod_proxy Pattern Matching Bug Lets Remote Users Access Internal Servers U-005: Apache mod_proxy Pattern Matching Bug Lets Remote Users Access Internal Servers October 6, 2011 - 9:30am Addthis PROBLEM: Apache mod_proxy Pattern Matching Bug Lets Remote Users Access Internal Servers. PLATFORM: Apache HTTP Server 1.3.x, 2.2.21 and prior versions ABSTRACT: A remote user can access internal servers. reference LINKS: The Apache HTTP Server Project SecurityTracker Alert ID: 1026144 CVE-2011-3368 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Apache mod_proxy. A remote user can access internal servers. When this system is configured in reverse proxy mode and uses the RewriteRule or ProxyPassMatch directives with a pattern match, a remote user can send a specially crafted request to access internal

196

V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 0: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code March 13, 2013 - 12:04am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): 1.6.602.171 and prior for Windows/Mac; other versions on other platforms ABSTRACT: Several vulnerabilities were reported in Adobe Flash Player. REFERENCE LINKS: Adobe Vulnerability identifier: APSB13-09 SecurityTracker Alert ID: 1028277 CVE-2013-0646 CVE-2013-0650 CVE-2013-1371 CVE-2013-1375 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user.

197

U-012: BlackBerry Enterprise Server Collaboration Service Bug Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

12: BlackBerry Enterprise Server Collaboration Service Bug Lets 12: BlackBerry Enterprise Server Collaboration Service Bug Lets Remote Users Impersonate Intra-organization Messages U-012: BlackBerry Enterprise Server Collaboration Service Bug Lets Remote Users Impersonate Intra-organization Messages October 17, 2011 - 9:45am Addthis PROBLEM: BlackBerry Enterprise Server Collaboration Service Bug Lets Remote Users Impersonate Intra-organization Messages. PLATFORM: Exchange and Domino 5.0.3 through 5.0.3 MR4 BlackBerry Client for use with Microsoft Office Communications Server 2007 R2 BlackBerry Client for use with Microsoft Lync Server 2010 ABSTRACT: A vulnerability was reported in BlackBerry Enterprise Server. A remote user can impersonate another messaging user within the same organization. reference LINKS: BlackBerry Security Advisory ID: KB28524

198

U-071:HP Database Archiving Software Bugs Let Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1:HP Database Archiving Software Bugs Let Remote Users Execute 1:HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code U-071:HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code December 29, 2011 - 8:15am Addthis PROBLEM: HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code PLATFORM: HP Database Archiving Software v6.31 ABSTRACT: A remote user can execute arbitrary code on the target system. reference LINKS: HP Database Document ID: c03128302 SecurityTracker Alert ID: 1026467 CVE-2011-4163 CVE-2011-4164 CVE-2011-4165 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in HP Database Archiving Software. A remote user can execute arbitrary code on the target system. Impact: A remote user can execute arbitrary code on the target system. Solution:

199

Presidential Permits | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

Presidential Permits Presidential Permits Presidential Permits Below is a listing of all the presidential permits grouped by Canada and Mexico. View the Presidental Permits - Mexico View the Presidential Permits - Canada PRESIDENTIAL PERMITS - CANADA BACK TO TOP Docket No. Company Date Issued PP-6 Puget Sound Energy 04/28/81 PP-10 BPA 10/27/45 PP-10-1 BPA 11/30/65 PP-11-2 Fraser Papers 02/29/99 PP-11 Fraser Papers (Rescinded in PP-366) 11/18/10 PP-12 Maine 12/05/63 PP-13 NiMo Hogansburg 01/31/48 PP-18 Glacier Electric 12/12/52 PP-20 Eastern Maine 05/25/65 PP-22 BC Hydro 08/24/67 PP-22-1 BC Hydro 07/21/55 PP-22-2 BC Hydro 02/04/58 PP-22-3 BC Hydro 08/24/67 PP-22-4 BCTC 09/05/07 PP-23 Netley 07/20/55 PP-24 Long Sault 06/06/80 PP-25 NYPA 06/06/80 PP-28 Northern Electric 04/17/63

200

EIS-0442: Reauthorization of Permits, Maintenance, and Vegetation  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

42: Reauthorization of Permits, Maintenance, and Vegetation 42: Reauthorization of Permits, Maintenance, and Vegetation Management on Western Area Power Administration Transmission Lines on Forest Service Lands, Colorado, Nebraska, and Utah EIS-0442: Reauthorization of Permits, Maintenance, and Vegetation Management on Western Area Power Administration Transmission Lines on Forest Service Lands, Colorado, Nebraska, and Utah Summary This EIS is being prepared jointly by DOE's Western Area Power Administration and the U.S. Forest Service. The EIS evaluates the potential environmental impacts of Western's proposed changes to vegetation management along its transmission line rights-of-way on National Forest System lands in Colorado, Utah, and Nebraska. The EIS website is http://ww2.wapa.gov/sites/western/transmission/infrastruct/Pages/Western%20FS%20EIS.aspx.

Note: This page contains sample records for the topic "manager bugs permit" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Solar Permitting & Inspection Webinar Series  

Office of Energy Efficiency and Renewable Energy (EERE)

ICLEI Local Governments for Sustainability U.S.A. and the Interstate Renewable Energy Council, Inc. (IREC) present a series of three webinars on Solar Permitting & Inspection. As part of the U...

202

Well Permits (District of Columbia)  

Energy.gov (U.S. Department of Energy (DOE))

Well permits are required for the installation of wells in private and public space. Wells are defined as any trest hole, shaft, or soil excavation created by any means including, but not limited...

203

GRR/Elements/18-CA-c.1 - What Level of Hazardous Waste Facility Permit Does  

Open Energy Info (EERE)

GRR/Elements/18-CA-c.1 - What Level of Hazardous Waste Facility Permit Does GRR/Elements/18-CA-c.1 - What Level of Hazardous Waste Facility Permit Does the Facility Require < GRR‎ | Elements Jump to: navigation, search Edit 18-CA-b.1 - What Level of Hazardous Waste Facility Permit Does the Facility Require California employs a five-tier permitting program which imposes regulatory requirements matching the degree of risk posed by the level of hazardous waste: * The Full Permit Tier includes all facilities requiring a RCRA permit as well as selected non-RCRA activities under Title 22 California Code of Regulations. * The Standardized Permit Tier includes facilities that manage waste not regulated by RCRA, but regulated as hazardous waste in California. * Onsite Treatment Permits (3-Tiered) includes onsite treatment of non-RCRA waste regulated in California.

204

GRR/Section 18-ID-b - Hazardous Waste Permit Process | Open Energy  

Open Energy Info (EERE)

GRR/Section 18-ID-b - Hazardous Waste Permit Process GRR/Section 18-ID-b - Hazardous Waste Permit Process < GRR Jump to: navigation, search GRR-logo.png GEOTHERMAL REGULATORY ROADMAP Roadmap Home Roadmap Help List of Sections Section 18-ID-b - Hazardous Waste Permit Process 18IDBHazardousWastePermitProcess.pdf Click to View Fullscreen Contact Agencies Idaho Department of Environmental Quality Regulations & Policies Idaho Hazardous Waste Management Act IDAPA 58.01.05 Rules and Standards for Hazardous Waste 40 CFR 124.31 Pre-application public meeting and notice 40 CRF 124.10 Public notice of permit actions and public comment period 40 CFR 124.12 Public hearings 40 CFR 270.13 Contents of Part A of the permit application Triggers None specified Click "Edit With Form" above to add content 18IDBHazardousWastePermitProcess.pdf 18IDBHazardousWastePermitProcess.pdf

205

Rack Permitting Efficient Handling of Tissue Cultures  

Science Journals Connector (OSTI)

...for Microbiology research-article Notes Rack Permitting Efficient Handling of Tissue...American Society for Microbiology NOTES Rack Permitting Efficient Handling of Tissue...of this communication is to describe a rack which permits the simultaneous handling...

Samuel Baron; Charles E. Buckler; Kenneth K. Takemoto

1966-11-01T23:59:59.000Z

206

Montana 310 Permit Database | Open Energy Information  

Open Energy Info (EERE)

Permit Database Jump to: navigation, search OpenEI Reference LibraryAdd to library Web Site: Montana 310 Permit Database Abstract Provides access to Montana's 310 permit mapping...

207

Species composition and seasonal abundance of stink bugs in cotton in the Lower Texas Gulf Coast and the virulence of Euschistus species to cotton  

E-Print Network (OSTI)

with the drop cloth. ........................................................................................................... 26 2.2. Distribution of most common pest stink bugs by county, 2004. ........................ 31 2.3. Distribution... Page 2.1. Mean number of stink bug species collected per six row-feet, by date. Lower Texas Gulf Coast region, 2004.............................................................. 30 2.2. Mean number of stink bug species...

Hopkins, Bradley Wayne

2006-04-12T23:59:59.000Z

208

Environmental Management Commission (Alabama)  

Energy.gov (U.S. Department of Energy (DOE))

The Alabama Department of Environmental Management is charged with developing the state's environmental policy, hearing administrative appeals of permits, administrative orders and variances issued...

209

Hanfords Site-Wide Permit  

NLE Websites -- All DOE Office Websites (Extended Search)

* Across entire Hanford Site ("Facility") What the permit does NOT cover * Solely radioactive materials * Superfund sites How does the permit protect? * Requirements for...

210

Caltrans Transportation Permits Manual | Open Energy Information  

Open Energy Info (EERE)

Permits Manual Jump to: navigation, search OpenEI Reference LibraryAdd to library Legal Document- OtherOther: Caltrans Transportation Permits ManualLegal Abstract...

211

Standardized Permit Guidance | Open Energy Information  

Open Energy Info (EERE)

Permit Guidance Jump to: navigation, search OpenEI Reference LibraryAdd to library Legal Document- OtherOther: Standardized Permit GuidanceLegal Abstract Standardized...

212

Nevada Department of Transportation - Occupancy Permits | Open...  

Open Energy Info (EERE)

Occupancy Permits Jump to: navigation, search OpenEI Reference LibraryAdd to library Web Site: Nevada Department of Transportation - Occupancy Permits Abstract This website gives...

213

Montana Produced Water General Permit - Example Authorization...  

Open Energy Info (EERE)

Water General Permit - Example Authorization Jump to: navigation, search OpenEI Reference LibraryAdd to library PermittingRegulatory Guidance - Supplemental Material: Montana...

214

Backup Generators (BUGS): The Next Smart Grid Peak Resource? | Open Energy  

Open Energy Info (EERE)

Backup Generators (BUGS): The Next Smart Grid Peak Resource? Backup Generators (BUGS): The Next Smart Grid Peak Resource? Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Backup Generators (BUGS): The Next Smart Grid Peak Resource? Focus Area: Crosscutting Topics: Potentials & Scenarios Website: www.netl.doe.gov/smartgrid/referenceshelf/articles/10-18-2010_BUGS%20a Equivalent URI: cleanenergysolutions.org/content/backup-generators-bugs-next-smart-gri Language: English Policies: "Deployment Programs,Financial Incentives,Regulations" is not in the list of possible values (Deployment Programs, Financial Incentives, Regulations) for this property. DeploymentPrograms: Demonstration & Implementation Regulations: "Resource Integration Planning,Energy Standards" is not in the list of possible values (Agriculture Efficiency Requirements, Appliance & Equipment Standards and Required Labeling, Audit Requirements, Building Certification, Building Codes, Cost Recovery/Allocation, Emissions Mitigation Scheme, Emissions Standards, Enabling Legislation, Energy Standards, Feebates, Feed-in Tariffs, Fuel Efficiency Standards, Incandescent Phase-Out, Mandates/Targets, Net Metering & Interconnection, Resource Integration Planning, Safety Standards, Upgrade Requirements, Utility/Electricity Service Costs) for this property.

215

The Insect's Christmas Podcast Welcome to Bug Bytes, a bimonthly podcast from Texas A&M University's  

E-Print Network (OSTI)

Bug Bytes The Insect's Christmas Podcast **Music Up Welcome to Bug Bytes, a bimonthly podcast from didn't cooperate under the bright film lights. So when they died, Starevitch decided to make them. Starevitch has inspired contemporary greats like Tim Burton and Henry Selick of Nightmare before Christmas

Behmer, Spencer T.

216

Queen of the Sun Transcript Welcome to Bug Bytes, a bimonthly podcast from Texas A&M University's  

E-Print Network (OSTI)

Bug Bytes Queen of the Sun Transcript **Music Up Welcome to Bug Bytes, a bimonthly podcast from beekeepers of the world. Why? We recently screened a documentary called Queen of the Sun. The film explores in the face of almost certain impending disaster. We were prepared for this, as we thought Queen of the Sun

Behmer, Spencer T.

217

permitting | OpenEI Community  

Open Energy Info (EERE)

permitting permitting Home Alevine's picture Submitted by Alevine(5) Member 29 July, 2013 - 14:46 Texas Legal Review BHFS flora and fauna leasing Legal review permitting roadmap Texas The NREL roadmap team recently met with our legal team Brownstein Hyatt Farber and Schreck (www.bhfs.com) for a review of the Texas portion of the Geothermal Regulatory Roadmap (GRR). BHFS provided excellent suggestions to the Section 3 flowcharts for geothermal leases on Texas state lands. The Texas portion of the GRR now encompasses a flowchart for Texas state land leasing on Permanent School Fund Lands, Texas Parks and Wildlife Department Lands, Land Trade Lands, and Relinquishment Act Lands. Additionally, BHFS provided many other helpful tips for clarifying other issue Kyoung's picture Submitted by Kyoung(155)

218

GRR/Section 15-CO-a - Air Permit - Construction Permit | Open Energy  

Open Energy Info (EERE)

5-CO-a - Air Permit - Construction Permit 5-CO-a - Air Permit - Construction Permit < GRR Jump to: navigation, search GRR-logo.png GEOTHERMAL REGULATORY ROADMAP Roadmap Home Roadmap Help List of Sections Section 15-CO-a - Air Permit - Construction Permit 15COAAirPermitConstructionPermit.pdf Click to View Fullscreen Contact Agencies Colorado Department of Public Health and Environment Regulations & Policies 5 CCR 1001-5 Colorado Stationary Source Permitting and Air Pollution Control Emission Notice Requirements Triggers None specified Click "Edit With Form" above to add content 15COAAirPermitConstructionPermit.pdf 15COAAirPermitConstructionPermit.pdf 15COAAirPermitConstructionPermit.pdf Error creating thumbnail: Page number not in range. Flowchart Narrative The Colorado Department of Public Health and Environment (CDPHE) Air

219

U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated 2: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated Privileges, Inject SQL Commands, and Spoof Certificates U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated Privileges, Inject SQL Commands, and Spoof Certificates February 28, 2012 - 8:45am Addthis PROBLEM: A vulnerability was reported in PostgreSQL. PLATFORM: Version(s): prior to 8.3.18, 8.4.11, 9.0.7, 9.1.3 ABSTRACT: A remote authenticated user can gain elevated privileges. A remote authenticated user can inject SQL commands. A remote user can spoof connections in certain cases. reference LINKS: Vendor Advisory Security Tracker ID 1026744 CVE-2012-0866 IMPACT ASSESSMENT: Medium Discussion: For trigger functions marked SECURITY DEFINER, a remote authenticated user can execute a trigger function and gain elevated privileges CVE-2012-0866.

220

V-203: HP LoadRunner Multiple Bugs Let Remote Users Deny Service and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: HP LoadRunner Multiple Bugs Let Remote Users Deny Service 3: HP LoadRunner Multiple Bugs Let Remote Users Deny Service and Execute Arbitrary Code V-203: HP LoadRunner Multiple Bugs Let Remote Users Deny Service and Execute Arbitrary Code July 26, 2013 - 3:31am Addthis PROBLEM: A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions. PLATFORM: HP LoadRunner prior to 11.52 ABSTRACT: Multiple vulnerabilities were reported in HP LoadRunner. REFERENCE LINKS: Security Tracker Alert ID: 1028833 CVE-2013-2368 CVE-2013-2369 CVE-2013-2370 CVE-2013-4797 CVE-2013-4798 CVE-2013-4799 CVE-2013-4800 CVE-2013-4801 IMPACT ASSESSMENT: Medium DISCUSSION: Potential security vulnerabilities have been identified with HP LoadRunner. The vulnerabilities could be remotely exploited to allow execution of code

Note: This page contains sample records for the topic "manager bugs permit" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

U-092: Sudo Format String Bug Lets Local Users Gain Elevated Privileges |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Sudo Format String Bug Lets Local Users Gain Elevated 2: Sudo Format String Bug Lets Local Users Gain Elevated Privileges U-092: Sudo Format String Bug Lets Local Users Gain Elevated Privileges January 31, 2012 - 5:45am Addthis PROBLEM: A vulnerability was reported in Sudo. A local user can obtain elevated privileges on the target system. PLATFORM: Linux (Any) Version(s): 1.8.0 - 1.8.3p1 ABSTRACT: A local user can supply a specially crafted command line argument to trigger a format string flaw and execute arbitrary commands on the target system with root privileges. reference LINKS: CVE-2012-0809 SecurityTracker Alert ID: 1026600 Vendor Site IMPACT ASSESSMENT: Medium Discussion: The vulnerability resides in the sudo_debug() function in 'src/sudo.c'. This can be exploited by local users, regardless of whether they are listed

222

V-128: Xen Event Channel Tracking Pointer Bug Local Privilege Escalation |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Xen Event Channel Tracking Pointer Bug Local Privilege 8: Xen Event Channel Tracking Pointer Bug Local Privilege Escalation V-128: Xen Event Channel Tracking Pointer Bug Local Privilege Escalation April 8, 2013 - 12:28am Addthis PLATFORM: Version(s): 3.2 and later ABSTRACT: A vulnerability was reported in Xen. REFERENCE LINKS: SecurityTracker Alert ID: 1028388 CVE-2013-1920 IMPACT ASSESSMENT: Medium DISCUSSION: A local user with kernel level privileges on the guest operating system can exploit a memory pointer error when the hypervisor is under memory pressure and Xen Security Module (XSM) is enabled to execute arbitrary code on the target host system IMPACT: A local user on the guest operating system can obtain elevated privileges on the target host system. SOLUTION: The vendor has issued a fix (xsa47-4.1.patch, xsa47-4.2-unstable.patch).

223

U-110: Samba Bug Lets Remote Users Execute Arbitrary Code | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Samba Bug Lets Remote Users Execute Arbitrary Code 0: Samba Bug Lets Remote Users Execute Arbitrary Code U-110: Samba Bug Lets Remote Users Execute Arbitrary Code February 24, 2012 - 7:30am Addthis PROBLEM: A vulnerability was reported in Samba. PLATFORM: Version(s): prior to 3.4.0 ABSTRACT: A remote user can send specially crafted data to the smbd service to trigger a flaw in chain_reply() and construct_reply() and execute arbitrary code on the target system. reference LINKS: Vendor Advisory Security Tracker ID 1026739 CVE-2012-0870 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Samba. A remote user can execute arbitrary code on the target system. A remote user can send specially crafted data to the smbd service to trigger a flaw in chain_reply() and construct_reply() and execute arbitrary code on the target system. The code will run with the

224

U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code June 6, 2012 - 7:00am Addthis PROBLEM: Multiple vulnerabilities were reported in Mozilla Firefox. PLATFORM: Version(s): prior to 13.0 ABSTRACT: A remote user can cause arbitrary code to be executed on the target user's system. A remote user can conduct cross-site scripting attacks. A remote user can obtain potentially sensitive information. Reference Links: Security Tracker ID 1027120 CVE-2012-0441,CVE-2012-1937 Vendor URL IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system [CVE-2012-1937 , CVE-2012-1938, CVE-2012-1939 ].

225

U-192 VMware Workstation/Player VM Remote Device Bug Lets Local or Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

VMware Workstation/Player VM Remote Device Bug Lets Local or VMware Workstation/Player VM Remote Device Bug Lets Local or Remote Users Deny Service U-192 VMware Workstation/Player VM Remote Device Bug Lets Local or Remote Users Deny Service June 15, 2012 - 7:00am Addthis PROBLEM: A vulnerability was reported in VMware Workstation/Player. PLATFORM: Version(s): Workstation 8.x, Player 4.x ABSTRACT: A local or remote user can cause denial of service conditions on the target virtual system. reference LINKS: Vendor Advisory Security Tracker ID 1027173 CVE-2012-3289 IMPACT ASSESSMENT: High Discussion: A user with the ability to modify communications data between a remote virtual device (e.g., CD-ROM, keyboard) located on a physically separate system and the target virtual machine can cause the target virtual machine to crash. Impact:

226

V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Cisco Wireless LAN Controller Bugs Let Remote Users Deny 6: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code January 24, 2013 - 6:00am Addthis PROBLEM: Several vulnerabilities were reported in Cisco Wireless LAN Controller. PLATFORM: The vulnerabilities are reported in: Cisco 2000 Series WLC Cisco 2100 Series WLC Cisco 2500 Series WLC Cisco 4100 Series WLC Cisco 4400 Series WLC Cisco 5500 Series WLC Cisco 7500 Series WLC Cisco 8500 Series WLC Cisco 500 Series Wireless Express Mobility Controllers Cisco Wireless Services Module (Cisco WiSM) Cisco Wireless Services Module version 2 (Cisco WiSM version 2)

227

U-096: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny 6: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny Service U-096: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny Service February 6, 2012 - 7:00am Addthis PROBLEM: Vulnerability in AIX TCP stack PLATFORM: Version(s): 5.3, 6.1, 7.1 ABSTRACT: A remote user can send a series of specially crafted TCP packets to trigger a kernel panic on the target system. reference LINKS: SecurityTracker Alert ID: 1026640 IBM Security Advisory CVE-2012-0194 IMPACT ASSESSMENT: Medium Discussion: AIX could allow a remote attacker to cause a denial of service, caused by an error when the TCP large send offload option is enabled on a network interface. By sending a specially-crafted sequence of packets, an attacker could exploit this vulnerability to cause a kernel panic.

