Powered by Deep Web Technologies
Note: This page contains sample records for the topic "manager bugs permit" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

26: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions V-026: RSA Data Protection Manager Bugs Permit Cross-Site...

2

V-146: HP Service Manager Bugs Permit Cross-Site Scripting and Information  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: HP Service Manager Bugs Permit Cross-Site Scripting and 6: HP Service Manager Bugs Permit Cross-Site Scripting and Information Disclosure Attacks V-146: HP Service Manager Bugs Permit Cross-Site Scripting and Information Disclosure Attacks May 1, 2013 - 12:43am Addthis PROBLEM: HP Service Manager Bugs Permit Cross-Site Scripting and Information Disclosure Attacks PLATFORM: Service Manager v9.31 Web Tier ABSTRACT: Two vulnerabilities were reported in HP Service Manager REFERENCE LINKS: HP Document ID: c03748875 SecurityTracker Alert ID: 1028496 CVE-2012-5222 CVE-2013-2321 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can obtain potentially sensitive information [CVE-2012-5222]. Service Manager Web Tier does not properly filter HTML code from user-supplied input before displaying the input [CVE-2013-2321]. A remote

3

V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: RSA Data Protection Manager Bugs Permit Cross-Site Scripting 6: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions November 16, 2012 - 6:00am Addthis PROBLEM: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions. PLATFORM: RSA Data Protection Manager Appliance versions 2.7.x and 3.x ABSTRACT: Two vulnerabilities were reported in RSA Data Protection Manager. REFERENCE LINKS: SecurityTracker Alert ID: 1027781 EMC Identifier: ESA-2012-055 RSA Worldwide Customer Support CVE-2012-4612 CVE-2012-4613 IMPACT ASSESSMENT: Medium DISCUSSION: Two vulnerabilities were reported in RSA Data Protection Manager. A remote

4

V-202: Cisco Video Surveillance Manager Bugs Let Remote Users...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain Potentially Sensitive Information V-202: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain Potentially...

5

V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Mozilla Firefox 'window.location' Bugs Permit Cross-Site 2: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code October 29, 2012 - 6:00am Addthis PROBLEM: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code PLATFORM: Firefox, Thunderbird, SeaMonkey ABSTRACT: Three vulnerabilities were reported in Mozilla Firefox. REFERENCE LINKS: Mozilla Foundation Security Advisory 2012-90 SecurityTracker Alert ID: 1027701 SecurityTracker Alert ID: 1027702 Advisory: RHSA-2012:1407-1 CVE-2012-4194 CVE-2012-4195 CVE-2012-4196 IMPACT ASSESSMENT: High DISCUSSION: A remote user can exploit the valueOf() method of window.location to, in

6

U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: RSA enVision Bugs Permit Cross-Site Scripting, SQL 9: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks March 20, 2012 - 7:00am Addthis PROBLEM: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks PLATFORM: 4.x, prior to 4.1 Patch 4 ABSTRACT: Several vulnerabilities were reported in RSA enVision. A remote user can access the system. A remote authenticated user can conduct cross-site scripting attacks. A remote authenticated user can inject SQL commands. A remote authenticated user can view files on the target system. Reference LINKS: SecurityTracker Alert ID: 1026819 CVE-2012-0403 IMPACT ASSESSMENT: High Discussion: The system does not properly filter HTML code from user-supplied input

7

V-078: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: WordPress Bugs Permit Cross-Site Scripting and Port Scanning 8: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks V-078: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks January 28, 2013 - 12:32am Addthis PROBLEM: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks PLATFORM: WordPress all versions are affected prior to 3.5.1 ABSTRACT: WordPress 3.5.1 Maintenance and Security Release REFERENCE LINKS: WordPress News SecurityTracker Alert ID: 1028045 Secunia Advisory SA51967 IMPACT ASSESSMENT: Medium DISCUSSION: Several scripts do not properly filter HTML code from user-supplied input before displaying the input. A remote user can cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the site running the WordPress software and will run in the security

8

V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Mozilla Firefox 'window.location' Bugs Permit Cross-Site 2: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code October 29, 2012 - 6:00am Addthis PROBLEM: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code PLATFORM: Firefox, Thunderbird, SeaMonkey ABSTRACT: Three vulnerabilities were reported in Mozilla Firefox. REFERENCE LINKS: Mozilla Foundation Security Advisory 2012-90 SecurityTracker Alert ID: 1027701 SecurityTracker Alert ID: 1027702 Advisory: RHSA-2012:1407-1 CVE-2012-4194 CVE-2012-4195 CVE-2012-4196 IMPACT ASSESSMENT: High DISCUSSION: A remote user can exploit the valueOf() method of window.location to, in