228

V-077: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Barracuda SSL VPN Bug Lets Remote Users Bypass 7: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication V-077: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication January 25, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Barracuda SSL VPN. PLATFORM: The vulnerability has been verified to exist in Barracuda SSL VPN version 2.2.2.203 ABSTRACT: A remote user can gain administrative access to the target system. REFERENCE LINKS: SecurityTracker Alert ID: 1028039 Barracuda Networks Advisory IMPACT ASSESSMENT: High DISCUSSION: A remote user can set a specially crafted Java system property (via 'setSysProp.jsp') to bypass access restrictions and gain access to the API functionality. This can be exploited to download configuration files, download database dumps, shutdown the system, and set new administrative

229

T-654: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Apple QuickTime Multiple Bugs Let Remote Users Execute 4: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary T-654: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary June 24, 2011 - 4:39am Addthis PROBLEM: A vulnerability was reported in QuickTime. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Version(s): prior to QuickTime 7.6.8 ABSTRACT: A remote user can create a specially crafted file that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. reference LINKS: SecurityTracker Alert ID: 1025705 Apple Security Article: HT4339 Apple Security Article: HT4723 Apple Security Article: HT1222 CVE-2011-0213 Secunia Advisory: SA45054 IMPACT ASSESSMENT High Discussion:

230

T-647: PHP File Upload Bug May Let Remote Users Overwrite Files on the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: PHP File Upload Bug May Let Remote Users Overwrite Files on 7: PHP File Upload Bug May Let Remote Users Overwrite Files on the Target System T-647: PHP File Upload Bug May Let Remote Users Overwrite Files on the Target System June 15, 2011 - 3:45pm Addthis PROBLEM: A vulnerability was reported in PHP. A remote user may be able to overwrite files on the target system. PLATFORM: PHP prior to 5.3.7 ABSTRACT: PHP is prone to a security-bypass vulnerability.Successful exploits will allow an attacker to delete files from the root directory, which may aid in further attacks. PHP 5.3.6 is vulnerable; other versions may also be affected. reference LINKS: PHP Security Notice PHP CVE-2011-2202 SecurityTracker Alert ID: 1025659 Secunia Advisory: SA44874 CVE-2011-2202 IMPACT ASSESSMENT: High Discussion: The vulnerability lies in the 'SAPI_POST_HANDLER_FUNC()' function in

231

U-192: VMware Workstation/Player VM Remote Device Bug Lets Local or Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

92: VMware Workstation/Player VM Remote Device Bug Lets Local or 92: VMware Workstation/Player VM Remote Device Bug Lets Local or Remote Users Deny Service U-192: VMware Workstation/Player VM Remote Device Bug Lets Local or Remote Users Deny Service June 15, 2012 - 7:00am Addthis PROBLEM: A vulnerability was reported in VMware Workstation/Player. PLATFORM: Version(s): Workstation 8.x, Player 4.x aBSTRACT: A local or remote user can cause denial of service conditions on the target virtual system. reference LINKS: Vendor Advisory Security Tracker ID 1027173 CVE-2012-3289 IMPACT ASSESSMENT: High Discussion: A user with the ability to modify communications data between a remote virtual device (e.g., CD-ROM, keyboard) located on a physically separate system and the target virtual machine can cause the target virtual machine to crash.

232

T-652: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and 2: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and Execute Arbitrary Code T-652: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and Execute Arbitrary Code June 22, 2011 - 2:55pm Addthis PROBLEM: Multiple vulnerabilities were reported in Mozilla Thunderbird. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can obtain cookies from another domain in certain cases. A remote user can create specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system [CVE-2011-2364, CVE-2011-2374, CVE-2011-2375, CVE-2011-2376]. The code will run with the privileges of the target user. PLATFORM: Mozilla Thunderbird prior to 3.1.11

233

V-183: Cisco TelePresence TC and TE Bugs Let Remote Users Deny Service and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Cisco TelePresence TC and TE Bugs Let Remote Users Deny 3: Cisco TelePresence TC and TE Bugs Let Remote Users Deny Service and Remote Adjacent Authenticated Users Gain Root Shell Access V-183: Cisco TelePresence TC and TE Bugs Let Remote Users Deny Service and Remote Adjacent Authenticated Users Gain Root Shell Access June 21, 2013 - 6:00am Addthis PROBLEM: Three vulnerabilities were reported in Cisco TelePresence TC and TE PLATFORM: The following product models are affected by the vulnerabilities: Cisco TelePresence MX Series Cisco TelePresence System EX Series Cisco TelePresence Integrator C Series Cisco TelePresence Profiles Series running Cisco TelePresence Quick Set Series Cisco IP Video Phone E20 ABSTRACT: Cisco TelePresence TC and TE Software contain two vulnerabilities in the implementation of the Session Initiation Protocol (SIP) that could allow an

234

U-088: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary 8: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary Code U-088: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary Code January 25, 2012 - 6:00am Addthis PROBLEM: A remote user can execute arbitrary code on the target system. PLATFORM: Version(s): 12.5 SP3; pcAnywhere Solutions 7.1 GA, SP 1, and SP 2 ABSTRACT: Two vulnerabilities were reported in Symantec pcAnywhere. A remote user can execute arbitrary code on the target system. A local user can obtain elevated privileges on the target system. reference LINKS: Symantec Advisory Secunia Advisory SecurityTracker Alert ID:102576 IMPACT ASSESSMENT: Medium Discussion: A remote user can send specially crafted data to TCP port 5631 to trigger a but in the validation of authentication data and execute arbitrary code.

235

Permit Parking Emergency Blue Light  

E-Print Network (OSTI)

P P P P P P P P P P P P P P P P P PP P P P P P Permit Parking Food P P Emergency Blue Light underground Emergency Blue Light outdoors Wheelchair Wheelchair prior arrangements necessary Telephone Visitor 144 Albert Street 21 152 Albert Street 20 154 Albert Street 94 34 Barrie Street 91 68 Barrie Street 90

Abolmaesumi, Purang

236

GRR/Section 19-CO-c - Designated Ground Water Basin Well Permitting Process  

Open Energy Info (EERE)

GRR/Section 19-CO-c - Designated Ground Water Basin Well Permitting Process GRR/Section 19-CO-c - Designated Ground Water Basin Well Permitting Process < GRR Jump to: navigation, search GRR-logo.png GEOTHERMAL REGULATORY ROADMAP Roadmap Home Roadmap Help List of Sections Section 19-CO-c - Designated Ground Water Basin Well Permitting Process 19COCDesignatedGroundWaterBasinWellPermit.pdf Click to View Fullscreen Contact Agencies Colorado Division of Water Resources Colorado Ground Water Commission Regulations & Policies CRS 37-90-107 CRS 37-90-108 Ground Water Management District Rules 2 CCR 410-1 - Rules and Regulations for the Management and Control of Designated Ground Water Basins Triggers None specified Click "Edit With Form" above to add content 19COCDesignatedGroundWaterBasinWellPermit.pdf 19COCDesignatedGroundWaterBasinWellPermit.pdf

237

GRR/Section 18-OR-b - Hazardous Waste Permit Process | Open Energy  

Open Energy Info (EERE)

OR-b - Hazardous Waste Permit Process OR-b - Hazardous Waste Permit Process < GRR Jump to: navigation, search GRR-logo.png GEOTHERMAL REGULATORY ROADMAP Roadmap Home Roadmap Help List of Sections Section 18-OR-b - Hazardous Waste Permit Process 18ORBHazardousWastePermitProcess (1).pdf Click to View Fullscreen Contact Agencies United States Environmental Protection Agency Oregon Department of Environmental Quality Oregon Public Health Division Oregon Public Utility Commission Oregon Department of Fish and Wildlife Oregon Water Resources Department Regulations & Policies OAR 340-105: Management Facility Permits OAR 340-120: Hazardous Waste Management ORS 466: Storage, Treatment, and Disposal Triggers None specified Click "Edit With Form" above to add content 18ORBHazardousWastePermitProcess (1).pdf

238

The WIPP Hazardous Waste Facility Permit Improvements--2007 Update  

SciTech Connect

The most significant changes to the Waste Isolation Pilot Plant Hazardous Waste Facility Permit to date were completed during the past year with the implementation of significant revisions to the Waste Analysis Plan and the authorization to dispose of remote-handled transuranic waste. The modified Permit removes the requirement for reporting headspace gas sampling and analysis results for every container of transuranic mixed waste and provides for the use of radiography and visual examination to confirm a statistically representative subpopulation of the waste stream in each waste shipment as well as other changes that streamline the analytical data management process. Implementation began on November 17, 2006. (authors)

Kehrman, R.; Most, W. [Washington Regulatory and Environmental Services, Carlsbad, NM (United States)

2007-07-01T23:59:59.000Z

239

General Air Permits (Louisiana) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

General Air Permits (Louisiana) General Air Permits (Louisiana) General Air Permits (Louisiana) < Back Eligibility Agricultural Construction Industrial Investor-Owned Utility Municipal/Public Utility Rural Electric Cooperative Utility Program Info State Louisiana Program Type Environmental Regulations Provider Louisiana Department of Environmental Quality Any source, including a temporary source, which emits or has the potential to emit any air contaminant requires an air permit. Facilities with potential emissions less than 5 tons per year of any regulated air pollutant do not need a permit. The Louisiana Department of Environmental Quality issues Title V General Permits. The permit is developed based on equipment types versus facility types, the general permits are not limited in their use to a specific industry or category. Title V permits combine

240

V-115: Apple iOS Bugs Let Local Users Gain Elevated Privileges | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apple iOS Bugs Let Local Users Gain Elevated Privileges 5: Apple iOS Bugs Let Local Users Gain Elevated Privileges V-115: Apple iOS Bugs Let Local Users Gain Elevated Privileges March 20, 2013 - 12:08am Addthis PROBLEM: Apple iOS Bugs Let Local Users Gain Elevated Privileges PLATFORM: Version(s): prior to 6.1.3 ABSTRACT: Several vulnerabilities were reported in Apple iOS REFERENCE LINKS: Apple security Article: HT1222 SecurityTracker Alert ID: 1028314 CVE-2013-0977 CVE-2013-0978 CVE-2013-0979 CVE-2013-0981 IMPACT ASSESSMENT: High DISCUSSION: A local user can exploit a flaw in the handling of Mach-O executable files with overlapping segments to execute unsigned code on the target system [CVE-2013-0977]. A local user can exploit a flaw in the ARM prefetch abort handling to determine the address of structures in the kernel [CVE-2013-0978].

Note: This page contains sample records for the topic "manager bugs permit" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Apple iOS Bugs Let Remote Users Execute Arbitrary Code 6: Apple iOS Bugs Let Remote Users Execute Arbitrary Code U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code November 15, 2011 - 8:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Obtain Information and Let Local Users Bypass Authentication. PLATFORM: iOS 3.0 through 5.0 for iPhone 3GS iPhone 4 and iPhone 4S iOS 3.1 through 5.0 for iPod touch (3rd generation) and later iOS 3.2 through 5.0 for iPad, iOS 4.3 through 5.0 for iPad 2 ABSTRACT: A remote user can create content that, when loaded by the target user, will execute arbitrary code on or obtain potentially sensitive information from the target user's system. reference LINKS: Apple Security Article: HT5052 Apple Product Security SecurityTracker Alert ID: 1026311 IMPACT ASSESSMENT:

242

U-211: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

11: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote 11: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories U-211: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories July 12, 2012 - 7:00am Addthis PROBLEM: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories PLATFORM: EMC Celerra Network Server versions 6.0.36.4 through 6.0.60.2 EMC VNX versions 7.0.12.0 through 7.0.53.1 EMC VNXe 2.0 (including SP1, SP2, and SP3) EMC VNXe MR1 (including SP1, SP2, SP3, and SP3.1) EMC VNXe MR2 (including SP0.1) ABSTRACT: A vulnerability was reported in EMC Celerra/VNX/VNXe. A remote authenticated user can access files and directories on the target file system. reference LINKS: The Vendor's Advisory

243

V-031: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote 1: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated Users Gain Elevated Privileges and Remote Users Deny Service V-031: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated Users Gain Elevated Privileges and Remote Users Deny Service November 22, 2012 - 3:00am Addthis PROBLEM: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated Users Gain Elevated Privileges and Remote Users Deny Service PLATFORM: Version(s): XC10 2.0.0.0 - 2.0.0.3, 2.1.0.0 - 2.1.0.2 ABSTRACT: Several vulnerabilities were reported in IBM WebSphere DataPower. REFERENCE LINKS: IBM Security Bulletin SecurityTracker Alert ID: 1027798 CVE-2012-5758 CVE-2012-5759 CVE-2012-5756 IMPACT ASSESSMENT: High DISCUSSION: Several vulnerabilities were reported in IBM WebSphere DataPower. A remote

244

V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to 1: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems April 24, 2013 - 1:06am Addthis PROBLEM: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems PLATFORM: HP ElitePad 900 with BIOS version vF.00 ABSTRACT: A vulnerability was reported in HP ElitePad 900 REFERENCE LINKS: HP Document ID: c03727435 SecurityTracker Alert ID: 1028461 CVE-2012-5218 IMPACT ASSESSMENT: Medium DISCUSSION: The BIOS secure boot feature of the BIOS may not be enabled. A local user may be able to bypass the secure boot feature and boot an alternate operating system. IMPACT: A local user can may be able to boot to an alternate operating system. SOLUTION:

245

U-119: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users 9: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute Arbitrary Code U-119: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute Arbitrary Code March 7, 2012 - 7:00am Addthis PROBLEM: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute Arbitrary Code PLATFORM: BlackBerry 6, BlackBerry 7, BlackBerry 7.1, and BlackBerry PlayBook tablet software ABSTRACT: A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026769 BlackBerry Security Notice Article ID: KB30152 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Blackberry PlayBook. A remote user can cause arbitrary code to be executed on the target user's system. A remote

246

V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to 1: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems April 24, 2013 - 1:06am Addthis PROBLEM: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems PLATFORM: HP ElitePad 900 with BIOS version vF.00 ABSTRACT: A vulnerability was reported in HP ElitePad 900 REFERENCE LINKS: HP Document ID: c03727435 SecurityTracker Alert ID: 1028461 CVE-2012-5218 IMPACT ASSESSMENT: Medium DISCUSSION: The BIOS secure boot feature of the BIOS may not be enabled. A local user may be able to bypass the secure boot feature and boot an alternate operating system. IMPACT: A local user can may be able to boot to an alternate operating system. SOLUTION:

247

U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and 5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs May 9, 2012 - 7:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs PLATFORM: prior to 5.1.1; iPhone 3GS, iPhone 4, iPhone 4S, iPod touch (3rd generation) and later, iPad, iPad 2 ABSTRACT: Two vulnerabilities were reported in Apple iOS. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can spoof the address bar URL. reference LINKS: SecurityTracker Alert ID: 1027028 CVE-2012-0672 CVE-2012-0674 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a specially crafted file that, when loaded by the

248

T-714:Wireshark OpenSafety and CSN.1 Dissector Bugs | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

714:Wireshark OpenSafety and CSN.1 Dissector Bugs 714:Wireshark OpenSafety and CSN.1 Dissector Bugs T-714:Wireshark OpenSafety and CSN.1 Dissector Bugs September 12, 2011 - 9:00am Addthis PROBLEM: Several vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions. PLATFORM: Version(s): 1.4.0 to 1.4.8, 1.6.0 to 1.6.1 ABSTRACT: Wireshark OpenSafety and CSN.1 Dissector Bugs Lets Remote Users Deny Service. reference LINKS: Wireshark 1.6.2 Release Notes Wireshark 1.4.9 Release Notes Docid: wnpa-sec-2011-12 Docid: wnpa-sec-2011-14 Docid: wnpa-sec-2011-15 Docid: wnpa-sec-2011-16 SecurityTracker Alert ID: 1026030 IMPACT ASSESSMENT: High Discussion: A remote user can cause arbitrary scripting code to be executed on the target user's system. A large loop in the OpenSafety dissector could cause a crash. A remote user

249

T-579: BlackBerry Device Software Bug in WebKit Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: BlackBerry Device Software Bug in WebKit Lets Remote Users 9: BlackBerry Device Software Bug in WebKit Lets Remote Users Execute Code T-579: BlackBerry Device Software Bug in WebKit Lets Remote Users Execute Code March 15, 2011 - 5:05pm Addthis PROBLEM: A vulnerability was reported in BlackBerry Device Software. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: BlackBerry Device Software version 6.0 and later. ABSTRACT: BlackBerry Device Software Bug in WebKit Lets Remote Users Execute Code. reference LINKS: BlackBerry Advisory: KB26132 CVE-2011-1290 BlackBerry Security Note BlackBerry Device Storage IMPACT ASSESSMENT: Moderate Discussion: A vulnerability exists in the open source WebKit browser engine provided in BlackBerry Device Software version 6.0 and later. The issue could result in

250

U-085: OpenSSL DTLS Bug Lets Remote Users Deny Service | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: OpenSSL DTLS Bug Lets Remote Users Deny Service 5: OpenSSL DTLS Bug Lets Remote Users Deny Service U-085: OpenSSL DTLS Bug Lets Remote Users Deny Service January 20, 2012 - 9:15am Addthis PROBLEM: OpenSSL DTLS Bug Lets Remote Users Deny Service PLATFORM: Only DTLS applications using OpenSSL 1.0.0f and 0.9.8s are affected. ABSTRACT: A flaw in the fix to CVE-2011-4108 can be exploited in a denial of service attack. REFERNCE LINKS: CVE-2012-0050 SecurityTracker Alert ID: 1026548 OpenSSL Security Advisory [18 Jan 2011] OpenSSL News IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in OpenSSL. The fix to correct the Datagram Transport Layer Security (DTLS) vulnerability referenced by CVE-2011-4108 introduced a flaw. A remote user can send specially crafted data to cause denial of service conditions on the target system.

251

V-029: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

29: Mozilla Firefox Multiple Bugs Let Remote Users Execute 29: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks V-029: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks November 21, 2012 - 2:00am Addthis PROBLEM: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks PLATFORM: Version(s): prior to 17.0 ABSTRACT: Multiple vulnerabilities were reported in Mozilla Firefox REFERENCE LINKS: Mozilla Foundation Security Advisories Bugtraq ID: 55260 SecurityTracker Alert ID: 1027791 CVE-2012-4201, CVE-2012-4202, CVE-2012-4203, CVE-2012-4204, CVE-2012-4205, CVE-2012-4206, CVE-2012-4207,CVE-2012-4208, CVE-2012-4209, CVE-2012-4210, CVE-2012-4212, CVE-2012-4213, CVE-2012-4214, CVE-2012-4215, CVE-2012-4216,

252

U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and 5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs May 9, 2012 - 7:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs PLATFORM: prior to 5.1.1; iPhone 3GS, iPhone 4, iPhone 4S, iPod touch (3rd generation) and later, iPad, iPad 2 ABSTRACT: Two vulnerabilities were reported in Apple iOS. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can spoof the address bar URL. reference LINKS: SecurityTracker Alert ID: 1027028 CVE-2012-0672 CVE-2012-0674 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a specially crafted file that, when loaded by the

253

Control of the chinch bug, Blissus leucopterous (say) on corn and grain sorghum  

E-Print Network (OSTI)

) ~ Painter et ~a. (19$$) azui SnellinS, azzi ~ (ling'p), ore mn~ ztuymoekeC bg other meieOLes an@ strains oF oem. 'tests moro ccn8uctcS Surinam lg6$-3. 966 to evaluate the toxicity cf s~2. imscotici@cs to thc chinch bug. both in the laboratory exxon...

Todd, Larry Leland

2012-06-07T23:59:59.000Z

254

Static Detection of API Error-Handling Bugs via Mining Source Code  

E-Print Network (OSTI)

Static Detection of API Error-Handling Bugs via Mining Source Code Mithun Acharya and Tao Xie}@csc.ncsu.edu Abstract Incorrect handling of errors incurred after API invoca- tions (in short, API errors) can lead to security and robust- ness problems, two primary threats to software reliability. Correct handling of API

Young, R. Michael

255

T-718:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute 8:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code T-718:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code September 15, 2011 - 8:45am Addthis PROBLEM: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code. PLATFORM: Adobe Reader X (10.1) and earlier 10.x versions for Windows and Macintosh Adobe Reader 9.4.5 and earlier 9.x versions for Windows, Macintosh and UNIX Adobe Reader 8.3 and earlier 8.x versions for Windows and Macintosh Adobe Acrobat X (10.1) and earlier 10.x versions for Windows and Macintosh Adobe Acrobat 9.4.5 and earlier 9.x versions for Windows and Macintosh Adobe Acrobat 8.3 and earlier 8.x versions for Windows and Macintosh ABSTRACT: A remote user can create a file that, when loaded by the target user, will

256

U-176: Wireshark Multiple Bugs Let Remote Users Deny Service | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-176: Wireshark Multiple Bugs Let Remote Users Deny Service U-176: Wireshark Multiple Bugs Let Remote Users Deny Service U-176: Wireshark Multiple Bugs Let Remote Users Deny Service May 24, 2012 - 7:00am Addthis PROBLEM: Wireshark Multiple Bugs Let Remote Users Deny Service PLATFORM: 1.4.0 to 1.4.12, 1.6.0 to 1.6.7 ABSTRACT: Several vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions. Reference Links: SecurityTracker Alert ID: 1027094 CVE-2012-2392 CVE-2012-2393 CVE-2012-2394 IMPACT ASSESSMENT: Medium Discussion: A remote user can send specially crafted ANSI MAP, ASF, BACapp, Bluetooth HCI, IEEE 802.11, IEEE 802.3, LTP, and R3 data to cause Wireshark to hang or enter an infinite loop. A remote user can cause the DIAMETER dissector to crash. A remote user can trigger a memory error on SPARC or Itanium processors and

257

management  

National Nuclear Security Administration (NNSA)

5%2A en Management and Budget http:nnsa.energy.govaboutusouroperationsmanagementandbudget

P...