9

Open Burning Permit Events Management  

E-Print Network (OSTI)

Open Burning Permit Events Management Form Revision Date: 09/29/2010 OpenBurningPermit.docx A Use being burned: (check all that apply) [ ] Small logs (less than 16 in. long) [ ] Finished Lumber________________________________ As the individual responsible for this event, I have read the attached Regulations for Open Burning. The sponsoring

Manning, Sturt

10

U-027: RSA Key Manager Appliance Session Logout Bug Fails to Terminate  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: RSA Key Manager Appliance Session Logout Bug Fails to 7: RSA Key Manager Appliance Session Logout Bug Fails to Terminate Sessions U-027: RSA Key Manager Appliance Session Logout Bug Fails to Terminate Sessions November 4, 2011 - 8:00am Addthis PROBLEM: RSA Key Manager Appliance Session Logout Bug Fails to Terminate Sessions. PLATFORM: RSA Key Manager Appliance 2.7 Service Pack 1 ABSTRACT: A remote authenticated user session may not terminate properly. reference LINKS: SecurityTracker Alert ID: 1026276 SecurityFocus Bug Traq Seclists: ESA-2011-035 CVE-2011-2740 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in RSA Key Manager Appliance. A remote authenticated user session may not terminate properly. When using Firefox 4 and 5, an authenticated user session is not terminated properly when logging out.

11

U-168: EMC Documentum Information Rights Management Server Bugs Let Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

168: EMC Documentum Information Rights Management Server Bugs Let 168: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service U-168: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service May 14, 2012 - 7:00am Addthis PROBLEM: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service PLATFORM: Information Rights Management Server 4.x, 5.x ABSTRACT: Two vulnerabilities were reported in EMC Documentum Information Rights Management Server. A remote authenticated user can cause denial of service conditions. Reference links: SecurityTracker Alert ID: 1027058 CVE-2012-2276 CVE-2012-2277 IMPACT ASSESSMENT: High Discussion: A remote authenticated user can send specially crafted data to trigger a NULL pointer dereference and cause the target service to crash. A remote

12

U-025: HP OpenView Network Node Manager Bugs Let Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-025: HP OpenView Network Node Manager Bugs Let Remote Users U-025: HP OpenView Network Node Manager Bugs Let Remote Users Execute Arbitrary Code U-025: HP OpenView Network Node Manager Bugs Let Remote Users Execute Arbitrary Code November 2, 2011 - 8:00am Addthis PROBLEM: HP OpenView Network Node Manager Bugs Let Remote Users Execute Arbitrary Code. PLATFORM: HP OpenView Network Node Manager (OV NNM) v7.51, v7.53 running on HP-UX, Linux, Solaris, and Windows ABSTRACT: A remote user can execute arbitrary code on the target system. reference LINKS: HP Support Center Document ID: c03054052 SecurityTracker Alert ID: 1026260 CVE-2011-1365 CVE-2011-1366 CVE-2011-1367 IMPACT ASSESSMENT: Medium Discussion: Several vulnerabilities were reported in HP OpenView Network Node Manager. A remote user can execute arbitrary code on the target system.

13

U-047: Siemens Automation License Manager Bugs Let Remote Users Deny  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Siemens Automation License Manager Bugs Let Remote Users 7: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code November 29, 2011 - 9:00am Addthis PROBLEM: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code. PLATFORM: Siemens Automation License Manager 500.0.122.1 ABSTRACT: Several vulnerabilities were reported in Siemens Automation License Manager. reference LINKS: SecurityTracker Alert ID: 1026354 Bugtraq Siemens Advisory Services IMPACT ASSESSMENT: Medium Discussion: A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions. A remote user can send specially crafted *_licensekey commands to trigger a

14

U-137: HP Performance Manager Unspecified Bug Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: HP Performance Manager Unspecified Bug Lets Remote Users 7: HP Performance Manager Unspecified Bug Lets Remote Users Execute Arbitrary Codes U-137: HP Performance Manager Unspecified Bug Lets Remote Users Execute Arbitrary Codes March 30, 2012 - 9:15am Addthis PROBLEM: HP Performance Manager Unspecified Bug Lets Remote Users Execute Arbitrary Codes PLATFORM: HP-UX B.11.31 HP-UX B.11.23 ABSTRACT: A remote user can execute arbitrary code on the target system. REFERENCE LINKS: HP Support Document ID: c03255321 SecurityTracker Alert ID: 1026869 CVE-2012-0127 IMPACT ASSESSMENT: High Discussion: A potential security vulnerability has been identified with HP Performance Manager running on HP-UX, Linux, Solaris, and Windows. The vulnerability could be exploited remotely to execute arbitrary code and to create a Denial of Service (DoS).

15

U-052: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: HP Protect Tools Device Access Manager Unspecified Bug Lets 2: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code U-052: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code December 6, 2011 - 7:00am Addthis PROBLEM: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code. PLATFORM: HP Protect Tools Device Access Manager for Windows earlier than v.6.1.0.1 running on the following HP PCs: HP EliteBook 2560p Notebook PC HP EliteBook 2760p Notebook PC HP EliteBook 8460p Notebook PC HP EliteBook 8460w Mobile Workstation HP EliteBook 8560p Notebook PC HP EliteBook 8560w Mobile Workstation HP EliteBook 8760w Mobile Workstation HP ProBook 4230s Notebook PC

16

U-052: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: HP Protect Tools Device Access Manager Unspecified Bug Lets 2: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code U-052: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code December 6, 2011 - 7:00am Addthis PROBLEM: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code. PLATFORM: HP Protect Tools Device Access Manager for Windows earlier than v.6.1.0.1 running on the following HP PCs: HP EliteBook 2560p Notebook PC HP EliteBook 2760p Notebook PC HP EliteBook 8460p Notebook PC HP EliteBook 8460w Mobile Workstation HP EliteBook 8560p Notebook PC HP EliteBook 8560w Mobile Workstation HP EliteBook 8760w Mobile Workstation HP ProBook 4230s Notebook PC

17

V-202: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Cisco Video Surveillance Manager Bugs Let Remote Users 2: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain Potentially Sensitive Information V-202: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain Potentially Sensitive Information July 25, 2013 - 2:52am Addthis PROBLEM: A remote user can obtain potentially sensitive information and modify some configuration settings. A remote user can exploit this to create, modify, and remove camera feeds, archives, logs, and users. PLATFORM: Cisco Video Surveillance Manager 7.1, 7.5 ABSTRACT: Two vulnerabilities were reported in Cisco Video Surveillance Manager REFERENCE LINKS: Security Tracker Alert ID: 1028827 CVE-2013-3429 CVE-2013-3430 CVE-2013-3431 IMPACT ASSESSMENT: Medium DISCUSSION: The vulnerability is due to an access control error that occurred. The

18

U-201: HP System Management Homepage Bugs Let Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: HP System Management Homepage Bugs Let Remote Users Deny 1: HP System Management Homepage Bugs Let Remote Users Deny Service U-201: HP System Management Homepage Bugs Let Remote Users Deny Service June 28, 2012 - 7:00am Addthis PROBLEM: A vulnerability was reported in HP System Management Homepage. PLATFORM: Version(s): prior to 7.1.1 ABSTRACT: The vulnerabilities could be exploited remotely resulting in unauthorized access, disclosure of information, data modification, Denial of Service (DoS), and execution of arbitrary code. Reference links: Original Advisory Security Tracker ID 1027209 CVE-2012-2012, CVE-2012-2013, CVE-2012-2014 CVE-2012-2015, CVE-2012-2016 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in HP System Management Homepage. A remote authenticated user can gain elevated privileges. A remote authenticated

19

Permit Fees for Hazardous Waste Material Management (Connecticut...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Waste Material Management (Connecticut) Permit Fees for Hazardous Waste Material Management (Connecticut) Eligibility Agricultural Commercial Construction Fed. Government...

20

Water Bugs  

NLE Websites -- All DOE Office Websites (Extended Search)

Bugs Bugs Nature Bulletin No. 221-A March 12, 1966 Forest Preserve District of Cook County Seymour Simon, President Roland F. Eisenbeis, Supt. of Conservation WATER BUGS It is fascinating to lie in a boat or on a log at the edge of the water and watch the drama that unfolds among the small water animals. Among the star performers in small streams and ponds are the Water Bugs. These are aquatic members of that large group of insects called the "true bugs", most of which live on land. Moreover, unlike many other types of water insects, they do not have gills but get their oxygen directly from the air. Those that do go beneath the surface usually carry an oxygen supply with them in the form of a shiny glistening sheath of air imprisoned among a covering of fine waterproof hairs. The common water insect known to small boys at the "Whirligig Bug" is not a water bug but a beetle.