258

Market Power in Pollution Permit Markets  

E-Print Network (OSTI)

As with other commodity markets, markets for trading pollution permits have not been immune to market power concerns. In this paper, I survey the existing literature on market power in permit trading but also contribute ...

Montero, Juan Pablo

259

Air Permitting for Stationary Sources (New Hampshire)  

Energy.gov (U.S. Department of Energy (DOE))

The permitting system implements the permitting requirements of RSA 125-C and 125-I to regulate the operation and modification of new and existing stationary sources, area sources, and devices to...

260

Full Permit Application Handbook | Open Energy Information  

Open Energy Info (EERE)

Full Permit Application Handbook Jump to: navigation, search OpenEI Reference LibraryAdd to library Legal Document- OtherOther: Full Permit Application HandbookLegal Abstract...

Note: This page contains sample records for the topic "manager bugs permit" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Idaho NPDES Permits Webpage | Open Energy Information  

Open Energy Info (EERE)

Permits Webpage Jump to: navigation, search OpenEI Reference LibraryAdd to library Web Site: Idaho NPDES Permits Webpage Abstract This webpage provides an overview of the process...

262

PIA - Radiological Work Permit | Department of Energy  

Energy Savers (EERE)

Work Permit More Documents & Publications PIA - Bonneville Power Adminstration Ethics Helpline Occupational Medical Surveillance System (OMSS) PIA, Idaho National...

263

RPP Environmental Permits and Related Documentation  

SciTech Connect

This document contains the current list of environmental permits and related documentation for TWRS facilities and activities.

DEXTER, M.L.

2000-11-29T23:59:59.000Z

264

GRR/Section 15-ID-b - Air Quality Permit - Tier II Operating Permit | Open  

Open Energy Info (EERE)

GRR/Section 15-ID-b - Air Quality Permit - Tier II Operating Permit GRR/Section 15-ID-b - Air Quality Permit - Tier II Operating Permit < GRR Jump to: navigation, search GRR-logo.png GEOTHERMAL REGULATORY ROADMAP Roadmap Home Roadmap Help List of Sections Section 15-ID-b - Air Quality Permit - Tier II Operating Permit 15IDBAirQualityPermitTierIIOperatingPermit.pdf Click to View Fullscreen Contact Agencies Idaho Department of Environmental Quality Regulations & Policies IDAPA 58.01.01 Triggers None specified Click "Edit With Form" above to add content 15IDBAirQualityPermitTierIIOperatingPermit.pdf Error creating thumbnail: Page number not in range. Error creating thumbnail: Page number not in range. Error creating thumbnail: Page number not in range. Flowchart Narrative Tier II Operating Permits are issued to facilities or stationary sources

265

GRR/Section 19-CO-h - Denver Basin and Designated Basin Permitting Process  

Open Energy Info (EERE)

9-CO-h - Denver Basin and Designated Basin Permitting Process 9-CO-h - Denver Basin and Designated Basin Permitting Process < GRR Jump to: navigation, search GRR-logo.png GEOTHERMAL REGULATORY ROADMAP Roadmap Home Roadmap Help List of Sections Section 19-CO-h - Denver Basin and Designated Basin Permitting Process 19COHDenverBasinAndDesignatedBasinPermittingProcess.pdf Click to View Fullscreen Contact Agencies Colorado Ground Water Commission Colorado Division of Water Resources Regulations & Policies CRS 37-90-107 Application for Use of Ground Water 2 CCR 410-1 Rules and Regulations for the Management and Control of Designated Ground Water Triggers None specified Click "Edit With Form" above to add content 19COHDenverBasinAndDesignatedBasinPermittingProcess.pdf 19COHDenverBasinAndDesignatedBasinPermittingProcess.pdf

266

GRR/Section 18-NV-c - Waste Disposal Permit | Open Energy Information  

Open Energy Info (EERE)

NV-c - Waste Disposal Permit NV-c - Waste Disposal Permit < GRR Jump to: navigation, search GRR-logo.png GEOTHERMAL REGULATORY ROADMAP Roadmap Home Roadmap Help List of Sections Section 18-NV-c - Waste Disposal Permit 18NVCWasteDisposalPermit.pdf Click to View Fullscreen Contact Agencies Nevada Division of Environmental Protection Regulations & Policies Nevada Revised Statutes (NRS) Nevada Administrative Code (NAC) Triggers None specified Click "Edit With Form" above to add content 18NVCWasteDisposalPermit.pdf Error creating thumbnail: Page number not in range. Error creating thumbnail: Page number not in range. Error creating thumbnail: Page number not in range. Flowchart Narrative Within the Nevada Division of Environmental Protection in Nevada, the Bureau of Waste Management (BWM) operates a permitting and compliance

267

HSWA Part II Permit Modification  

National Nuclear Security Administration (NNSA)

Kansas City, Kansas, this 24th day of August , 2012. Final Original signed by John J. Smith for Rebecca Weber Director Air and Waste Management Division August 24, 2012 Date...

268

Solid Waste Management (North Carolina)  

Energy.gov (U.S. Department of Energy (DOE))

The Solid Waste Program regulates safe management of solid waste through guidance, technical assistance, regulations, permitting, environmental monitoring, compliance evaluation and enforcement....

269

Siting & Permitting | Open Energy Information  

Open Energy Info (EERE)

Siting & Permitting Siting & Permitting Jump to: navigation, search Siting and permitting policies can facilitate the installation of clean energy systems by specifying the conditions and fees involved in project development. Some local governments have adopted simplified or expedited permitting standards for wind and/or solar projects. “Top-of-the-stack” or fast-track permitting saves system owners and project developers time and money. Some states have established maximum fees that local governments may charge for a permit for a solar or wind energy system. In addition, some states have developed (or have supported the development of) model wind ordinances for use by local governments. [1] References ↑ DSIRE Glossary Retrieved from "http://en.openei.org/w/index.php?title=Siting_%26_Permitting&oldid=538321"

270

Annual Hanford Site Environmental Permitting status report  

SciTech Connect

The information contained in, and/or referenced in, this Annual Hanford Site Environmental Permitting Status Report addresses Permit Condition II.W (Other Permits and/or Approvals) of the Dangerous Waste Portion of the Resource Conservation and Recovery Act Permit for the Treatment, Storage, and Disposal of Dangerous Waste, issued by the Washington State Department of Ecology (WA7890008967). Condition II.W specifies that the Permittees are responsible for obtaining all other applicable federal, state, and local permits authorizing the development and operation of the Hanford Facility. Condition II.W further specifies that the Permittees are to use their best efforts to obtain such permits. For the purposes of this Permit Condition, ''best efforts'' mean submittal of documentation and/or approval(s) in accordance with schedules specified in applicable regulations, or as determined through negotiations with the applicable regulatory agencies.

SONNICHSEN, J.C.

1999-10-18T23:59:59.000Z

271

GRR/Section 15-ID-a - Air Quality Permit - Permit to Construct | Open  

Open Energy Info (EERE)

15-ID-a - Air Quality Permit - Permit to Construct 15-ID-a - Air Quality Permit - Permit to Construct < GRR Jump to: navigation, search GRR-logo.png GEOTHERMAL REGULATORY ROADMAP Roadmap Home Roadmap Help List of Sections Section 15-ID-a - Air Quality Permit - Permit to Construct 15IDAAirQualityPermitPermitToConstruct (1).pdf Click to View Fullscreen Contact Agencies Idaho Department of Environmental Quality Regulations & Policies IDAPA 58.01.01 Triggers None specified Click "Edit With Form" above to add content 15IDAAirQualityPermitPermitToConstruct (1).pdf Error creating thumbnail: Page number not in range. Error creating thumbnail: Page number not in range. Error creating thumbnail: Page number not in range. Flowchart Narrative The Idaho Department of Environmental Quality (DEQ) requires an air quality

272

GRR/Section 15-CA-b - Air Permit - Operating Permit | Open Energy  

Open Energy Info (EERE)

15-CA-b - Air Permit - Operating Permit 15-CA-b - Air Permit - Operating Permit < GRR Jump to: navigation, search GRR-logo.png GEOTHERMAL REGULATORY ROADMAP Roadmap Home Roadmap Help List of Sections Section 15-CA-b - Air Permit - Operating Permit 15CABAirPermitOperatingPermit.pdf Click to View Fullscreen Contact Agencies California Air Resources Board Regulations & Policies Clean Air Act (42 USC 1857 et seq.) California Air Pollution Control Laws Triggers None specified Click "Edit With Form" above to add content 15CABAirPermitOperatingPermit.pdf Error creating thumbnail: Page number not in range. Error creating thumbnail: Page number not in range. Error creating thumbnail: Page number not in range. Flowchart Narrative A developer operating a facility that emits air pollutants must obtain an

273

Idaho DEQ Air Quality Permits Applicant and DEQ Responsibilities...  

Open Energy Info (EERE)

LibraryAdd to library PermittingRegulatory Guidance - GuideHandbook: Idaho DEQ Air Quality Permits Applicant and DEQ Responsibilities guidebookPermittingRegulatory...

274

Alaska Public Participation in APDES Permitting Process | Open...  

Open Energy Info (EERE)

search OpenEI Reference LibraryAdd to library PermittingRegulatory Guidance - GuideHandbook: Alaska Public Participation in APDES Permitting ProcessPermittingRegulatory...

275

AZPDES Construction General Permit Fact Sheet | Open Energy Informatio...  

Open Energy Info (EERE)

General Permit Fact Sheet Jump to: navigation, search OpenEI Reference LibraryAdd to library PermittingRegulatory Guidance - Instructions: AZPDES Construction General Permit...

276

Microsoft Word - BUGS_The Next Smart Grid Peak Resource Final 4_19.docx  

NLE Websites -- All DOE Office Websites (Extended Search)

April 15, 2010 April 15, 2010 DOE/NETL-2010/1406 Backup Generators (BUGS): The Next Smart Grid Peak Resource Backup Generators (BUGS): The Next Smart Grid Peak Resource v1.0 ii DISCLAIMER This report was prepared as an account of work sponsored by an agency of the United States Government. Neither the United States Government nor any agency thereof, nor any of their employees, makes any warranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would not infringe privately owned rights. Reference therein to any specific commercial product, process, or service by trade name, trademark, manufacturer, or

277

PETSc: Docs: Code Management  

NLE Websites -- All DOE Office Websites (Extended Search)

Code Management Code Management Home Download Features Documentation Manual pages and Users Manual Citing PETSc Tutorials Installation SAWs Changes Bug Reporting Code Management FAQ License Linear Solver Table Applications/Publications Miscellaneous External Software Developers Site In this file we list some of the techniques that may be used to increase one's efficiency when developing PETSc application codes. We have learned to use these techniques ourselves, and they have improved our efficiency tremendously. Editing and Compiling The biggest time sink in code development is generally the cycle of EDIT-COMPILE-LINK-RUN. We often see users working in a single window with a cycle such as: Edit a file with emacs. Exit emacs. Run make and see some error messages. Start emacs and try to fix the errors; often starting emacs hides

278

T-633: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets 3: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets Remote Users Deny Service T-633: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets Remote Users Deny Service May 31, 2011 - 3:35pm Addthis PROBLEM: A vulnerability was reported in BIND. A remote user can cause denial of service conditions. PLATFORM: BIND Version(s): 9.4-ESV-R3 and later, 9.6-ESV-R2 and later, 9.6.3, 9.7.1 and later, 9.8.0 and later; prior to 9.4-ESV-R4-P1, 9.6-ESV-R4-P1, 9.7.3-P1, 9.8.0-P2 ABSTRACT: A remote DNS server can supply very large RRSIG RRsets in a negative response to trigger an off-by-one error in a buffer size check and cause the target requesting named process to crash. A remote user can cause named to crash. reference LINKS: SecurityTracker Alert ID: 1025575 SecurityTracker Alert ID: 1025572

279

V-210: HP LaserJet Pro Printer Bug Lets Remote Users Access Data |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

V-210: HP LaserJet Pro Printer Bug Lets Remote Users Access Data V-210: HP LaserJet Pro Printer Bug Lets Remote Users Access Data V-210: HP LaserJet Pro Printer Bug Lets Remote Users Access Data August 3, 2013 - 2:37am Addthis PROBLEM: A vulnerability was reported in HP Printers. A remote user can obtain potentially sensitive information. PLATFORM: HP LaserJet Pro products ABSTRACT: A potential security vulnerability has been identified with certain HP LaserJet Pro printers. The vulnerability could be exploited remotely to gain unauthorized access to data. REFERENCE LINKS: SecurityTracker Alert ID 1028869 CVE-2013-4807 Vendor URL IMPACT ASSESSMENT: Medium DISCUSSION: The following models are affected: HP LaserJet Pro P1102w CE657A/CE658A HP LaserJet Pro P1606dn CE749A HP LaserJet Pro M1212nf MFP CE841A HP LaserJet Pro M1213nf MFP CE845A

280

GRR/Section 15-TX-a - Air Permit - Permit to Construct | Open Energy  

Open Energy Info (EERE)

GRR/Section 15-TX-a - Air Permit - Permit to Construct GRR/Section 15-TX-a - Air Permit - Permit to Construct < GRR Jump to: navigation, search GRR-logo.png GEOTHERMAL REGULATORY ROADMAP Roadmap Home Roadmap Help List of Sections Section 15-TX-a - Air Permit - Permit to Construct 15TXAAirPermitPermitToConstruct (1).pdf Click to View Fullscreen Contact Agencies Texas Commission on Environmental Quality Regulations & Policies Title 30 of the Texas Administrative Code 30 TAC 116.114 30 TAC 39.418 30 TAC 39.604 30 TAC 39.605 30 TAC 39.409 30 TAC 116.136 30 TAC 55.254 30 TAC 116.136 30 TAC 116.137 Triggers None specified Click "Edit With Form" above to add content 15TXAAirPermitPermitToConstruct (1).pdf 15TXAAirPermitPermitToConstruct (1).pdf 15TXAAirPermitPermitToConstruct (1).pdf Error creating thumbnail: Page number not in range.

Note: This page contains sample records for the topic "manager bugs permit" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Colorado - Access Permit Application File Review Checklist |...  

Open Energy Info (EERE)

Checklist Jump to: navigation, search OpenEI Reference LibraryAdd to library General: Colorado - Access Permit Application File Review Checklist Author Colorado Department of...

282

Catawba County- Green Construction Permitting Incentive Program  

Energy.gov (U.S. Department of Energy (DOE))

Catawba County is providing incentives to encourage the construction of sustainably built homes and commercial buildings. Rebates on permit fees and plan reviews are available for certain...

283

Montana - Encroachment Permit Application | Open Energy Information  

Open Energy Info (EERE)

General: Montana - Encroachment Permit Application Author Montana Department of Transportation Published Montana Department of Transportation, 2007 DOI Not Provided Check for...

284

Annual Hanford Site environmental permitting status report  

SciTech Connect

This Annual Hanford Site Environmental Permitting Status Report (Status Report) was prepared in response to requirements prescribed in U.S. Department of Energy (DOE) Order 5400.2A, `Environmental Compliance Issue Coordination`. This Order, canceled in April 1996, required that information on existing and anticipated environmental permitting for DOE facilities be submitted (or updated) annually by October 1 of each calendar year. Although the Order was canceled, the need for this Status Report still remains. For example, the Washington State Department of Ecology`s (Ecology) Dangerous Waste Permit Application Requirements (Publication Number 95-402, June 1996), Checklist Section J, calls for current information on existing and anticipated environmental permitting. As specified in the Hanford Facility Dangerous Waste Permit Application, General Information Portion (DOE/RL-91-28), this Status Report serves as the vehicle for meeting this requirement for the Hanford Facility. This Status Report includes information on all existing and anticipated environmental permitting. Environmental permitting required by the Resource Conservation and Recovery Act (RCRA) of 1976, the Hazardous and Solid Waste Amendments (HSWA) of 1984, and non-RCRA permitting (solid waste handling, Clean Air Act Amendments of 1990, Clean Water Act Amendments of 1987, Washington State waste discharge, and onsite sewage system) are addressed. Information on RCRA and non-RCRA permitting is included and is current as of July 31, 1996.

Thompson, S.A.

1996-10-01T23:59:59.000Z

285

Arizona Department of Environmental Quality's Individual Permits...  

Open Energy Info (EERE)

process for an individual AZPDES permit. Author Arizona Department of Environmental Quality Published ADEQ, Date Not Provided DOI Not Provided Check for DOI availability: http:...

286

Arizona Department of Environmental Quality's General Permits...  

Open Energy Info (EERE)

regarding AZPDES general permits. Author Arizona Department of Environmental Quality Published ADEQ, Date Not Provided DOI Not Provided Check for DOI availability: http:...

287

Transmission/Permitting Atlas | Open Energy Information  

Open Energy Info (EERE)

mittingAtlasHeader.png Roadmap Compare States General Transmission Dashboard Permitting Atlas Compare States Arizona California Colorado Idaho Montana Nevada New Mexico Oregon Utah...

288

California Permit Streamlining Act | Open Energy Information  

Open Energy Info (EERE)

Streamlining Act Jump to: navigation, search OpenEI Reference LibraryAdd to library Legal Document- StatuteStatute: California Permit Streamlining ActLegal Abstract California...

289

Industrial Discharge Permits (District of Columbia)  

Energy.gov (U.S. Department of Energy (DOE))

All businesses and government agencies discharging process wastewater to the public sewer system must report their activities to DC Water's Pretreatment Center. Wastewater discharge permits are...

290

Wastewater Construction and Operation Permits (Iowa)  

Energy.gov (U.S. Department of Energy (DOE))

These regulations describe permit requirements for the construction and operation of facilities treating wastewater, and provide separation distances from other water sources.

291

Groundwater Discharge Permit and Registration (New Hampshire)  

Energy.gov (U.S. Department of Energy (DOE))

The Groundwater Discharge Permitting and Registration Program seeks to protect groundwater quality by establishing standards, criteria, and procedures for wastewater discharges. The program...

292

NPDES Permit Program Website | Open Energy Information  

Open Energy Info (EERE)

Program Website Jump to: navigation, search OpenEI Reference LibraryAdd to library Web Site: NPDES Permit Program Website Author Environmental Protection Agency Published Publisher...

293

Hawaii Underground Injection Control Permitting Webpage | Open...  

Open Energy Info (EERE)

Webpage Jump to: navigation, search OpenEI Reference LibraryAdd to library Web Site: Hawaii Underground Injection Control Permitting Webpage Author State of Hawaii Department of...

294

Colorado Air Pollution Control Division - Construction Permits...  

Open Energy Info (EERE)

Jump to: navigation, search OpenEI Reference LibraryAdd to library Web Site: Colorado Air Pollution Control Division - Construction Permits Forms and Air Pollutant Emission...

295

Utah Nonpoint Source Pollution Management Plan | Open Energy...  

Open Energy Info (EERE)

Management Plan Jump to: navigation, search OpenEI Reference LibraryAdd to library PermittingRegulatory Guidance - GuideHandbook: Utah Nonpoint Source Pollution Management...

296

GRR/Section 6-MT-e - Floodplain Development Permit | Open Energy  

Open Energy Info (EERE)

6-MT-e - Floodplain Development Permit 6-MT-e - Floodplain Development Permit < GRR Jump to: navigation, search GRR-logo.png GEOTHERMAL REGULATORY ROADMAP Roadmap Home Roadmap Help List of Sections Section 6-MT-e - Floodplain Development Permit 06MTEFloodplainDevelopmentPermit (1).pdf Click to View Fullscreen Contact Agencies Montana Department of Natural Resources & Conservation Federal Emergency Management Agency Triggers None specified Click "Edit With Form" above to add content 06MTEFloodplainDevelopmentPermit (1).pdf Error creating thumbnail: Page number not in range. Error creating thumbnail: Page number not in range. Error creating thumbnail: Page number not in range. Flowchart Narrative Anyone planning new development within a designated Special Flood Hazard Areas (SFHA). Check with local floodplain [www.mtfloodplain.mt.gov

297

GRR/Section 14-NV-c - Underground Injection Control Permit | Open Energy  

Open Energy Info (EERE)

4-NV-c - Underground Injection Control Permit 4-NV-c - Underground Injection Control Permit < GRR Jump to: navigation, search GRR-logo.png GEOTHERMAL REGULATORY ROADMAP Roadmap Home Roadmap Help List of Sections Section 14-NV-c - Underground Injection Control Permit 14NVCUndergroundInjectionControlPermit.pdf Click to View Fullscreen Contact Agencies Nevada Division of Environmental Protection Nevada Division of Minerals Nevada Division of Water Resources Bureau of Land Management Regulations & Policies Nevada Revised Statutes (NRS) Nevada Administrative Code (NAC) Triggers None specified Click "Edit With Form" above to add content 14NVCUndergroundInjectionControlPermit.pdf Error creating thumbnail: Page number not in range. Error creating thumbnail: Page number not in range. Error creating thumbnail: Page number not in range.

298

GRR/Section 12-FD-b - Bald & Golden Eagle Permit | Open Energy Information  

Open Energy Info (EERE)

GRR/Section 12-FD-b - Bald & Golden Eagle Permit GRR/Section 12-FD-b - Bald & Golden Eagle Permit < GRR Jump to: navigation, search GRR-logo.png GEOTHERMAL REGULATORY ROADMAP Roadmap Home Roadmap Help List of Sections Section 12-FD-b - Bald & Golden Eagle Permit 12FDBBaldGoldenEaglePermit.pdf Click to View Fullscreen Contact Agencies Fish and Wildlife Service Bureau of Land Management Regulations & Policies Bald and Golden Eagle Protection Act National Environmental Policy Act Triggers None specified Click "Edit With Form" above to add content 12FDBBaldGoldenEaglePermit.pdf Error creating thumbnail: Page number not in range. Error creating thumbnail: Page number not in range. Error creating thumbnail: Page number not in range. Flowchart Narrative The Bald and Golden Eagle Act prohibits anyone from "taking" bald eagles.

299

GRR/Section 19-HI-a - Surface Water Use Permit | Open Energy Information  

Open Energy Info (EERE)

GRR/Section 19-HI-a - Surface Water Use Permit GRR/Section 19-HI-a - Surface Water Use Permit < GRR Jump to: navigation, search GRR-logo.png GEOTHERMAL REGULATORY ROADMAP Roadmap Home Roadmap Help List of Sections Section 19-HI-a - Surface Water Use Permit 19HIASurfaceWaterUsePermit.pdf Click to View Fullscreen Contact Agencies Hawaii Department of Land and Natural Resources Commission on Water Resource Management Regulations & Policies Hawaii Revised Statutes 174C Hawaii Administrative Rules Title 13, Chapter 171 Triggers None specified Click "Edit With Form" above to add content 19HIASurfaceWaterUsePermit.pdf Error creating thumbnail: Page number not in range. Error creating thumbnail: Page number not in range. Error creating thumbnail: Page number not in range. Flowchart Narrative Under Hawaii Revised Statutes 174C and Hawaii Administrative Rules Title

300

GRR/Section 7-NV-a - Permit to Construct and Permit to Operate | Open  

Open Energy Info (EERE)

7-NV-a - Permit to Construct and Permit to Operate 7-NV-a - Permit to Construct and Permit to Operate < GRR Jump to: navigation, search GRR-logo.png GEOTHERMAL REGULATORY ROADMAP Roadmap Home Roadmap Help List of Sections Section 7-NV-a - Permit to Construct and Permit to Operate 07NVAPermitToConstructAndPermitToOperate (3).pdf Click to View Fullscreen Contact Agencies Nevada Division of Environmental Protection Triggers None specified Click "Edit With Form" above to add content 07NVAPermitToConstructAndPermitToOperate (3).pdf Error creating thumbnail: Page number not in range. Error creating thumbnail: Page number not in range. Error creating thumbnail: Page number not in range. Flowchart Narrative _ 7-NV-a.1 and 6-NV-a.2 - Has an Environmental Review been Completed for Construction? The developer must make sure to undergo an environmental process before

Note: This page contains sample records for the topic "manager bugs permit" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

MCA 75-5-401 - Water Quality Permits: Board Rules for Permits...  

Open Energy Info (EERE)

- Water Quality Permits: Board Rules for Permits Jump to: navigation, search OpenEI Reference LibraryAdd to library Legal Document- StatuteStatute: MCA 75-5-401 - Water Quality...

302

44 CAB International 2011. Urban Pest Management: An Environmental Perspective (ed. P. Dhang)  

E-Print Network (OSTI)

environmental impact than pesticide driven programmes. This chapter discusses the use of `low- impact' tools and methods. Also, a community-wide programme for effective bed bug management in society is explained apartment complexes occupied by low-income people in New Jersey found that 5% of all of the housing units

Wang, Changlu

303

Coordinating Permit Office | OpenEI Community  

Open Energy Info (EERE)

Coordinating Permit Office Coordinating Permit Office Home Kyoung's picture Submitted by Kyoung(155) Contributor 9 July, 2013 - 20:57 GRR 3rd Quarter - Stakeholder Update Meeting Alaska analysis appropriations Categorical Exclusions Coordinating Permit Office Cost Mechanisms Cost Recovery geothermal Hawaii NEPA permitting quarterly meeting White Papers On June 26th, we held the 3rd Quarter GRR Stakeholder Update at the Grand Sierra Resort in Reno, NV. The meeting was well-attended with over 40 attendees, including in-person and webinar attendance. Thanks to all who attended! Files: application/pdf icon Presentation: 3rd Quarterly Stakeholder Update Meeting application/vnd.openxmlformats-officedocument.presentationml.presentation icon Mock-up: GRR Permitting Wizard Interface Kyoung's picture Submitted by Kyoung(155)

304

Operating Permits (New Jersey) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Operating Permits (New Jersey) Operating Permits (New Jersey) Operating Permits (New Jersey) < Back Eligibility Utility Fed. Government Commercial Agricultural Investor-Owned Utility State/Provincial Govt Industrial Construction Municipal/Public Utility Local Government Residential Installer/Contractor Rural Electric Cooperative Tribal Government Low-Income Residential Schools Retail Supplier Institutional Multi-Family Residential Systems Integrator Fuel Distributor Nonprofit General Public/Consumer Transportation Program Info State New Jersey Program Type Siting and Permitting Provider Department of Environmental Protection The owner or operator of a facility subject to this article shall obtain and maintain an operating permit for the facility. The owner or operator of a facility subject to this article shall ensure that no person shall use or

305

Solar Construction Permitting Standards | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Standards Standards Solar Construction Permitting Standards < Back Eligibility Agricultural Commercial General Public/Consumer Industrial Local Government Nonprofit Residential Savings Category Solar Buying & Making Electricity Heating & Cooling Water Heating Program Info State Colorado Program Type Solar/Wind Permitting Standards Provider Colorado Energy Office Owners of solar photovoltaic (PV) systems and solar water heating systems in Colorado are required to obtain a building permit before their systems may be installed. Permits are handled at the local level and awarded by counties and municipalities. Traditionally, counties and municipalities have been free to assign their own fees for a permit. These fees can vary broadly in size across jurisdictions and in some cases, can be large enough

306

Wind Project Permitting | Open Energy Information  

Open Energy Info (EERE)

Project Permitting Project Permitting Jump to: navigation, search Invenergy is the developer of the 129-MW Forward Wind Energy Center project near Fond du Lac, Wisconsin, that came online in 2008. Photo by Ruth Baranowski, NREL 16412 As with other energy facility permitting processes, the goal of the wind project permitting process is to reach decisions that are timely, minimize challenges, and ensure compliance with laws and regulations that provide for necessary environmental protection.[1] Resources National Wind Coordinating Committee. (2002). Permitting of Wind Energy Facilities. Accessed August 28, 2013. This handbook is written for individuals and groups involved in evaluating wind projects: decision-makers and agency staff at all levels of government, wind developers, interested parties and the public.

307

U-201: HP System Management Homepage Bugs Let Remote Users Deny Service  

Energy.gov (U.S. Department of Energy (DOE))

The vulnerabilities could be exploited remotely resulting in unauthorized access, disclosure of information, data modification, Denial of Service (DoS), and execution of arbitrary code.

308

State Surface Water Discharge Permits (New Hampshire)  

Energy.gov (U.S. Department of Energy (DOE))

Rules apply to the discharge of all pollutants from a point source to surface waters of the state. The rule does not apply to facilities that require both a state discharge permit and a federal...

309

Regulations and Permits Related to Dams (Vermont)  

Energy.gov (U.S. Department of Energy (DOE))

Vermont law requires a permit, or a dam order, for the construction, alteration, or removal of dams impounding more than 500,000 cubic feet of water, including any accumulated sediments. Dam...

310

Reclamation permit application handbook. Final technical report  

SciTech Connect

The objective of this handbook is to provide Appalachian surface coal mine operators with an explanation of the Office of Surface Mining's (OSM) permanent regulatory program permit application requirements. The format of the handbook is designed to give the reader an understanding of how the permit application regulations were developed, the number of subjects the application must cover, the work entailed in satisfying the permit requirements, and sources of information for more technical studies. Preparation of the handbook involved reviewing the OSM regulations and devising a hypothetical permit, incorporating information required by all the sections of the regulations. The outlines and drafts of the handbook were reviewed by mine operators, OSM, and State agencies for completeness, and to ensure that the maximum benefit would be derived by using such a handbook.

Myers, L.L.; Calvert, R.P.

1981-06-01T23:59:59.000Z

311

Environmental Permit Application Background Statement (Delaware)  

Energy.gov (U.S. Department of Energy (DOE))

The purpose of Chapter 79 of Delaware Title 7 is to ensure that the State has adequate information about the background of applicants or regulated parties for the purposes of processing permits and...

312

Disclosure of Permitted Communication Concerning Fossil Fuel...  

Energy Savers (EERE)

Fossil Fuel Energy Consumption Reduction for New Construction and Major Renovations of Federal Buildings -- Docket No. EERE-2010-BT-STD-0031; RIN 1904-AB96 Disclosure of Permitted...

313

Disclosure of Permitted Communication Concerning Regional Standards  

NLE Websites -- All DOE Office Websites (Extended Search)

Disclosure of Permitted Communication Concerning Regional Standards Disclosure of Permitted Communication Concerning Regional Standards Enforcement Framework Document -- Docket No. EERE-2011-BT-CE-0077 Disclosure of Permitted Communication Concerning Regional Standards Enforcement Framework Document -- Docket No. EERE-2011-BT-CE-0077 This memo provides an overview of communications made to DOE staff on the subject of a policy for providing waivers from new regional furnace efficiency standards. memo_furnace_std_waiver_policy.pdf More Documents & Publications Disclosure of Permitted Communication Concerning Fossil Fuel Energy Consumption Reduction for New Construction and Major Renovations of Federal Buildings -- Docket No. EERE-2010-BT-STD-0031; RIN 1904-AB96 Record of Communication Concerning Ceiling Fan and Ceiling Fan Light Kit

314

Distributed PV Permitting and Inspection Processes  

Energy.gov (U.S. Department of Energy (DOE))

This presentation summarizes case studies of the time and cost involved in the distributed PV permitting and inspection process in three Solar America Cities, Austin, Portland, and Salt Lake City.

315

Major Source Permits (District of Columbia) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Major Source Permits (District of Columbia) Major Source Permits (District of Columbia) Major Source Permits (District of Columbia) < Back Eligibility Utility Commercial Industrial Program Info State District of Columbia Program Type Environmental Regulations Provider District Department of the Environment The District reviews designs for new pollution sources and design modifications for existing sources. Permits are issued to allow sources to emit limited and specified amounts of pollution as allowed by air quality laws and regulations. Major sources include power plants, heating plants, and large printing facilities. Three types of permits are issued: pre-construction review permits; new source review permits; and operating permits. These permits include conditions intended to minimize emissions of

316

Has operating permitting really changed with Title V? Reflecting on the Title V operating permit program  

SciTech Connect

Now that some state regulatory agencies are reviewing Title V permit applications and issuing permits, evaluation of the process can be made in comparison with the original goals of the Title V permitting program. In addition, assessment of the terms and conditions that are being incorporated into permits, the nature of draft permits that are issued to facilities for comment, and the extent and type of negotiation that have been conducted with agencies to develop successful Title V permits, will be helpful for facilities that are currently undergoing application review. In working with a Fortune 500 surface coating company, fourteen Title V permit applications were developed and submitted for plants located in Maryland, Pennsylvania, Ohio, New Jersey, Illinois, Georgia, West Virginia, Wisconsin, Indiana and southern California. Draft permits have been issued for several of the plants, and differences in the terms and conditions, testing requirements, and permit format and structure have been noted between states. One of the issued permits required modification, and the process was one of the first for this state agency.

Goldstein, D.R.; Cressman, A.W.

1999-07-01T23:59:59.000Z

317

GRR/Section 3-AK-g - Utility Permit to Construct on ADOT&PF ROW | Open  

Open Energy Info (EERE)

GRR/Section 3-AK-g - Utility Permit to Construct on ADOT&PF ROW GRR/Section 3-AK-g - Utility Permit to Construct on ADOT&PF ROW < GRR Jump to: navigation, search GRR-logo.png GEOTHERMAL REGULATORY ROADMAP Roadmap Home Roadmap Help List of Sections Section 3-AK-g - Utility Permit to Construct on ADOT&PF ROW 03AKGUtilityPermitToConstructOnADOTROW (1).pdf Click to View Fullscreen Contact Agencies Alaska Department of Transportation and Public Facilities U S Army Corps of Engineers United States Coast Guard Bureau of Indian Affairs Bureau of Land Management Federal Aviation Administration Alaska Department of Natural Resources Regulations & Policies 11 AAC 195.010: Anadromous Fish 17 AAC 15.021: Application for Utility Permit Triggers None specified Click "Edit With Form" above to add content 03AKGUtilityPermitToConstructOnADOTROW (1).pdf

318

EPA Region 6 NPDES General Permits | Open Energy Information  

Open Energy Info (EERE)

NPDES General Permits Jump to: navigation, search OpenEI Reference LibraryAdd to library Web Site: EPA Region 6 NPDES General Permits Abstract Access to NPDES General Permits for...

319

Introduction to Coast Guard Bridge Permitting | Open Energy Informatio...  

Open Energy Info (EERE)

search OpenEI Reference LibraryAdd to library PermittingRegulatory Guidance - GuideHandbook: Introduction to Coast Guard Bridge PermittingPermittingRegulatory GuidanceGuide...

320

EPA - Construction General Permit Fact Sheet | Open Energy Information  

Open Energy Info (EERE)

search OpenEI Reference LibraryAdd to library PermittingRegulatory Guidance - GuideHandbook: EPA - Construction General Permit Fact SheetPermittingRegulatory GuidanceGuide...

Note: This page contains sample records for the topic "manager bugs permit" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

ARM 12-14-150 - Commercial Use Permitting: Restricted Use Permitting...  

Open Energy Info (EERE)

use permits for land use within the jurisdiction of the Montana Department of Fish, Wildlife and Parks. Published NA Year Signed or Took Effect 2009 Legal Citation ARM...

322

ARM 12-14-145 - Commercial Use Permitting: Restricted Use Permit...  

Open Energy Info (EERE)

use permits for land use within the jurisdiction of the Montana Department of Fish, Wildlife and Parks. Published NA Year Signed or Took Effect 2007 Legal Citation ARM...

323

Integrated Title V/acid rain permits: Transitioning through initial permit issuance and reopenings  

SciTech Connect

Titles IV and V of the Clean Air Act Amendments of 1990 (Act or CAA) created two new stationary source permitting programs, one specific to acid rain (Title IV), and a second for operating permits in general (Title V). The Phase 2 portion of the acid rain program was designed to be implemented through the Title V operating permit program, thereby subjecting all Phase 2 acid rain sources to the requirements of Title V. Permits issued pursuant to Phase 2 of the acid rain program will be viewed as a self-contained portion of the Title V operating permit and will be governed by regulations promulgated under both Title IV and Title V. The requirements imposed by Title IV may not always be consistent with the broader operating permit program requirements of Title V, and when inconsistency occurs, the acid rain requirements will take precedence. This nonalignment will perhaps be most apparent during two stages of initial permitting: (1) the transition period following Title V program approval when permit application, issuance, and effective dates differ between the two programs, and (2) at the point when acid rain permits must be reopened to incorporate Phase 2 NO{sub x} requirements. This paper explores strategies for streamlining implementation of the two programs with particular focus on these two coordination issues.

Bloomfield, C. [Environmental Protection Agency, San Francisco, CA (United States)

1995-12-31T23:59:59.000Z

324

U-265: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users 5: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain Information and Execute Arbitrary Code U-265: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain Information and Execute Arbitrary Code September 21, 2012 - 6:00am Addthis PROBLEM: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain Information and Execute Arbitrary Code PLATFORM: HP SiteScope v11.10, v11.11, v11.12 for Windows, Linux and Solaris ABSTRACT: A vulnerability was reported in HP SiteScope. reference LINKS: HP Security Bulletin Document ID: c03489683 SecurityTracker Alert ID: 1027547 CVE-2012-3259 CVE-2012-3260 CVE-2012-3261 CVE-2012-3262 CVE-2012-3263 CVE-2012-3264 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in HP SiteScope. A remote user can execute

325

U-232: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

32: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny 32: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the Host OS U-232: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the Host OS August 10, 2012 - 7:00am Addthis PROBLEM: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the Host OS PLATFORM: This vulnerability effects only Xen 4.0 and 4.1. Xen 3.4 and earlier and xen-unstable are not vulnerable. ABSTRACT: A vulnerability was reported in Xen. A local user on a guest operating system can cause denial of service conditions on the host. reference LINKS: Xen Security Announcements SecurityTracker Alert ID: 1027365 seclists.org CVE-2012-3433 IMPACT ASSESSMENT: Medium Discussion: An HVM guest is able to manipulate its physical address space such that tearing down the guest takes an extended period amount of time searching

326

U-029: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

29: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets Remote 29: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets Remote Users Gain Unauthorized Access U-029: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets Remote Users Gain Unauthorized Access November 8, 2011 - 8:00am Addthis PROBLEM: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets Remote Users Gain Unauthorized Access. PLATFORM: HP TCP/IP Services for OpenVMS v5.6 and v5.7 on iTanium and ALPHA Servers. ABSTRACT: A remote user can gain unauthorized access reference LINKS: HP Support document ID: c01908983 SecurityTracker Alert ID: 1026279 CVE-2011-3168 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in TCP/IP Services for OpenVMS. A remote user can gain unauthorized access. On systems running POP or IMAP servers, a remote user can gain unauthorized access.

327

U-232: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

32: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny 32: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the Host OS U-232: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the Host OS August 10, 2012 - 7:00am Addthis PROBLEM: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the Host OS PLATFORM: This vulnerability effects only Xen 4.0 and 4.1. Xen 3.4 and earlier and xen-unstable are not vulnerable. ABSTRACT: A vulnerability was reported in Xen. A local user on a guest operating system can cause denial of service conditions on the host. reference LINKS: Xen Security Announcements SecurityTracker Alert ID: 1027365 seclists.org CVE-2012-3433 IMPACT ASSESSMENT: Medium Discussion: An HVM guest is able to manipulate its physical address space such that tearing down the guest takes an extended period amount of time searching

328

U-265: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users 5: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain Information and Execute Arbitrary Code U-265: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain Information and Execute Arbitrary Code September 21, 2012 - 6:00am Addthis PROBLEM: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain Information and Execute Arbitrary Code PLATFORM: HP SiteScope v11.10, v11.11, v11.12 for Windows, Linux and Solaris ABSTRACT: A vulnerability was reported in HP SiteScope. reference LINKS: HP Security Bulletin Document ID: c03489683 SecurityTracker Alert ID: 1027547 CVE-2012-3259 CVE-2012-3260 CVE-2012-3261 CVE-2012-3262 CVE-2012-3263 CVE-2012-3264 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in HP SiteScope. A remote user can execute

329

Year of Biodiversity Podcast Welcome to Bug Bytes, a bimonthly podcast from Texas A&M University's  

E-Print Network (OSTI)

are affected. Biodiversity encompasses humans, plants, animals, fungi, bacteria, food, and water at the scale that we don't! Join us on this excursion as we learn from the bugs that share in every aspect of our lives the human element, the diversity of cultures and how we impact the world around us. How, in turn we

Behmer, Spencer T.

330

Utah Underground Storage Tank Installation Permit | Open Energy...  

Open Energy Info (EERE)

Underground Storage Tank Installation Permit Jump to: navigation, search OpenEI Reference LibraryAdd to library Form: Utah Underground Storage Tank Installation Permit Form Type...

331

Alaska Special Area Permit Application | Open Energy Information  

Open Energy Info (EERE)

Form: Alaska Special Area Permit Application Form Type ApplicationNotice Form Topic Fish and Game Special Area Permit Application Organization Alaska Department of Fish and...

332

Alaska Fish Habitat Permit Application | Open Energy Information  

Open Energy Info (EERE)

Form: Alaska Fish Habitat Permit Application Form Type ApplicationNotice Form Topic Fish Habitat Permit Organization Alaska Department of Fish and Game Published Publisher Not...

333

Arizona State Land Department Applications and Permits Website...  

Open Energy Info (EERE)

Permits Website Jump to: navigation, search OpenEI Reference LibraryAdd to library Web Site: Arizona State Land Department Applications and Permits Website Abstract This website...

334

BLM - Paleontological Resource Use Permits webpage | Open Energy...  

Open Energy Info (EERE)

Use Permits webpage Jump to: navigation, search OpenEI Reference LibraryAdd to library Web Site: BLM - Paleontological Resource Use Permits webpage Abstract This webpage provides...

335

Application for presidential permit OE Docket No. PP-234 Baja...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

presidential permit OE Docket No. PP-234 Baja California Power, Inc Application for presidential permit OE Docket No. PP-234 Baja California Power, Inc Application from Baja...

336

Air Quality Approvals and Permits (New Brunswick, Canada) | Department...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Approvals and Permits (New Brunswick, Canada) Air Quality Approvals and Permits (New Brunswick, Canada) < Back Eligibility Commercial Construction Developer Industrial Installer...

337

Fact Sheet - Air Quality Permitting | Open Energy Information  

Open Energy Info (EERE)

Air Quality Permitting Jump to: navigation, search OpenEI Reference LibraryAdd to library PermittingRegulatory Guidance - GuideHandbook: Fact Sheet - Air Quality...

338

RAPID/Best Practices/Coordinating Permit Offices | Open Energy...  

Open Energy Info (EERE)

accept the permit plan until the environmental review process is complete. DBEDT will conduct agency outreach and coordination to discuss federal, state, and county permits...

339

Hydrogen Codes and Standards and Permitting | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Codes and Standards and Permitting Hydrogen Codes and Standards and Permitting 2009 DOE Hydrogen Program and Vehicle Technologies Program Annual Merit Review and Peer Evaluation...

340

WSDE Report: Wastewater Discharge Permits in Washington State...  

Open Energy Info (EERE)

Wastewater Discharge Permits in Washington State Jump to: navigation, search OpenEI Reference LibraryAdd to library Report: WSDE Report: Wastewater Discharge Permits in Washington...

Note: This page contains sample records for the topic "manager bugs permit" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Request for Information on Permitting of Transmission Lines:...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Request for Information on Permitting of Transmission Lines: Federal Register Notice Volume 77, No. 38 - Feb. 27, 2012 Request for Information on Permitting of Transmission Lines:...

342

Guide to Permitting Electric Transmission Lines in Wyoming |...  

Open Energy Info (EERE)

Permitting Electric Transmission Lines in Wyoming Jump to: navigation, search OpenEI Reference LibraryAdd to library PermittingRegulatory Guidance - GuideHandbook: Guide to...

343

EPA - Permit Compliance System webpage | Open Energy Information  

Open Energy Info (EERE)

System webpage Jump to: navigation, search OpenEI Reference LibraryAdd to library Web Site: EPA - Permit Compliance System webpage Abstract This webpage contains EPA's Permit...

344

U-252: Barracuda Web Filter Input Validation Flaws Permit Cross...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Barracuda Web Filter Input Validation Flaws Permit Cross-Site Scripting Attacks U-252: Barracuda Web Filter Input Validation Flaws Permit Cross-Site Scripting Attacks September...

345

Construction and Minor Permit Applications | Open Energy Information  

Open Energy Info (EERE)

Permit Applications Jump to: navigation, search OpenEI Reference LibraryAdd to library Web Site: Construction and Minor Permit Applications Author Division of Air Quality...

346

New Mexico Archaeological Permits Webpage | Open Energy Information  

Open Energy Info (EERE)

Permits Webpage Jump to: navigation, search OpenEI Reference LibraryAdd to library Web Site: New Mexico Archaeological Permits Webpage Abstract Provides information about...

347

EPA - Section 404 Dredge and Fill Permitting webpage | Open Energy...  

Open Energy Info (EERE)

Permitting webpage Jump to: navigation, search OpenEI Reference LibraryAdd to library Web Site: EPA - Section 404 Dredge and Fill Permitting webpage Abstract This webpage...

348

Hawaii Clean Energy Initiative - Transmission Line Approval Permit...  

Open Energy Info (EERE)

Hawaii Clean Energy Initiative - Transmission Line Approval Permit Packet Jump to: navigation, search OpenEI Reference LibraryAdd to library PermittingRegulatory Guidance -...

349

Guide to Colorado Well Permits, Water Rights, and Water Administration...  

Open Energy Info (EERE)

Colorado Well Permits, Water Rights, and Water Administration Jump to: navigation, search OpenEI Reference LibraryAdd to library PermittingRegulatory Guidance - GuideHandbook:...

350

Westinghouse and Fuzhou Permitted to Restart Distribution of...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Westinghouse and Fuzhou Permitted to Restart Distribution of Light Bulb Products Westinghouse and Fuzhou Permitted to Restart Distribution of Light Bulb Products August 6, 2010 -...

351

Property:ExplorationPermit-Drilling | Open Energy Information  

Open Energy Info (EERE)

without first obtaining a permit issued under the authority of the State Department of Geology and Mineral Industries and without complying with the conditions of such permit....

352

AUTHORIZATION FOR PAYROLL DEDUCTION 2012-2013 PARKING PERMIT  

E-Print Network (OSTI)

________________________________________________ DATE______________________________ $267.00 (ONE PERMIT) $66.00 (MOTORCYCLE PERMIT) $267.00 (TOTAL MONTH____________ OPTION FOR MOTORCYCLE DEDUCTION--1 MONTH______________ PLEASE INCLUDE YOUR CAMPUS

Escher, Christine

353

Hanford facility dangerous waste permit application  

SciTech Connect

This document, Set 2, the Hanford Facility Dangerous Waste Part B Permit Application, consists of 15 chapters that address the content of the Part B checklists prepared by the Washington State Department of Ecology (Ecology 1987) and the US Environmental Protection Agency (40 CFR 270), with additional information requirements mandated by the Hazardous and Solid Waste Amendments of 1984 and revisions of WAC 173-303. For ease of reference, the Washington State Department of Ecology checklist section numbers, in brackets, follow the chapter headings and subheadings. This permit application contains umbrella- type'' documentation with overall application to the Hanford Facility. This documentation is broad in nature and applies to all TSD units that have final status under the Hanford Facility Permit.

none,

1991-09-18T23:59:59.000Z

354

Underground Injection Control Permits and Registrations (Texas) |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

You are here You are here Home » Underground Injection Control Permits and Registrations (Texas) Underground Injection Control Permits and Registrations (Texas) < Back Eligibility Utility Agricultural Investor-Owned Utility State/Provincial Govt Industrial Construction Municipal/Public Utility Local Government Installer/Contractor Rural Electric Cooperative Fuel Distributor Savings Category Buying & Making Electricity Program Info State Texas Program Type Environmental Regulations Safety and Operational Guidelines Provider Texas Commission on Environmental Quality Chapter 27 of the Texas Water Code (the Injection Well Act) defines an "injection well" as "an artificial excavation or opening in the ground made by digging, boring, drilling, jetting, driving, or some other

355

COMMUNICATING THE 2008 NPDES PERMIT What it means for public transportation  

E-Print Network (OSTI)

Pollution prevention practices ÿStabilization ÿThreatened endangered species/cultural resources impacts #12;What and impaired waters ÿTraining requirements ÿTemporary and Permanent Best management practices (BMP's) ÿ with MPCA ÿ30 days prior to Plan turn in for public projects #12;NPDES Permit Impaired waters and One mile ÿ

Minnesota, University of

356

Permitting of Wind Energy Facilities: A Handbook  

SciTech Connect

This handbook has been written for individuals and groups involved in evaluating wind projects: decision-makers and agency staff at all levels of government, wind developers, interested parties and the public. Its purpose is to help stakeholders make permitting wind facility decisions in a manner which assures necessary environmental protection and responds to public needs.

NWCC Siting Work Group

2002-08-01T23:59:59.000Z

357

UCSF Bicycle Permit Application Transportation Services  

E-Print Network (OSTI)

UCSF Bicycle Permit Application Transportation Services 500 Parnassus Ave, Box 0240 MU- P7 Room 26 ____________________________________________________________________ ____________________________ ______________________________ ____________________________________________________________________ Street City State Zip Home Phone Number Work Phone Number Bicycle Make Color Frame Serial #Bicycle Model 1. Bicycles which are not moved for a period of 7 days or longer will be tagged for removal

Yamamoto, Keith

358

Two photo permits are available: Daily Photographer Permit and Annual Photographer Permit. Daily Photographer Permit is $75 and includes gate admission for up to 15 adults and photographer. To reserve  

E-Print Network (OSTI)

Two photo permits are available: Daily Photographer Permit and Annual Photographer Permit. Daily of the photo session will be $75 plus a $25 processing fee. Your Daily Photo Badge can be picked up the business day before. Any permits purchased on the day of the photo session will be $225 and subject

Netoff, Theoden

359

Enforcing Emissions Trading when Emissions Permits are Bankable  

Science Journals Connector (OSTI)

We propose enforcement strategies for emissions trading programs with bankable emissions permits that guarantee...

John K. Stranlund; Christopher Costello

2005-09-01T23:59:59.000Z

360

Upgrades to meet LANL SF, 121-2011, hazardous waste facility permit requirements  

SciTech Connect

Members of San IIdefonso have requested information from LANL regarding implementation of the revision to LANL's Hazardous Waste Facility Permit (the RCRA Permit). On January 26, 2011, LANL staff from the Waste Disposition Project and the Environmental Protection Division will provide a status update to Pueblo members at the offices of the San IIdefonso Department of Environmental and Cultural Preservation. The Waste Disposition Project presentation will focus on upgrades and improvements to LANL waste management facilities at TA-50 and TA-54. The New Mexico Environment Department issued LANL's revised Hazardous Waste Facility permit on November 30, 2010 with a 30-day implementation period. The Waste Disposition Project manages and operates four of LANL's permitted facilities; the Waste Characterization, Reduction and Repackaging Facility (WCRRF) at TA-SO, and Area G, Area L and the Radioassay and Nondestructive Testing facility (RANT) at TA-54. By implementing a combination of permanent corrective action activities and shorter-term compensatory measures, WDP was able to achieve functional compliance on December 30, 2010 with new Permit requirements at each of our facilities. One component of WOP's mission at LANL is centralized management and disposition of the Laboratory's hazardous and mixed waste. To support this mission objective, WOP has undertaken a project to upgrade our facilities and equipment to achieve fully compliant and efficient waste management operations. Upgrades to processes, equipment and facilities are being designed to provide defense-in-depth beyond the minimum, regulatory requirements where worker safety and protection of the public and the environment are concerned. Upgrades and improvements to enduring waste management facilities and operations are being designed so as not to conflict with future closure activities at Material Disposal Area G and Material Disposal Area L.

French, Sean B [Los Alamos National Laboratory; Johns - Hughes, Kathryn W [Los Alamos National Laboratory

2011-01-21T23:59:59.000Z

Note: This page contains sample records for the topic "manager bugs permit" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Alternative Fuels Data Center: Biofuels Construction and Permitting  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Biofuels Construction Biofuels Construction and Permitting Assistance to someone by E-mail Share Alternative Fuels Data Center: Biofuels Construction and Permitting Assistance on Facebook Tweet about Alternative Fuels Data Center: Biofuels Construction and Permitting Assistance on Twitter Bookmark Alternative Fuels Data Center: Biofuels Construction and Permitting Assistance on Google Bookmark Alternative Fuels Data Center: Biofuels Construction and Permitting Assistance on Delicious Rank Alternative Fuels Data Center: Biofuels Construction and Permitting Assistance on Digg Find More places to share Alternative Fuels Data Center: Biofuels Construction and Permitting Assistance on AddThis.com... More in this section... Federal State Advanced Search All Laws & Incentives Sorted by Type

362

Alternative Fuels Data Center: Hydrogen Fueling Infrastructure Permitting  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Hydrogen Fueling Hydrogen Fueling Infrastructure Permitting and Safety to someone by E-mail Share Alternative Fuels Data Center: Hydrogen Fueling Infrastructure Permitting and Safety on Facebook Tweet about Alternative Fuels Data Center: Hydrogen Fueling Infrastructure Permitting and Safety on Twitter Bookmark Alternative Fuels Data Center: Hydrogen Fueling Infrastructure Permitting and Safety on Google Bookmark Alternative Fuels Data Center: Hydrogen Fueling Infrastructure Permitting and Safety on Delicious Rank Alternative Fuels Data Center: Hydrogen Fueling Infrastructure Permitting and Safety on Digg Find More places to share Alternative Fuels Data Center: Hydrogen Fueling Infrastructure Permitting and Safety on AddThis.com... More in this section... Federal State Advanced Search

363

Water pollution Control Permit Fee Schedules (West Virginia) | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

pollution Control Permit Fee Schedules (West Virginia) pollution Control Permit Fee Schedules (West Virginia) Water pollution Control Permit Fee Schedules (West Virginia) < Back Eligibility Utility Fed. Government Commercial Agricultural Investor-Owned Utility State/Provincial Govt Industrial Construction Municipal/Public Utility Local Government Residential Installer/Contractor Rural Electric Cooperative Tribal Government Low-Income Residential Schools Retail Supplier Institutional Multi-Family Residential Systems Integrator Fuel Distributor Nonprofit General Public/Consumer Transportation Program Info State West Virginia Program Type Fees Siting and Permitting Provider Department of Environmental Protection This rule establishes schedules of permit application fees and annual permit fees for state water pollution control permits and national

364

Hanford Site air operating permit application  

SciTech Connect

The Clean Air Act Amendments of 1990, which amended the Federal Clean Air Act of 1977, required that the US Environmental Protection Agency develop a national Air Operating Permit Program, which in turn would require each state to develop an Air Operating Permit Program to identify all sources of ``regulated`` pollutants. Regulated pollutants include ``criteria`` pollutants (oxides of nitrogen, sulfur oxides, total suspended particulates, carbon monoxide, particulate matter greater than 10 micron, lead) plus 189 other ``Hazardous`` Air Pollutants. The Hanford Site, owned by the US Government and operated by the US Department of Energy, Richland Operations Office, is located in southcentral Washington State and covers 560 square miles of semi-arid shrub and grasslands located just north of the confluence of the Snake and Yakima Rivers with the Columbia River. This land, with restricted public access, provides a buffer for the smaller areas historically used for the production of nuclear materials, waste storage, and waste disposal. About 6 percent of the land area has been disturbed and is actively used. The Hanford Site Air Operating Permit Application consists of more than 1,100 sources and in excess of 300 emission points. Before January 1995, the maintenance and operations contractor and the environmental restoration contractor for the US Department of Energy completed an air emission inventory on the Hanford Site. The inventory has been entered into a database so that the sources and emission points can be tracked and updated information readily can be retrieved. The Hanford Site Air Operating Permit Application contains information current as of April 19, 1995.

NONE

1995-05-01T23:59:59.000Z

365

Broward County Online Solar Permitting (Florida) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Broward County Online Solar Permitting (Florida) Broward County Online Solar Permitting (Florida) Broward County Online Solar Permitting (Florida) < Back Eligibility Commercial Residential Savings Category Solar Buying & Making Electricity Program Info State Florida Program Type Solar/Wind Permitting Standards Provider Unincorporated Broward County Broward County now offers Go SOLAR Online Permitting*, for rooftop solar photovoltaic system permitting. This online permitting system may be used for residential or low commercial properties that are governed by a participating municipality. The online permitting system is designed to provide a one-stop solar permitting process with a single application form, electronic review and approval, and flat fee. Applicants can use this system to choose from pre-approved and pre-engineered solar panel mounting installation designs,

366

Alternative Fuels Data Center: Compressed Natural Gas (CNG) Permit  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Compressed Natural Gas Compressed Natural Gas (CNG) Permit to someone by E-mail Share Alternative Fuels Data Center: Compressed Natural Gas (CNG) Permit on Facebook Tweet about Alternative Fuels Data Center: Compressed Natural Gas (CNG) Permit on Twitter Bookmark Alternative Fuels Data Center: Compressed Natural Gas (CNG) Permit on Google Bookmark Alternative Fuels Data Center: Compressed Natural Gas (CNG) Permit on Delicious Rank Alternative Fuels Data Center: Compressed Natural Gas (CNG) Permit on Digg Find More places to share Alternative Fuels Data Center: Compressed Natural Gas (CNG) Permit on AddThis.com... More in this section... Federal State Advanced Search All Laws & Incentives Sorted by Type Compressed Natural Gas (CNG) Permit Anyone dispensing CNG for use in vehicles must obtain a permit from the

367

Chapter 52 Permits, Registrations, and Prohibitory Rules (Kentucky) |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Chapter 52 Permits, Registrations, and Prohibitory Rules (Kentucky) Chapter 52 Permits, Registrations, and Prohibitory Rules (Kentucky) Chapter 52 Permits, Registrations, and Prohibitory Rules (Kentucky) < Back Eligibility Agricultural Commercial Construction Developer Industrial Installer/Contractor Investor-Owned Utility Municipal/Public Utility Rural Electric Cooperative Utility Program Info State Kentucky Program Type Environmental Regulations Siting and Permitting Provider Kentucky Department for Environmental Protection Kentucky Administrative Regulation Chapter 52, entitled Air Quality: Permits, Registrations, and Prohibitory Rules, is promulgated under the authority of the Division of Air Quality within the Energy and Environment Cabinet's Department for Environmental Protection. Chapter 52 outlines the permitting requirements for all air pollution sources within the state;

368

Petroleum Pipeline Eminent Domain Permit Procedures (Georgia) | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Petroleum Pipeline Eminent Domain Permit Procedures (Georgia) Petroleum Pipeline Eminent Domain Permit Procedures (Georgia) Petroleum Pipeline Eminent Domain Permit Procedures (Georgia) < Back Eligibility Commercial Construction Developer Fuel Distributor General Public/Consumer Industrial Investor-Owned Utility Municipal/Public Utility Utility Program Info State Georgia Program Type Environmental Regulations Siting and Permitting Provider Georgia Department of Natural Resources The Petroleum Pipeline Eminent Domain Permit Procedures serve to protect Georgia's natural and environmental resources by requiring permits be issued by the Director of the Environmental Protection Division prior to any petroleum or petroleum product pipe company acquiring property or interests by eminent domain. Monitoring conditions will be issued with

369

General Conditions Applicable to Water Discharge Permits and Procedures and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

General Conditions Applicable to Water Discharge Permits and General Conditions Applicable to Water Discharge Permits and Procedures and Criteria for Issuing Water Discharge Permits (Connecticut) General Conditions Applicable to Water Discharge Permits and Procedures and Criteria for Issuing Water Discharge Permits (Connecticut) < Back Eligibility Agricultural Commercial Construction Fed. Government Fuel Distributor General Public/Consumer Industrial Installer/Contractor Institutional Investor-Owned Utility Local Government Low-Income Residential Multi-Family Residential Municipal/Public Utility Nonprofit Residential Retail Supplier Rural Electric Cooperative Schools State/Provincial Govt Systems Integrator Transportation Tribal Government Utility Program Info State Connecticut Program Type Siting and Permitting Provider Department of Energy and Environmental Protection

370

Closed BLM Public Lands: Geothermal Leases Not Permitted | OpenEI  

Open Energy Info (EERE)

Closed BLM Public Lands: Geothermal Leases Not Permitted Closed BLM Public Lands: Geothermal Leases Not Permitted Dataset Summary Description The U.S. Bureau of Land Management (BLM) released a series of GIS layers of public lands closed to geothermal leases (obtaining leases is not permitted in these regions). The various types of closed areas included here are: National Monuments, National Recreation Areas, National Conservation Areas, National Wildlife Refuges, National Historic Trails, Wilderness Areas, Wilderness Study Areas, and the Island Park Geothermal Area. The GIS layers were made available upon publication of the BLM's Nationwide Geothermal Resources Leasing Programmatic Environmental Impact Statement (PEIS). Each GIS layer contains: .SBX, .XML, .SHX, .DBF (.XLS), .PRJ, .SBN, and .SHP data.

371

U-144:Juniper Secure Access Input Validation Flaw Permits Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4:Juniper Secure Access Input Validation Flaw Permits 4:Juniper Secure Access Input Validation Flaw Permits Cross-Site Scripting Attacks U-144:Juniper Secure Access Input Validation Flaw Permits Cross-Site Scripting Attacks April 10, 2012 - 7:30am Addthis PROBLEM: A vulnerability was reported in Juniper Secure Access/Instant Virtual Extranet (IVE). A remote user can conduct cross-site scripting attacks. PLATFORM: Version(s): prior to 7.0R9 and 7.1R ABSTRACT: The VPN management interface does not properly filter HTML code from user-supplied input before displaying the input. A remote user can cause arbitrary scripting code to be executed by the target user's browser. reference LINKS: Vendor URL SecurityTracker Alert ID: 1026893 IMPACT ASSESSMENT: High Discussion: The code will originate from the interface and will run in the security

372

V-153: Symantec Brightmail Gateway Input Validation Flaw Permits Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Symantec Brightmail Gateway Input Validation Flaw Permits 3: Symantec Brightmail Gateway Input Validation Flaw Permits Cross-Site Scripting Attacks V-153: Symantec Brightmail Gateway Input Validation Flaw Permits Cross-Site Scripting Attacks May 10, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Symantec Brightmail Gateway PLATFORM: The vulnerabilities are reported in versions prior to 9.5.x ABSTRACT: Symantec's Brightmail Gateway management console is susceptible to stored cross-site scripting (XSS) issues found in some of the administrative interface pages. REFERENCE LINKS: Security Tracker Alert ID: 1028530 Symantec Security Advisory CVE-2013-1611 IMPACT ASSESSMENT: Medium DISCUSSION: The administrative interface does not properly filter HTML code from user-supplied input before displaying the input. A remote user can cause

373

Microsoft Word - Final Class 2 Permit Modification Request TRUPACT III.doc  

NLE Websites -- All DOE Office Websites (Extended Search)

January 10, 2011 January 10, 2011 Mr. James Bearzi. Chief Hazardous Waste Bureau New Mexico Environment Department 2905 Rodeo Park Drive East, Building 1 Santa Fe, New Mexico 87505-6303 Subject: Notification of a Class 2 Permit Modification to Permit Number: NM4890139088-TSDF Dear Mr. Bearzi: Enclosed is a Class 2 Permit Modification Request to: * Add TRUPACT-II I and Standard Large Box 2 * Revise Area of Contact-Handled Bay We certify under penalty of law that this document and the enclosure were prepared under our direction or supervision in accordance with a system designed to assure that qualified personnel properly gather and evaluate the information sUbmitted. Based on our inquiry of the person or persons who manage the system, or those persons directly responsible for

374

Resource Conservation and Recovery Act: Part B, Permit application [for the Waste Isolation Pilot Plant (WIPP)]. Volume 1, Revison 1.0  

SciTech Connect

This report contains information related to the permit application for the WIPP facility. Information is presented on solid waste management; personnel safety; emergency plans; site characterization; applicable regulations; decommissioning; and ground water monitoring requirements.

Not Available

1992-03-01T23:59:59.000Z

375

Resource Conservation and Recovery Act Part B permit application [for the Waste Isolation Pilot Plant (WIPP)]. Volume 7: Revision 1.0  

SciTech Connect

This permit application (Vol. 7) for the WIPP facility contains appendices related to the following information: Ground water protection; personnel; solid waste management; and memorandums concerning environmental protection standards.

Not Available

1992-07-01T23:59:59.000Z

376

Permit Types, Tiers, and Parking Privileges 2012-2013 Alr 07-01-2012 1  

E-Print Network (OSTI)

loading permit from booth. M (motorcycle permit) Motorcycle Spaces ME (Maple Avenue Complex) Perimeter

377

Alternative Fuels Data Center: Compressed Natural Gas (CNG) Dealer Permit  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Compressed Natural Gas Compressed Natural Gas (CNG) Dealer Permit to someone by E-mail Share Alternative Fuels Data Center: Compressed Natural Gas (CNG) Dealer Permit on Facebook Tweet about Alternative Fuels Data Center: Compressed Natural Gas (CNG) Dealer Permit on Twitter Bookmark Alternative Fuels Data Center: Compressed Natural Gas (CNG) Dealer Permit on Google Bookmark Alternative Fuels Data Center: Compressed Natural Gas (CNG) Dealer Permit on Delicious Rank Alternative Fuels Data Center: Compressed Natural Gas (CNG) Dealer Permit on Digg Find More places to share Alternative Fuels Data Center: Compressed Natural Gas (CNG) Dealer Permit on AddThis.com... More in this section... Federal State Advanced Search All Laws & Incentives Sorted by Type Compressed Natural Gas (CNG) Dealer Permit

378

Solar and Wind Permitting Standards | Open Energy Information  

Open Energy Info (EERE)

Permitting Standards Permitting Standards Jump to: navigation, search Permitting standards can facilitate the installation of wind and solar energy systems by specifying the conditions and fees involved in project development. Some local governments have adopted simplified or expedited permitting standards for wind and/or solar. “Top-of-the-stack” or fast-track permitting saves system owners and project developers time and money. Some states have established maximum fees that local governments may charge for a permit for a solar or wind energy system. In addition, some states have developed (or have supported the development of) model wind ordinances for use by local governments. [1] Contents 1 Solar/Wind Permitting Standards Incentives 2 References Solar/Wind Permitting Standards Incentives

379

File:UtilityPermitFranchiseApp.pdf | Open Energy Information  

Open Energy Info (EERE)

UtilityPermitFranchiseApp.pdf Jump to: navigation, search File File history File usage Metadata File:UtilityPermitFranchiseApp.pdf Size of this preview: 463 599 pixels. Other...

380

DOE to Hold Public Information Meetings on Permit Modifications  

NLE Websites -- All DOE Office Websites (Extended Search)

Meetings On Permit Modifications CARLSBAD, N.M., May 8, 2001 - The public is invited to comment on two proposed modifications to the Hazardous Waste Facility Permit for the Waste...

Note: This page contains sample records for the topic "manager bugs permit" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Idaho Dredge and Fill Permits Webpage | Open Energy Information  

Open Energy Info (EERE)

Fill Permits Webpage Jump to: navigation, search OpenEI Reference LibraryAdd to library Web Site: Idaho Dredge and Fill Permits Webpage Author Idaho Department of Environmental...

382

T-720: Blue Coat Director HTTP Trace Processing Flaw Permits...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Blue Coat Director HTTP Trace Processing Flaw Permits Cross-Site Scripting Attacks T-720: Blue Coat Director HTTP Trace Processing Flaw Permits Cross-Site Scripting Attacks...

383

WAC - 173-401 Operating Permit Regulation | Open Energy Information  

Open Energy Info (EERE)

Operating Permit Regulation Jump to: navigation, search OpenEI Reference LibraryAdd to library Legal Document- RegulationRegulation: WAC - 173-401 Operating Permit RegulationLegal...

384

EPA Citizens Guide to Hazardous Waste Permitting Process | Open...  

Open Energy Info (EERE)

Citizens Guide to Hazardous Waste Permitting Process Jump to: navigation, search OpenEI Reference LibraryAdd to library Web Site: EPA Citizens Guide to Hazardous Waste Permitting...

385

Hazardous Waste Facility Permit Fact Sheet | Open Energy Information  

Open Energy Info (EERE)

search OpenEI Reference LibraryAdd to library Legal Document- OtherOther: Hazardous Waste Facility Permit Fact SheetLegal Abstract Hazardous Waste Facility Permit Fact Sheet,...

386

Hazardous Waste Facility Permit Public Comments to Community...  

NLE Websites -- All DOE Office Websites (Extended Search)

covered by the permit. Please use another word for "promulgated," such as "created." This section should state that it is a ten-year permit, set to expire in November 2020. It...

387

Property:AirQualityPermitProcess | Open Energy Information  

Open Energy Info (EERE)

"AirQualityPermitProcess" Showing 1 page using this property. R RAPIDOverviewGeothermalAir QualityAlaska + The Air Permit process in Alaska is divided into two divisions: Title...

388

Alternative Fuels Data Center: Fueling Station Air Quality Permit Exemption  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Fueling Station Air Fueling Station Air Quality Permit Exemption to someone by E-mail Share Alternative Fuels Data Center: Fueling Station Air Quality Permit Exemption on Facebook Tweet about Alternative Fuels Data Center: Fueling Station Air Quality Permit Exemption on Twitter Bookmark Alternative Fuels Data Center: Fueling Station Air Quality Permit Exemption on Google Bookmark Alternative Fuels Data Center: Fueling Station Air Quality Permit Exemption on Delicious Rank Alternative Fuels Data Center: Fueling Station Air Quality Permit Exemption on Digg Find More places to share Alternative Fuels Data Center: Fueling Station Air Quality Permit Exemption on AddThis.com... More in this section... Federal State Advanced Search All Laws & Incentives Sorted by Type Fueling Station Air Quality Permit Exemption

389

Idaho Application for Water Permit (DWR Form 202) | Open Energy...  

Open Energy Info (EERE)

Idaho Application for Water Permit (DWR Form 202) Jump to: navigation, search OpenEI Reference LibraryAdd to library Form: Idaho Application for Water Permit (DWR Form 202)...

390

On-Site Wastewater Treatment Systems: Selecting and Permitting (Spanish)  

E-Print Network (OSTI)

This publication explains how to select and obtain a permit for an on-site wastewater treatment system in Texas....

Lesikar, Bruce J.

2005-04-30T23:59:59.000Z

391

Biotechnology Regulatory Services public data file (permits, notifications,  

NLE Websites -- All DOE Office Websites (Extended Search)

Biotechnology Regulatory Services public data file (permits, notifications, Biotechnology Regulatory Services public data file (permits, notifications, and petitions) Agriculture Community Menu DATA APPS EVENTS DEVELOPER STATISTICS COLLABORATE ABOUT Agriculture You are here Data.gov » Communities » Agriculture » Data Biotechnology Regulatory Services public data file (permits, notifications, and petitions) Dataset Summary Description Public information on BRS applications for genetically engineered permits, notifications, and petitions. Tags {BRS,Permits,Notifications,Petitions,GE,"Agronomic Properties","Bacterial Resistance","Fungal Resistance","Herbicide Tolerance","Insect Resistance","Marker Gene","Nematode Resistance","Product Quality","Virus Resistance",Institution,Article,Phenotypes,"Genotypes "}

392

Hazardous Waste Transporter Permits (Connecticut) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Hazardous Waste Transporter Permits (Connecticut) Hazardous Waste Transporter Permits (Connecticut) Hazardous Waste Transporter Permits (Connecticut) < Back Eligibility Agricultural Commercial Construction Fed. Government Fuel Distributor General Public/Consumer Industrial Installer/Contractor Institutional Investor-Owned Utility Local Government Low-Income Residential Multi-Family Residential Municipal/Public Utility Nonprofit Residential Retail Supplier Rural Electric Cooperative Schools State/Provincial Govt Systems Integrator Transportation Tribal Government Utility Program Info State Connecticut Program Type Siting and Permitting Provider Department of Energy and Environmental Protection Transportation of hazardous wastes into or through the State of Connecticut requires a permit. Some exceptions apply. The regulations provide

393

City of Portland - Streamlined Building Permits for Residential Solar  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Commercial Commercial Residential Savings Category Solar Buying & Making Electricity Heating & Cooling Water Heating Program Info State Oregon Program Type Solar/Wind Permitting Standards Provider City of Portland The City of Portland's Bureau of Development Services (BDS) developed an electronic permitting process for residential solar energy system installations. With this streamlined, expedited process, solar contractors can submit the project plans and permit application online for residential installations. In order to file the online application, the contractor must first be trained. The City of Portland has staff at the permitting desk trained as solar experts to assist solar contractors who need help filing their permits in person. This process has a turnaround time of

394

Storm Water Discharge Permits (Wisconsin) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Storm Water Discharge Permits (Wisconsin) Storm Water Discharge Permits (Wisconsin) Storm Water Discharge Permits (Wisconsin) < Back Eligibility Agricultural Commercial Construction Developer Fed. Government Fuel Distributor General Public/Consumer Industrial Installer/Contractor Institutional Investor-Owned Utility Local Government Low-Income Residential Multi-Family Residential Municipal/Public Utility Nonprofit Residential Retail Supplier Rural Electric Cooperative Schools State/Provincial Govt Systems Integrator Transportation Tribal Government Utility Program Info Start Date 08/2004 State Wisconsin Program Type Siting and Permitting Provider Department of Natural Resources Wisconsin's storm water runoff regulations include permitting requirements for construction sites and industrial facilities, including those

395

City and County of Denver - Solar Panel Permitting (Colorado) | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Solar Panel Permitting (Colorado) Solar Panel Permitting (Colorado) City and County of Denver - Solar Panel Permitting (Colorado) < Back Eligibility Commercial Construction General Public/Consumer Industrial Low-Income Residential Multi-Family Residential Residential Savings Category Solar Buying & Making Electricity Heating & Cooling Water Heating Program Info State Colorado Program Type Solar/Wind Permitting Standards Provider Department of Development Services Construction, Electrical, Plumbing and Zoning Permits* are required for Photovoltaic (PV) systems installed in the city of Denver. Denver provides same day permit review for most solar panel projects. More complex engineering projects may still be required to go through the Plan Review process. To obtain Zoning Permits for flush mounted solar panels, applicants must

396

Solar/Wind Permitting Standards | Open Energy Information  

Open Energy Info (EERE)

Permitting Standards Permitting Standards < Solar Jump to: navigation, search Permitting standards can facilitate the installation of wind and solar energy systems by specifying the conditions and fees involved in project development. Some local governments have adopted simplified or expedited permitting standards for wind and/or solar. “Top-of-the-stack” or fast-track permitting saves system owners and project developers time and money. Some states have established maximum fees that local governments may charge for a permit for a solar or wind energy system. In addition, some states have developed (or have supported the development of) model wind ordinances for use by local governments. [1] Solar/Wind Permitting Standards Incentives CSV (rows 1 - 55) Incentive Incentive Type Place Applicable Sector Eligible Technologies Active

397

GRR/Section 6 - Construction Permits Overview | Open Energy Information  

Open Energy Info (EERE)

6 - Construction Permits Overview 6 - Construction Permits Overview < GRR Jump to: navigation, search GRR-logo.png GEOTHERMAL REGULATORY ROADMAP Roadmap Home Roadmap Help List of Sections Section 6 - Construction Permits Overview 06 - ConstructionPermitsOverview.pdf Click to View Fullscreen Triggers None specified Click "Edit With Form" above to add content 06 - ConstructionPermitsOverview.pdf 06 - ConstructionPermitsOverview.pdf Error creating thumbnail: Page number not in range. Error creating thumbnail: Page number not in range. Flowchart Narrative Constructing a geothermal power plant requires numerous permits from Federal, state, and local governments, related to transporting construction materials, encroaching upon Federal and state right-of-ways, demolishing existing structures and building new structures.

398

Transmission/Permitting Atlas/State Data | Open Energy Information  

Open Energy Info (EERE)

Transmission/Permitting Atlas/State Data Transmission/Permitting Atlas/State Data < Transmission‎ | Permitting Atlas Jump to: navigation, search PermittingAtlasHeader.png Roadmap Compare States General Transmission Dashboard Permitting Atlas Compare States Arizona California Colorado Idaho Montana Nevada New Mexico Oregon Utah Washington Wyoming Resource Library NEPA Database State State Siting Act State Preemptive Authority Siting/Permitting Entities Permit Processing Timeframe Arizona None If TLSC finds compliance with local land use unreasonable or unfeasible, then the TLSC may grant a certificate Arizona Corporation Commission (ACC); Transmission Line Siting Committee (TLSC) 210-240 Days California Public Utilities Code Section 1001 Local jurisdictions are preempted from regulating electric power line projects California Public Utilities Commission (CPUC) 18 months

399

Solar and Wind Permitting Laws | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Permitting Laws Permitting Laws Solar and Wind Permitting Laws < Back Eligibility Commercial Industrial Nonprofit Residential Schools Savings Category Solar Buying & Making Electricity Wind Program Info State New Jersey Program Type Solar/Wind Permitting Standards Provider New Jersey Department of Community Affairs New Jersey has enacted three separate laws addressing local permitting practices for solar and wind energy facilities. The first deals with solar and wind facilities located in industrial-zoned districts; the second with wind energy devices sited on piers; and the third addresses permitting standards small wind energy devices in general. All three are described below. '''Solar and Wind as Permitted Uses in Industrial Zones''' In March 2009 the state enacted legislation (A.B. 2550) defining facilities

400

Natural Resource Management Plan Update  

E-Print Network (OSTI)

Natural Resource Management Plan Update Tim Green Environmental Protection Division Community. Cultural Resources) · Focus on gaining better understanding of site resources · Began or continued managing · Monitoring layers · Cultural Resources ­ WW I, WW II, CCC GIS used for planning ­ NSLS II, LISF, Permits, etc

Homes, Christopher C.

Note: This page contains sample records for the topic "manager bugs permit" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Office of Design and Construction Architecture/Engineering/Construction Management  

E-Print Network (OSTI)

to construct the Orchestra Pit, and above-grade masonry walls will continue through winter, as weather permits 2011 Project Manager: Tim Burns, Sr. Project Manager - Construction Comments: This is part two

Moore, Paul A.

402

Livestock Waste Management Act (Nebraska) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Livestock Waste Management Act (Nebraska) Livestock Waste Management Act (Nebraska) Livestock Waste Management Act (Nebraska) < Back Eligibility Agricultural Commercial Construction Fed. Government Fuel Distributor General Public/Consumer Industrial Installer/Contractor Institutional Investor-Owned Utility Local Government Low-Income Residential Multi-Family Residential Municipal/Public Utility Nonprofit Residential Retail Supplier Rural Electric Cooperative Schools State/Provincial Govt Systems Integrator Transportation Tribal Government Utility Program Info State Nebraska Program Type Siting and Permitting Provider Environmental Quality This statute establishes the animal feeding operation permitting program and gives the Department of Environmental Quality the authority to administer the state permitting program. Permits are required for the

403

Resource Conservation and Recovery Act, Part B permit application [for the Waste Isolation Pilot Plant (WIPP)]. Volume 1, Revision 3  

SciTech Connect

This volume includes the following chapters: Waste Isolation Pilot Plant RCRA A permit application; facility description; waste analysis plan; groundwater monitoring; procedures to prevent hazards; RCRA contingency plan; personnel training; corrective action for solid waste management units; and other Federal laws.

Not Available

1993-03-01T23:59:59.000Z

404

Presidential Permits and Export Authorizations - Frequently Asked Questions  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Permits and Export Permits and Export Authorizations - Frequently Asked Questions Presidential Permits and Export Authorizations - Frequently Asked Questions Presidential Permits Export Authorizations Self Certifications Annual Reports Presidential Permits What are they? Permits for the construction, connection, operation and/or maintenance of electric transmission lines that cross the U.S. international border. What are the criteria? Two primary criteria are used to determine if a proposed project is consistent with the public interest. 1. DOE considers the impact the proposed project would have on the operating reliability of the U.S. electric power supply. 2. DOE must comply with the National Environmental Policy Act of 1969 (NEPA), which requires DOE to consider the environmental consequences

405

Request for Information on Permitting of Transmission Lines: Federal  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Request for Information on Permitting of Transmission Lines: Request for Information on Permitting of Transmission Lines: Federal Register Notice Volume 77, No. 38 - Feb. 27, 2012 Request for Information on Permitting of Transmission Lines: Federal Register Notice Volume 77, No. 38 - Feb. 27, 2012 The Department of Energy's Office of Electricity Delivery and Energy Reliability requested information on questions related to permitting of transmission lines. Infrastructure projects - such as high voltage, long distance, electric transmission facilities - often involve multiple Federal, State, local and Tribal authorizations and are subject to a wide array of processes and procedural requirements in order to obtain all necessary permits and other authorizations. Delays in securing required statutory reviews, permits, and consultations can threaten the completion

406

Presidential Permit Holders - Annual Reports | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Permit Holders - Permit Holders - Annual Reports Presidential Permit Holders - Annual Reports Presidential permit holders are responsible for reporting the gross amount electric energy which flows into and out of the United States over the permitted international transmission facility regardless if the energy is wheeled to or for another entity. For example, utility A receives a Presidential permit for a single international transmission line across the U.S.-Canadian border. During the calendar year just completed, 300,000,000 kilowatt-hours (kwh) are imported from Canada across this line. Utility A arranged for the purchase of 200,000,000 kwh for its own use and wheeled 100,000,000 kwh to neighboring utility B. Utility A must report 300,000,000 kwh of imports over the international

407

Environmental assessment for presidential permit applications for Baja  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Environmental assessment for presidential permit applications for Environmental assessment for presidential permit applications for Baja California Power Inc and Sempra Energy Resources PP-234 and PP-235 Environmental assessment for presidential permit applications for Baja California Power Inc and Sempra Energy Resources PP-234 and PP-235 Environmental assessment for presidential permit applications for Baja California Power Inc and Sempra Energy Resources. December 2001 PP-234 and PP-235 Enviornmental assessment for presidential permit applications for Baja California Power Inc and Sempra Energy Resources PP-234 and PP-235 More Documents & Publications DOE Environmental Assessment EA-1391 for Presidential Permit Applications for Baja California Power Inc and Sempra Energy Resources PP-234 and PP-235: Finding of No Significant Impact

408

Coastal Permit Program Rules (New Jersey) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Coastal Permit Program Rules (New Jersey) Coastal Permit Program Rules (New Jersey) Coastal Permit Program Rules (New Jersey) < Back Eligibility Utility Fed. Government Commercial Agricultural Investor-Owned Utility State/Provincial Govt Industrial Construction Municipal/Public Utility Local Government Residential Installer/Contractor Rural Electric Cooperative Tribal Government Low-Income Residential Schools Retail Supplier Institutional Multi-Family Residential Systems Integrator Fuel Distributor Nonprofit General Public/Consumer Transportation Savings Category Alternative Fuel Vehicles Hydrogen & Fuel Cells Buying & Making Electricity Water Home Weatherization Solar Wind Program Info State New Jersey Program Type Siting and Permitting Provider Department of Environmental Protection The Coastal Permit Program Rules provide the processes for permit reviews.

409

DOE Seeking Information on Transmission Line Permitting | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Seeking Information on Transmission Line Permitting Seeking Information on Transmission Line Permitting DOE Seeking Information on Transmission Line Permitting February 27, 2012 - 3:25pm Addthis The Department of Energy's Office of Electricity Delivery and Energy Reliability is seeking information on the questions related to permitting of transmission lines. Infrastructure projects - such as high voltage, long distance, electric transmission facilities - often involve multiple Federal, State, local, and Tribal authorizations and are subject to a wide array of processes and procedural requirements in order to obtain all necessary permits and other authorizations. Delays in securing required statutory reviews, permits, and consultations can threaten the completion projects of national and regional significance. This Request for

410

Orange County - Wind Permitting Standards | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Orange County - Wind Permitting Standards Orange County - Wind Permitting Standards Orange County - Wind Permitting Standards < Back Eligibility Agricultural Commercial Residential Savings Category Wind Buying & Making Electricity Program Info State California Program Type Solar/Wind Permitting Standards Provider OC Planning In December 2010, the County of Orange Board of Supervisors adopted small wind performance and development standards (Ord. No. 10-020) in order to promote distributed generation systems in non-urbanized areas (as defined in Government Code Section 65944(d)(2)) within the unincorporated territory. Permitting standards are for systems of 50 kW or less per customer site, for which the energy is primarily for on-site consumption. Height: For systems 45 feet tall or less, a use permit must be approved by

411

Expedited Permitting of Grid-Scale Wind Energy Development (Maine) |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Expedited Permitting of Grid-Scale Wind Energy Development (Maine) Expedited Permitting of Grid-Scale Wind Energy Development (Maine) Expedited Permitting of Grid-Scale Wind Energy Development (Maine) < Back Eligibility Utility Fed. Government Commercial Agricultural Investor-Owned Utility State/Provincial Govt Industrial Construction Municipal/Public Utility Local Government Residential Installer/Contractor Rural Electric Cooperative Tribal Government Low-Income Residential Schools Retail Supplier Institutional Multi-Family Residential Systems Integrator Fuel Distributor Nonprofit General Public/Consumer Transportation Savings Category Wind Buying & Making Electricity Program Info State Maine Program Type Siting and Permitting Maine's Expedited Permitting of Grid-Scale Wind Energy Development statue provides an expedited permitting pathway for proposed wind developments in

412

Request for Information on Permitting of Transmission Lines: Federal  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Request for Information on Permitting of Transmission Lines: Request for Information on Permitting of Transmission Lines: Federal Register Notice Volume 77, No. 38 - Feb. 27, 2012 Request for Information on Permitting of Transmission Lines: Federal Register Notice Volume 77, No. 38 - Feb. 27, 2012 The Department of Energy's Office of Electricity Delivery and Energy Reliability requested information on questions related to permitting of transmission lines. Infrastructure projects - such as high voltage, long distance, electric transmission facilities - often involve multiple Federal, State, local and Tribal authorizations and are subject to a wide array of processes and procedural requirements in order to obtain all necessary permits and other authorizations. Delays in securing required statutory reviews, permits, and consultations can threaten the completion

413

Chapter 38 Hazardous Waste Permitting Process (Kentucky) | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8 Hazardous Waste Permitting Process (Kentucky) 8 Hazardous Waste Permitting Process (Kentucky) Chapter 38 Hazardous Waste Permitting Process (Kentucky) < Back Eligibility Agricultural Commercial Construction Developer Fed. Government Industrial Institutional Investor-Owned Utility Local Government Municipal/Public Utility Rural Electric Cooperative Schools State/Provincial Govt Transportation Tribal Government Utility Savings Category Alternative Fuel Vehicles Hydrogen & Fuel Cells Program Info State Kentucky Program Type Environmental Regulations Provider Department for Environmental Protection This administrative regulation establishes the general provisions for storage, treatment, recycling, or disposal of hazardous waste. It provides information about permits and specific requirements for containers, tanks,

414

Local Option - Building Permit Fee Waivers for Renewable Energy Projects  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Local Option - Building Permit Fee Waivers for Renewable Energy Local Option - Building Permit Fee Waivers for Renewable Energy Projects (Connecticut) Local Option - Building Permit Fee Waivers for Renewable Energy Projects (Connecticut) < Back Eligibility Agricultural Commercial Construction Fed. Government General Public/Consumer Industrial Installer/Contractor Institutional Local Government Low-Income Residential Multi-Family Residential Nonprofit Residential Schools State Government Tribal Government Savings Category Bioenergy Alternative Fuel Vehicles Hydrogen & Fuel Cells Water Buying & Making Electricity Solar Home Weatherization Wind Program Info State Connecticut Program Type Solar/Wind Permitting Standards Provider Department of Energy and Environmental Protection As of July 2011, Connecticut authorizes municipalities to pass a local

415

Phase III - Permitting and Initial Development | Open Energy Information  

Open Energy Info (EERE)

III - Permitting and Initial Development III - Permitting and Initial Development Jump to: navigation, search GEOTHERMAL ENERGYGeothermal Home GEA Development Phase III: Permitting and Initial Development GEA Development Phases The Geothermal Energy Association's (GEA) Geothermal Reporting Terms and Definitions are a guideline for geothermal developers to use when submitting geothermal resource development information to GEA for public dissemination in its annual US Geothermal Power Production and Development Update. GEA's Geothermal Reporting Terms and Definitions serve to increase the consistency, accuracy, and reliability of industry information presented in the development updates. Phase I - Resource Procurement and Identification Phase II - Resource Exploration and Confirmation Phase III - Permitting and Initial Development

416

Alteration of Terrain Permits (New Hampshire) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Alteration of Terrain Permits (New Hampshire) Alteration of Terrain Permits (New Hampshire) Alteration of Terrain Permits (New Hampshire) < Back Eligibility Agricultural Commercial Construction Fed. Government Fuel Distributor General Public/Consumer Industrial Installer/Contractor Institutional Investor-Owned Utility Local Government Low-Income Residential Multi-Family Residential Municipal/Public Utility Nonprofit Residential Retail Supplier Rural Electric Cooperative Schools State/Provincial Govt Systems Integrator Transportation Tribal Government Utility Savings Category Alternative Fuel Vehicles Hydrogen & Fuel Cells Buying & Making Electricity Water Home Weatherization Solar Wind Program Info State New Hampshire Program Type Siting and Permitting Provider NH Department of Environmental Services Alteration of Terrain Bureau

417

Frederick County (Maryland) Department of Permits and Inspections (FCDPI)  

Energy.gov (U.S. Department of Energy (DOE))

The Frederick County (Maryland) Department of Permits and Inspections (FCDPI) is currently reviewing two proposed amendments to the 2012 International Energy Conservation Code (IECC), copies of...

418

Colorado - Access Permit Pre-Design Checklist | Open Energy Informatio...  

Open Energy Info (EERE)

Checklist Jump to: navigation, search OpenEI Reference LibraryAdd to library General: Colorado - Access Permit Pre-Design Checklist Author Colorado Department of Transportation...

419

ARM 12-14-101 - Commercial Use Permitting Requirements: Definitions...  

Open Energy Info (EERE)

permitting requirements for land within the jurisdiction of the Montana Department of Fish, Wildlife and Parks. Published NA Year Signed or Took Effect 2009 Legal Citation ARM...

420

Alaska Sample Special Area Permit | Open Energy Information  

Open Energy Info (EERE)

to library General: Alaska Sample Special Area Permit Author Alaska Department of Fish and Game Published Division of Habitat, 122012 DOI Not Provided Check for DOI...

Note: This page contains sample records for the topic "manager bugs permit" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

50 CFR 13 - General Permit Procedures | Open Energy Information  

Open Energy Info (EERE)

denial, suspension, revocation, and general administration of permits issued by the Fish and Wildlife Service. Published NA Year Signed or Took Effect 2014 Legal Citation 50...

422

Application for Presidential Permit OE Docket No. PP-371 Northern...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Conservation Law Foundation, Appalachian Mountain Club, and Society for the Protection of New Hampshire Forests Application for Presidential Permit OE Docket No. PP-371 Northern...

423

Application for Presidential Permit OE Docket No. PP-400 TDI...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Project - Comments and Motion to Intervene of Conservation Law Foundation Application for Presidential Permit OE Docket No. PP-400 TDI-NE - New England Clean Power Link Project -...

424

CDOT - Utility/Special Use Permit Application | Open Energy Informatio...  

Open Energy Info (EERE)

to the CDOT UtilitySpecial Use Permit application. Author Colorado Department of Transportation Published Colorado Department of Transportation, 2007 DOI Not Provided Check for...

425

CDOT - State Highway Access Permit Application | Open Energy...  

Open Energy Info (EERE)

CDOT - State Highway Access Permit Application Author Colorado Department of Transportation Published Colorado Department of Transportation, 2010 DOI Not Provided Check for...

426

CDOT - Permit Standard Provisions Example | Open Energy Information  

Open Energy Info (EERE)

General: CDOT - Permit Standard Provisions Example Author Colorado Department of Transportation Published Colorado Department of Transportation, 2006 DOI Not Provided Check for...

427

Innovation and Success in Solar Permitting and Inspections  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Webinar 2: Innovation and Success in Solar Permitting and Inspections Transcript June 26, 2013 Speaker: Courtney Kendal Slide 1: Good afternoon. My name is Courtney Kendall,...

428

EPA - Construction General Permit webpage | Open Energy Information  

Open Energy Info (EERE)

webpage Jump to: navigation, search OpenEI Reference LibraryAdd to library Web Site: EPA - Construction General Permit webpage Abstract This is the Environmental Protection...

429

CDWR Well Permitting Forms and Associated Documents | Open Energy...  

Open Energy Info (EERE)

Associated Documents Jump to: navigation, search OpenEI Reference LibraryAdd to library Web Site: CDWR Well Permitting Forms and Associated Documents Abstract This webpage...

430

BLM - Information on Cultural Resource Use Permits webpage |...  

Open Energy Info (EERE)

Jump to: navigation, search OpenEI Reference LibraryAdd to library Web Site: BLM - Information on Cultural Resource Use Permits webpage Abstract This webpage provides information...

431

Application for Presidential Permit OE Docket No. PP-387 Soule...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

maintain electric transmission facilities at the U.S. - Canada Border. SOULE RIVER HYDROELECTRIC PROJECT More Documents & Publications Application for Presidential Permit OE...

432

Application for Presidential Permit OE Docket No. PP-387 Soule...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Correction Application for Presidential Permit OE Docket No. PP-387 Soule River Hydroelectric Project; Federal Register Notice, Volume 78, No. 154 - Aug. 9, 2013: Correction...

433

Application for Presidential Permit OE Docket No. PP-387 Soule...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

July 30, 2013 Application for Presidential Permit OE Docket No. PP-387 Soule River Hydroelectric Project: Federal Register Notice, Volume 78, No. 146 - July 30, 2013 Application...

434

Regulatory and Permitting Information Desktop Toolkit (Fact Sheet)  

SciTech Connect

Overview of DOE's Regulatory and Permitting Information Desktop (RAPID) Toolkit project, providing information on where to go to view documents and who to contact to get involved.

Young, K.

2014-04-01T23:59:59.000Z

435

Property:ExplorationPermit-PreDrilling | Open Energy Information  

Open Energy Info (EERE)

Permit from the Hawaii Department of Land and Natural Resources Engineering Division to conduct any exploration activity on state or reserved lands for evidence of geothermal...

436

Hawaii Guidelines for NPDES Notice of General Permit Coverage...  

Open Energy Info (EERE)

an overview of the NPDES General Permit process. Author State of Hawaii Department of Health Published State of Hawaii, 92004 DOI Not Provided Check for DOI availability: http:...

437

Hawaii Application for Community Noise Permit (DOH Form CNP)...  

Open Energy Info (EERE)

Application for Community Noise Permit Organization State of Hawaii Department of Health Published Publisher Not Provided, 012008 DOI Not Provided Check for DOI availability:...

438

Hawaii Guide for Filing Community Noise Permit Applications ...  

Open Energy Info (EERE)

permit applications for construction activities. Author State of Hawaii Department of Health Published State of Hawaii, 2008 DOI Not Provided Check for DOI availability: http:...

439

Hawaii EIS-EA Permit Packet | Open Energy Information  

Open Energy Info (EERE)

PacketPermittingRegulatory GuidanceSupplemental Material Authors Hawaii Department of Health and Office of Environmental Quality Control Published State of Hawaii, 72014 DOI Not...

440

Appendix F. Permits AnnualSiteEnvironmentalRepor  

E-Print Network (OSTI)

/17/2003 DOE DOE BWXT CAA Depleted Uranium Forming and Heat Transfer (Construction Permit) 950266P 11/4/1998 7

Pennycook, Steve

Note: This page contains sample records for the topic "manager bugs permit" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Request for Information on Improving Performance of Federal Permitting...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

of Infrastructure Projects: Federal Register Notice Volume 78, No. 168 - August 29, 2013 Request for Information on Improving Performance of Federal Permitting and Review of...

442

Application for Presidential Permit OE Docket No. PP-299 Sea...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

99 Sea Breeze Pacific Regional Transmission System, INC Application for Presidential Permit OE Docket No. PP-299 Sea Breeze Pacific Regional Transmission System, INC TBDApplication...

443

WSDE Air Operating Permits Register Entries webpage | Open Energy...  

Open Energy Info (EERE)

takes on a facility's permit application. Author Washington State Department of Ecology Published Washington State Department of Ecology, Date Not Provided DOI Not Provided...

444

File:CDPHE Industrial Individual Wastewater Discharge Permit...  

Open Energy Info (EERE)

Industrial Individual Wastewater Discharge Permit Application.pdf Jump to: navigation, search File File history File usage Metadata File:CDPHE Industrial Individual Wastewater...

445

Nevada Sample Application for Permit Under Utility Environmental...  

Open Energy Info (EERE)

Collins. Initial Application of K Road Moapa Solar, LLC for a Permit to Construct A Transmission Line Under the Utility Environmental Protection Act. Retrieved from "http:...

446

Property:AirQualityPermitAgency | Open Energy Information  

Open Energy Info (EERE)

"AirQualityPermitAgency" Showing 1 page using this property. R RAPIDOverviewGeothermalAir QualityAlaska + Alaska Department of Environmental Conservation + Retrieved from...

447

UPDES Storm Water Permits: General Construction Website | Open...  

Open Energy Info (EERE)

Construction Website Jump to: navigation, search OpenEI Reference LibraryAdd to library Web Site: UPDES Storm Water Permits: General Construction Website Abstract this website...

448

Air Permit Program Information Page | Open Energy Information  

Open Energy Info (EERE)

Web Site: Air Permit Program Information Page Author Division of Air Quality Published Publisher Not Provided, Date Not Provided DOI Not Provided Check for DOI availability: http:...

449

Title V Operation Permit Application Webpage | Open Energy Information  

Open Energy Info (EERE)

Application Webpage Jump to: navigation, search OpenEI Reference LibraryAdd to library Web Site: Title V Operation Permit Application Webpage Author Division of Air Quality...

450

Air Permit Program Application Forms | Open Energy Information  

Open Energy Info (EERE)

Web Site: Air Permit Program Application Forms Author Division of Air Quality Published Publisher Not Provided, Date Not Provided DOI Not Provided Check for DOI availability:...

451

Idaho Permit to Construct Application Webpage | Open Energy Informatio...  

Open Energy Info (EERE)

Application Webpage Jump to: navigation, search OpenEI Reference LibraryAdd to library Web Site: Idaho Permit to Construct Application Webpage Abstract This webpage provides access...

452

Alaska Division of Water Permit Fees | Open Energy Information  

Open Energy Info (EERE)

Web Site: Alaska Division of Water Permit Fees Author Alaska Division of Water Published Publisher Not Provided, Date Not Provided DOI Not Provided Check for DOI availability:...

453

Colorado Construction Air Permit Application | Open Energy Information  

Open Energy Info (EERE)

for a construction permit for construction of a commercial or industrial source of air pollution. Form Type ApplicationNotice Form Topic Air Pollution Control Division -...

454

Hawaii Air Pollution Control Permits Webpage | Open Energy Information  

Open Energy Info (EERE)

Jump to: navigation, search OpenEI Reference LibraryAdd to library Web Site: Hawaii Air Pollution Control Permits Webpage Abstract Information about Air Pollution Control...

455

Optimizing operational flexibility and enforcement liability in Title V permits  

SciTech Connect

Now that most states have interim or full approval of the portions of their state implementation plans (SIPs) implementing Title V (40 CFR Part 70) of the Clean Air Act Amendments (CAAA), most sources which require a Title V permit have submitted or are well on the way to submitting a Title V operating permit application. Numerous hours have been spent preparing applications to ensure the administrative completeness of the application and operational flexibility for the facility. Although much time and effort has been spent on Title V permit applications, the operating permit itself is the final goal. This paper outlines the major Federal requirements for Title V permits as given in the CAAA at 40 CFR 70.6, Permit Content. These Federal requirements and how they will effect final Title V permits and facilities will be discussed. This paper will provide information concerning the Federal requirements for Title V permits and suggestions on how to negotiate a Title V permit to maximize operational flexibility and minimize enforcement liability.

McCann, G.T. [Rust Environment and Infrastructure Inc., Greenville, SC (United States)

1997-12-31T23:59:59.000Z

456

Application for Presidential Permit OE Docket No. PP-398 Minnesota...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Application for Presidential Permit OE Docket No. PP-398 Minnesota Power - Great Northern Transmission Line: Notice of Intent to Prepare an Environmental Impact Statement: Federal...

457

Application for Presidential Permit OE Docket No. PP-398 Minnesota...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Application for Presidential Permit OE Docket No. PP-398 Minnesota Power - Great Northern Transmission Line: Federal Register Notice, Vol. 79, No. 93 - May 14, 2014 Application...

458

Application for Presidential Permit OE Docket No. PP-362 Champlain...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

: Record of Decision for Issuing a Presidential Permit for the CHPE Transmission Line Project: Federal Register Notice, Volume 79, No. 190 - Oct. 1, 2014 Application for...

459

Application for Presidential Permit OE Docket No. PP-398 Minnesota...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Application for Presidential Permit OE Docket No. PP-398 Minnesota Power - Great Northern Transmission Line Application from Great Northern (GNTL) to construct, operate and...

460

Application for a Colorado State Permit for Achaeological or...  

Open Energy Info (EERE)

Form: Application for a Colorado State Permit for Achaeological or Paleontological Work Abstract This application must be submitted and approved prior to commencing...

Note: This page contains sample records for the topic "manager bugs permit" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Montana Disinfected Water and Hydrostatic Testing General Permit...  

Open Energy Info (EERE)

Montana Disinfected Water and Hydrostatic Testing General Permit Jump to: navigation, search OpenEI Reference LibraryAdd to library Form: Montana Disinfected Water and Hydrostatic...

462

Application for presidential permit OE Docket No. PP-371 Northern...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

for a Presidential Permit to construct a 1,200 MW high voltage direct current ("HVDC") transmission line (the "Application") from the Des Cantons substation in Quebec, to...

463

Geothermal: Sponsored by OSTI -- Regulatory and Permitting Information...  

Office of Scientific and Technical Information (OSTI)

Regulatory and Permitting Information Desktop (RAPID) Toolkit (Poster) Geothermal Technologies Legacy Collection HelpFAQ | Site Map | Contact Us | Admin Log On HomeBasic Search...

464

Management and Storage of Surface Waters (Florida)  

Energy.gov (U.S. Department of Energy (DOE))

The Department of Environmental Protection regulates the use and storage of surface waters in the state. A permit from either the Department or the local Water Management District is required for...

465

Bugs boost Cold War clean-up: Bacteria could scrub uranium from sites contaminated decades ago. updated at midnight GMTtoday is friday, november 14  

E-Print Network (OSTI)

in the study was contaminated by low levels of uranium from mining residue. The team hopes that the techniqueBugs boost Cold War clean-up: Bacteria could scrub uranium from sites contaminated decades ago boost Cold War clean-up Bacteria could scrub uranium from sites contaminated decades ago. 13 October

Lovley, Derek

466

Got the "Buy Local" bug? Here are some resources for you! From farmers markets to grocery stores to university cafeterias, more retailers are showcasing food  

E-Print Network (OSTI)

the feasibility of new marketing opportunities; expand capacity for locally and regionallygrown productsGot the "Buy Local" bug? Here are some resources for you! From farmers markets to grocery stores for local fresh markets. Interested producers should contact their local FSA office at www

Debinski, Diane M.

467

Solution Structure of Ptu1, a Toxin from the Assassin Bug Peirates turpis That Blocks the Voltage-Sensitive Calcium Channel N-Type  

Science Journals Connector (OSTI)

Ptu1 is a toxin from the assassin bug Peirates turpis which has been demonstrated to bind reversibly the N-type calcium channels and to have lower affinity than the ?-conotoxin MVIIA. We have determined the solution structure of Ptu1 by use of ...

Cdric Bernard; Gerardo Corzo; Amor Mosbah; Terumi Nakajima; Herv Darbon

2001-10-02T23:59:59.000Z

468

Management of Cutaneous Melanoma  

Science Journals Connector (OSTI)

...2 issue) makes no mention of dermoscopy, an in vivo, noninvasive technique that permits visualization of numerous morphologic features that are invisible to the naked eye, and thus enhances the clinical diagnosis of nearly all pigmented lesions. In our opinion, this method is particularly useful for... To the Editor: The excellent review by Tsao and colleagues on the management of cutaneous melanoma (Sept. 2 issue)1 makes no mention of dermoscopy,2 an in vivo, noninvasive technique that permits visualization of numerous morphologic features that are ...

2004-12-23T23:59:59.000Z

469

Solid Waste Management (Indiana) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Solid Waste Management (Indiana) Solid Waste Management (Indiana) Solid Waste Management (Indiana) < Back Eligibility Agricultural Commercial Industrial Investor-Owned Utility Local Government Municipal/Public Utility Rural Electric Cooperative State/Provincial Govt Utility Program Info State Indiana Program Type Environmental Regulations Provider Association of Indiana Solid Wastes Districts Inc. The state supports the implementation of source reduction, recycling, and other alternative solid waste management practices over incineration and land disposal. The Indiana Department of Environmental Management and the Indiana Solid Waste Management Board are tasked with planning and adopting rules and regulations governing solid waste management practices. Provisions pertaining to landfill management and expansion, permitting,

470

Waste Feed Delivery Environmental Permits and Approvals Plan  

SciTech Connect

This plan describes the environmental permits approvals, and other requirements that may affect establishment of a waste feed delivery system for the Hanford Site's River Protection Project. This plan identifies and screens environmental standards for potential applicability, outlines alternatives for satisfying applicable standards, and describes preferred permitting and approval approaches.

TOLLEFSON, K.S.

2000-01-18T23:59:59.000Z

471

The Initial Allocation of Carbon Permits: Choices and Implications  

E-Print Network (OSTI)

the playing field, and we need other nations to cut emissions. 3. Permit value to R&D, renewable energy Cost MC + carbon tax Demand Fixed pollution per unit output (tons carbon per Kwh). The "demandThe Initial Allocation of Carbon Permits: Choices and Implications Prof. Don Fullerton University

472

DOE Environmental Assessment EA-1391 for Presidential Permit Applications  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

DOE Environmental Assessment EA-1391 for Presidential Permit DOE Environmental Assessment EA-1391 for Presidential Permit Applications for Baja California Power Inc and Sempra Energy Resources PP-234 and PP-235: Finding of No Significant Impact DOE Environmental Assessment EA-1391 for Presidential Permit Applications for Baja California Power Inc and Sempra Energy Resources PP-234 and PP-235: Finding of No Significant Impact The Department of Energy has determined in its Environmental Assessment EA-1391 for Presidential Permit Applications for Baja California Power Inc and Sempra Energy Resources PP-234 and PP-235 a finding of no significant impact Finding of No Significant Impact: DOE Enviornmental Assessment EA-1391 More Documents & Publications Environmental assessment for presidential permit applications for Baja

473

Air Permits, Licenses, Certifications (Maine) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Air Permits, Licenses, Certifications (Maine) Air Permits, Licenses, Certifications (Maine) Air Permits, Licenses, Certifications (Maine) < Back Eligibility Agricultural Commercial Construction Fed. Government Fuel Distributor General Public/Consumer Industrial Installer/Contractor Institutional Investor-Owned Utility Local Government Low-Income Residential Multi-Family Residential Municipal/Public Utility Nonprofit Residential Retail Supplier Rural Electric Cooperative Schools State/Provincial Govt Systems Integrator Transportation Tribal Government Utility Program Info State Maine Program Type Siting and Permitting Provider Department of Environmental Protection This program regulates and limits air emissions from a variety of sources within Maine through a statewide permitting program. Separate regulations exist for limiting emissions of nitrogen oxides (NOx), sulfur dioxide

474

City of Asheville - Building Permit Fee Waiver | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

City of Asheville - Building Permit Fee Waiver City of Asheville - Building Permit Fee Waiver City of Asheville - Building Permit Fee Waiver < Back Eligibility Commercial Residential Savings Category Solar Buying & Making Electricity Heating & Cooling Water Heating Wind Program Info Start Date 7/01/2009 State North Carolina Program Type Green Building Incentive Provider Building Safety Department The City of Asheville waives fees for building permits and plan reviews for certain renewable energy technologies and green building certifications for homes and mixed-use commercial buildings. Waivers for building permit fees may apply to residences with the following designations (the regular fee is in parentheses): * HealthyBuilt Home Certification* ($100) * Energy Star Rating ($100) * Geothermal heat pumps ($50)

475

City of Portland - Streamlined Building Permits for Residential Solar  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Residential Residential Savings Category Solar Buying & Making Electricity Heating & Cooling Water Heating Program Info State Oregon Program Type Green Building Incentive Provider City of Portland The City of Portland's Bureau of Development Services (BDS) developed an electronic permitting process for residential solar energy system installations. With this streamlined, expedited process, solar contractors can submit the project plans and permit application online for residential installations. In order to file the online application, the contractor must first be trained. The City of Portland has staff at the permitting desk trained as solar experts to assist solar contractors who need help filing their permits in person. This process has a turnaround time of approximately 2-3 business days for building permits.

476

Presidential Permits and Export Authorizations - About the Program |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Presidential Permits and Export Presidential Permits and Export Authorizations - About the Program Presidential Permits and Export Authorizations - About the Program The Federal international electricity program consists of two elements: 1.Granting Presidential permits for the construction, connection, operation and/or maintenance of electric transmission lines which cross the U.S. international border; and 2.Authorizing exports of electric energy to foreign countries. The authority to grant Presidential permits is derived from the constitutional power of the President to protect the territorial integrity of the United States. The authority to regulate the export of electric energy is based on the statutory authority contained in section 202(e) of the Federal Power Act (FPA). Executive Order 8202, issued by President Roosevelt in 1939, prohibited

477

State Water Permit Regulation (Arkansas) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Permit Regulation (Arkansas) Permit Regulation (Arkansas) State Water Permit Regulation (Arkansas) < Back Eligibility Fuel Distributor Industrial Utility Program Info State Arkansas Program Type Environmental Regulations Siting and Permitting Provider Department of Environmental Quality It is the purpose of this regulation to adopt standards applicable to the storage, discharge, or disposal of any waste which, if unregulated, will cause pollution of waters of the state or result in wastes being placed in a location where it is likely to cause pollution of the waters of the state. These standards are intended to protect public health and the environment, and prevent, control, or abate pollution. The State Water Permit Regulation is implemented to adopt standards applicable to the storage, discharge, or disposal of any waste that, if

478

Rice Insect Management.  

E-Print Network (OSTI)

and vegetative grov. ) , Variety selection is important, not only because of response to nitrogen in relation to larval rice water we---.) damage, but also because certain varieties show some resistan ce/tolerance to rice water weevil and rice stink bug... and vegetative grov. ) , Variety selection is important, not only because of response to nitrogen in relation to larval rice water we---.) damage, but also because certain varieties show some resistan ce/tolerance to rice water weevil and rice stink bug...

Drees, Bastiaan M.

1983-01-01T23:59:59.000Z

479

Management Plan Management Plan  

E-Print Network (OSTI)

; and 5) consistency with the Endangered Species Act and Clean Water Act. In addition, the management plan Plan, Management Plan Page MP­ 1 #12;Management Plan water quality standards, instream flows, privateManagement Plan Management Plan "Management and restoration programs for native salmonids have

480

Solid Waste Management (Kansas) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Solid Waste Management (Kansas) Solid Waste Management (Kansas) Solid Waste Management (Kansas) < Back Eligibility Commercial Investor-Owned Utility Municipal/Public Utility Rural Electric Cooperative Utility Program Info State Kansas Program Type Environmental Regulations Provider Health and Environment This act aims to establish and maintain a cooperative state and local program of planning and technical and financial assistance for comprehensive solid waste management. No person shall construct, alter or operate a solid waste processing facility or a solid waste disposal area of a solid waste management system, except for clean rubble disposal sites, without first obtaining a permit from the secretary. Every person desiring to obtain a permit shall make application for such a permit on forms

Note: This page contains sample records for the topic "manager bugs permit" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Wetlands Standard Dredge and Fill Permit (New Hampshire) | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Standard Dredge and Fill Permit (New Hampshire) Standard Dredge and Fill Permit (New Hampshire) Wetlands Standard Dredge and Fill Permit (New Hampshire) < Back Eligibility Agricultural Commercial Construction Fed. Government Fuel Distributor General Public/Consumer Industrial Installer/Contractor Institutional Investor-Owned Utility Local Government Low-Income Residential Multi-Family Residential Municipal/Public Utility Nonprofit Residential Retail Supplier Rural Electric Cooperative Schools State/Provincial Govt Systems Integrator Transportation Tribal Government Utility Savings Category Alternative Fuel Vehicles Hydrogen & Fuel Cells Buying & Making Electricity Water Home Weatherization Solar Wind Program Info State New Hampshire Program Type Environmental Regulations Provider Department of Environmental Services

482

City of Santa Monica - Expedited Permitting for Green Buildings |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Expedited Permitting for Green Buildings Expedited Permitting for Green Buildings City of Santa Monica - Expedited Permitting for Green Buildings < Back Eligibility Commercial Residential Savings Category Heating & Cooling Home Weatherization Construction Commercial Weatherization Commercial Heating & Cooling Design & Remodeling Bioenergy Solar Lighting Windows, Doors, & Skylights Heating Buying & Making Electricity Water Water Heating Wind Program Info State California Program Type Green Building Incentive Provider City of Santa Monica The City of Santa Monica allows for priority plan check processing for building projects that are registered with the United States Green Building Council for certification under the Leadership in Energy and Environmental Design (LEED) Green Building Rating System. The priority status applies to

483

Does fundamental host range match ecological host range? A retrospective case study of a Lygus plant bug parasitoid  

Science Journals Connector (OSTI)

Using the retrospective case study of Peristenus digoneutis (Hymenoptera: Braconidae) introduced in the United States for biological control of native Lygus plant bugs (Hemiptera: Miridae), laboratory and field studies were conducted in the area of origin to evaluate whether the fundamental host range of P. digoneutis matches its ecological host range. Furthermore, it was determined whether these approaches would have been indicative of the post-introduction host range of P. digoneutis in North America [Day, W.H., 1999. Host preference of introduced and native parasites (Hymenoptera: Braconidae) of phytophagous plant bugs (Hemiptera: Miridae) in alfalfa-grass fields in the north-eastern USA, BioControl 44, 249261.]. Seven non-target mirid species were selected to define the fundamental host range of P. digoneutis in the area of origin in Europe. Laboratory choice and no-choice tests demonstrated that all selected non-target species were attacked by P. digoneutis and were largely suitable for parasitoid development. To confirm the validity of the fundamental host range, the ecological host range of P. digoneutis in the area of origin was investigated. Peristenus digoneutis was reared from 10 hosts, including three Lygus species and seven non-target hosts from the subfamily Mirinae. Despite the fact that laboratory tests demonstrated a high parasitism level in non-targets, ecological assessments in both North America (Day, 1999) and Europe suggest a much lower impact of P. digoneutis on non-target mirids, with low levels of parasitism (below 1% in Europe). Therefore, ecological host range studies in the area of origin provide useful supplementary data for interpreting pre-release laboratory host range testing.

T. Haye; H. Goulet; P.G. Mason; U. Kuhlmann

2005-01-01T23:59:59.000Z

484

Hazardous Waste Management (Indiana) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Hazardous Waste Management (Indiana) Hazardous Waste Management (Indiana) Hazardous Waste Management (Indiana) < Back Eligibility Agricultural Fuel Distributor Industrial Investor-Owned Utility Municipal/Public Utility Rural Electric Cooperative Transportation Utility Program Info State Indiana Program Type Environmental Regulations Provider Indiana Department of Environmental Management The state supports the implementation of source reduction, recycling, and other alternative solid waste management practices over incineration and land disposal. The Department of Environmental Management is tasked regulating hazardous waste management facilities and practices. Provisions pertaining to permitting, site approval, construction, reporting, transportation, and remediation practices and fees are discussed in these

485

Managing Insects and Mite Pests of Texas Sorghum  

E-Print Network (OSTI)

Chinch bug .....................................................................16 Corn earworm and fall armyworm (whorlworms) .......17 Banks grass mite ...........................................................18 GRAIN HEAD INSECT PESTS... .......................................................19 Sorghum midge ............................................................19 Corn earworm and fall armyworm (headworms) ........22 Sorghum webworm ........................................................24 Grain head-feeding bugs...

Cronholm, Gregory B.; Knutson, Allen E.; Parker, Roy D.; Pendleton, Bonnie

2007-06-20T23:59:59.000Z

486

EIS-0414: Presidential Permit Application, Energia Sierra Juarez  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

14: Presidential Permit Application, Energia Sierra Juarez 14: Presidential Permit Application, Energia Sierra Juarez Transmission Line, California EIS-0414: Presidential Permit Application, Energia Sierra Juarez Transmission Line, California Summary This EIS evaluates the potential environmental impacts from DOE's proposed Federal action of granting a Presidential permit to Energia Sierra Juarez U.S. Tranmssion, LLC (ESJ-U.S.), a subsidiary of Sempra Generation, to construct, operate, maintain, and connect a 1.7-mile transmission line (0.65 miles in the U.S.) across the international border between the U.S. and Mexico, near the town of Jacumba, California. The County of San Diego is a cooperating agency in the preparation of this EIS. Public Comment Opportunities No public comment opportunities available at this time.

487

Solar Construction Permitting Standards (California) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Standards (California) Standards (California) Solar Construction Permitting Standards (California) < Back Eligibility Commercial Industrial Local Government Residential Savings Category Solar Buying & Making Electricity Heating & Cooling Commercial Heating & Cooling Heating Water Heating Program Info State California Program Type Solar/Wind Permitting Standards Two bills signed in 2012 place limits on the fees that cities, counties, cities and counties, and charter cities can charge for a solar permit. AB 1801 specifies that a local government cannot base the fee for a solar permit on the value of the solar system or the value of the property on which the system will be installed. It also requires the local government to separately identify every fee charged on the invoice provided to the

488

File:03CACEncroachmentPermit.pdf | Open Energy Information  

Open Energy Info (EERE)

CACEncroachmentPermit.pdf CACEncroachmentPermit.pdf Jump to: navigation, search File File history File usage File:03CACEncroachmentPermit.pdf Size of this preview: 463 × 599 pixels. Other resolution: 464 × 600 pixels. Full resolution ‎(1,275 × 1,650 pixels, file size: 34 KB, MIME type: application/pdf) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 12:45, 19 November 2012 Thumbnail for version as of 12:45, 19 November 2012 1,275 × 1,650 (34 KB) Alevine (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage The following 2 pages link to this file: GRR/Flowcharts GRR/Section 3-CA-c - Encroachment Permit

489

File:03UTFEncroachmentPermit.pdf | Open Energy Information  

Open Energy Info (EERE)

UTFEncroachmentPermit.pdf UTFEncroachmentPermit.pdf Jump to: navigation, search File File history File usage File:03UTFEncroachmentPermit.pdf Size of this preview: 463 × 599 pixels. Other resolution: 464 × 600 pixels. Full resolution ‎(1,275 × 1,650 pixels, file size: 40 KB, MIME type: application/pdf) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 12:15, 30 August 2012 Thumbnail for version as of 12:15, 30 August 2012 1,275 × 1,650 (40 KB) Jnorris (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage The following 2 pages link to this file: GRR/Flowcharts GRR/Section 3-UT-f - Encroachment Permit

490

File:04AKBGeophysicalExplorationPermit.pdf | Open Energy Information  

Open Energy Info (EERE)

AKBGeophysicalExplorationPermit.pdf AKBGeophysicalExplorationPermit.pdf Jump to: navigation, search File File history File usage File:04AKBGeophysicalExplorationPermit.pdf Size of this preview: 463 × 599 pixels. Other resolution: 464 × 600 pixels. Full resolution ‎(1,275 × 1,650 pixels, file size: 62 KB, MIME type: application/pdf) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 11:38, 6 August 2012 Thumbnail for version as of 11:38, 6 August 2012 1,275 × 1,650 (62 KB) Jnorris (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage The following 2 pages link to this file: GRR/Flowcharts GRR/Section 4-AK-b - Geophysical Exploration Permit

491

Property:Permit/License Buildout (MW) | Open Energy Information  

Open Energy Info (EERE)

Permit/License Buildout (MW) Permit/License Buildout (MW) Jump to: navigation, search Property Name Permit/License Buildout (MW) Property Type String Pages using the property "Permit/License Buildout (MW)" Showing 25 pages using this property. (previous 25) (next 25) M MHK Projects/40MW Lewis project + 40 + MHK Projects/Algiers Light Project + 20 + MHK Projects/Anconia Point Project + 15 + MHK Projects/Ashley Point Project + 148 + MHK Projects/Avalon Tidal + 30 + MHK Projects/Avondale Bend Project + 18 + MHK Projects/BW2 Tidal + 3 + MHK Projects/Bar Field Bend + 94 + MHK Projects/Barfield Point + 114 + MHK Projects/Bayou Latenache + 50 + MHK Projects/Bondurant Chute + 152 + MHK Projects/Breeze Point + 198 + MHK Projects/Brilliant Point Project + 56 + MHK Projects/Brough Head Wave Farm + 200 +

492

City of Riverhead - Energy Conservation Device Permitting Fees | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

City of Riverhead - Energy Conservation Device Permitting Fees City of Riverhead - Energy Conservation Device Permitting Fees City of Riverhead - Energy Conservation Device Permitting Fees < Back Eligibility Commercial Residential Savings Category Solar Buying & Making Electricity Heating & Cooling Water Heating Wind Program Info Start Date 07/01/2005 (retroactive) State New York Program Type Green Building Incentive Provider Building Department In 2006 the Town of Riverhead on Long Island enacted a special allowance in its building permit fee structure to provide a discount to people wishing to install energy conservation devices on residential or commercial buildings. The provision in the town code applies to any energy conservation device "installed in or on a structure which qualifies for any federal, state or local tax exemption, tax credit or tax rebate", but

493

Taxes, Permits, and the Adoption of Abatement Technology under Imperfect  

Open Energy Info (EERE)

Taxes, Permits, and the Adoption of Abatement Technology under Imperfect Taxes, Permits, and the Adoption of Abatement Technology under Imperfect Compliance Jump to: navigation, search Name Taxes, Permits, and the Adoption of Abatement Technology under Imperfect Compliance Agency/Company /Organization Resources for the Future Sector Energy Topics Market analysis, Technology characterizations Resource Type Publications Website http://www.rff.org/RFF/Documen References Taxes, Permits, and the Adoption of Abatement Technology under Imperfect Compliance[1] Abstract "This paper analyzes the effects of the choice between price-based and quantity-based emissions regulations on compliance incentives and social welfare in the presence of incomplete enforcement and technology adoption. We show that if the regulator does not adjust the level of the policies in

494

Policy for Permitting Low-Emitting Sources (West Virginia) | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Policy for Permitting Low-Emitting Sources (West Virginia) Policy for Permitting Low-Emitting Sources (West Virginia) Policy for Permitting Low-Emitting Sources (West Virginia) < Back Eligibility Utility Fed. Government Commercial Agricultural Investor-Owned Utility State/Provincial Govt Industrial Construction Municipal/Public Utility Local Government Residential Installer/Contractor Rural Electric Cooperative Tribal Government Low-Income Residential Schools Retail Supplier Institutional Multi-Family Residential Systems Integrator Fuel Distributor Nonprofit General Public/Consumer Transportation Program Info State West Virginia Program Type Siting and Permitting While this policy alleviates some requirements on low-emitting emission sources, it does not change the policy of requiring applicants to submit reasonable information concerning all potential emission sources.

495

Permit by Rule for Small Renewable Energy Projects (Virginia) | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Permit by Rule for Small Renewable Energy Projects (Virginia) Permit by Rule for Small Renewable Energy Projects (Virginia) Permit by Rule for Small Renewable Energy Projects (Virginia) < Back Eligibility Commercial Construction Developer Industrial Investor-Owned Utility Local Government Municipal/Public Utility Rural Electric Cooperative State/Provincial Govt Systems Integrator Tribal Government Utility Savings Category Alternative Fuel Vehicles Hydrogen & Fuel Cells Buying & Making Electricity Water Home Weatherization Solar Wind Program Info State Virginia Program Type Siting and Permitting Provider Virginia Department of Environmental Quality In 2009, the Virginia General Assembly enacted legislation directing the Virginia Department of Environmental Quality to develop regulations for the construction and operation of renewable energy projects of 100 megawatts

496

File:06IDCDrinkingWaterPermit.pdf | Open Energy Information  

Open Energy Info (EERE)

IDCDrinkingWaterPermit.pdf IDCDrinkingWaterPermit.pdf Jump to: navigation, search File File history File usage File:06IDCDrinkingWaterPermit.pdf Size of this preview: 463 × 599 pixels. Other resolution: 464 × 600 pixels. Full resolution ‎(1,275 × 1,650 pixels, file size: 24 KB, MIME type: application/pdf) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 08:14, 29 October 2012 Thumbnail for version as of 08:14, 29 October 2012 1,275 × 1,650 (24 KB) Dklein2012 (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage The following page links to this file: GRR/Section 6-ID-c - Drinking Water Permit Retrieved from

497

Disclosure of Permitted Communication Concerning Fossil Fuel Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

Disclosure of Permitted Communication Concerning Fossil Fuel Energy Disclosure of Permitted Communication Concerning Fossil Fuel Energy Consumption Reduction for New Construction and Major Renovations of Federal Buildings -- Docket No. EERE-2010-BT-STD-0031; RIN 1904-AB96 Disclosure of Permitted Communication Concerning Fossil Fuel Energy Consumption Reduction for New Construction and Major Renovations of Federal Buildings -- Docket No. EERE-2010-BT-STD-0031; RIN 1904-AB96 This memo provides an overview of communications made to DOE staff on the subject of the rulemaking referenced above. The communications occurred at a meeting held on February 13, 2013. DOE 433 ex parte memo.pdf More Documents & Publications Disclosure of Permitted Communication Concerning Regional Standards Enforcement Framework Document -- Docket No. EERE-2011-BT-CE-0077

498

File:06MTCDrinkingWaterPermit.pdf | Open Energy Information  

Open Energy Info (EERE)

MTCDrinkingWaterPermit.pdf MTCDrinkingWaterPermit.pdf Jump to: navigation, search File File history File usage File:06MTCDrinkingWaterPermit.pdf Size of this preview: 463 × 599 pixels. Other resolution: 464 × 600 pixels. Full resolution ‎(1,275 × 1,650 pixels, file size: 11 KB, MIME type: application/pdf) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 11:11, 1 October 2012 Thumbnail for version as of 11:11, 1 October 2012 1,275 × 1,650 (11 KB) Dklein2012 (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage The following page links to this file: GRR/Section 6-MT-c - Drinking Water Permit Retrieved from

499

DOE to Hold Public Information Meetings on Requested Permit Modifications  

NLE Websites -- All DOE Office Websites (Extended Search)

Requested Permit Modifications Requested Permit Modifications CARLSBAD, N.M., March 15, 2001 -- The public is invited to comment on requested modifications to the Hazardous Waste Facility Permit for the Waste Isolation Pilot Plant (WIPP). Submittal of the proposed modification request to the New Mexico Environment Department (NMED) by the U.S. Department of Energy (DOE) begins a formal review process that includes a 60-day public comment period and public information meetings. In its submittal, DOE requests five permit changes to modify conditions at the facility. The proposed modifications conform to industry standards for the handling of hazardous materials and would continue to protect the safety of the facility, its employees, and the public. The first two requested changes would eliminate redundant and obsolete training

500

Comments on RFI on Permitting of Transmission Lines Available | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Comments on RFI on Permitting of Transmission Lines Available Comments on RFI on Permitting of Transmission Lines Available Comments on RFI on Permitting of Transmission Lines Available April 3, 2012 - 2:12pm Addthis On October 5, 2011, the White House announced the creation of a Rapid Response Team for Transmission (RRTT). In support of the RRTT the Department of Energy's Office of Electricity Delivery and Energy Reliability released a Federal Register Notice seeking information on questions related to permitting of transmission lines. The Request for Information focused on making the development times for generation and transmission more commensurate with one another. Public comments received from the following organizations are now available for review and downloading. - Allegheny Highlands Alliance - American Electric Power