Note: This page contains sample records for the topic "manager bugs permit" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

Permits  

NLE Websites -- All DOE Office Websites (Extended Search)

Other Permits Permits We are committed to meeting our environmental requirements for air, waste, and water quality permitting. Contact Environmental Communication & Public...

22

U-201: HP System Management Homepage Bugs Let Remote Users Deny...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated Users Gain Elevated Privileges and Remote Users Deny Service V-051: Oracle Solaris Java Multiple Vulnerabilities...

23

T-693: Symantec Endpoint Protection Manager Input Validation Hole Permits  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Symantec Endpoint Protection Manager Input Validation Hole 3: Symantec Endpoint Protection Manager Input Validation Hole Permits Cross-Site Scripting and Cross-Site Request Forgery Attacks T-693: Symantec Endpoint Protection Manager Input Validation Hole Permits Cross-Site Scripting and Cross-Site Request Forgery Attacks August 15, 2011 - 3:42pm Addthis PROBLEM: Two vulnerabilities were reported in Symantec Endpoint Protection Manager. A remote user can conduct cross-site scripting attacks. A remote user can conduct cross-site request forgery attacks. PLATFORM: Version(s): 11.0 RU6(11.0.600x), 11.0 RU6-MP1(11.0.6100), 11.0 RU6-MP2(11.0.6200), 11.0 RU6-MP3(11.0.6300) ABSTRACT: Symantec Endpoint Protection Manager Input Validation Hole Permits Cross-Site Scripting and Cross-Site Request Forgery Attacks. reference LINKS:

24

V-192: Symantec Security Information Manager Input Validation Flaws Permit  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

92: Symantec Security Information Manager Input Validation Flaws 92: Symantec Security Information Manager Input Validation Flaws Permit Cross-Site Scripting, SQL Injection, and Information Disclosure Attacks V-192: Symantec Security Information Manager Input Validation Flaws Permit Cross-Site Scripting, SQL Injection, and Information Disclosure Attacks July 4, 2013 - 6:00am Addthis PROBLEM: Several vulnerabilities were reported in Symantec Security Information Manager PLATFORM: Symantec Security Information Manager Appliance Version 4.7.x and 4.8.0 ABSTRACT: Symantec was notified of multiple security issues impacting the SSIM management console REFERENCE LINKS: SecurityTracker Alert ID: 1028727 Symantec Security Advisory SYM13-006 CVE-2013-1613 CVE-2013-1614 CVE-2013-1615 IMPACT ASSESSMENT: Medium DISCUSSION: The console does not properly filter HTML code from user-supplied input

25

State of Tennessee Hazardous Waste Management Permit, TNHW-127  

NLE Websites -- All DOE Office Websites (Extended Search)

Class 1 1 Modification, Dated: 10/20/06 TABLE OF CONTENTS U.S. DEPARTMENT OF ENERGY, Y-12 NATIONAL SECURITY COMPLEX OAK RIDGE, TENNESSEE HAZARDOUS WASTE CONTAINER STORAGE AND TREATMENT UNITS BUILDINGS 9206, 9212, 9720-12, 9811-9, AND 9812 AND THE ORGANIC HANDLING UNIT EPA ID NUMBER: TN3 89 009 0001 Page Number I. STANDARD CONDITIONS A. EFFECT OF PERMIT I-1 B. SEVERABILITY I-1 C. DEFINITIONS I-2 D. GENERAL DUTIES AND REQUIREMENTS I-4 E. CONFIDENTIAL INFORMATION I-10 F. DOCUMENTS TO BE MAINTAINED AT THE FACILITY I-10 G. ANNUAL MAINTENANCE FEE I-10 H. REQUIRED NOTICES I-10 I. ORDER OF PRECEDENCE I-11 J. PERMIT STRUCTURE I-11 II. GENERAL FACILITY CONDITIONS A. HAZARDOUS WASTES TO BE MANAGED II-1 B. MAINTENANCE OF THE FACILITY II-1

26

State of Tennessee Hazardous Waste Management Permit, TNHW-122  

NLE Websites -- All DOE Office Websites (Extended Search)

Class 1 1 Modification, Dated: 12/18/06 TABLE OF CONTENTS U.S. DEPARTMENT OF ENERGY, Y-12 NATIONAL SECURITY COMPLEX OAK RIDGE, TENNESSEE HAZARDOUS WASTE CONTAINER STORAGE AND TREATMENT UNITS BUILDINGS 9720-9, 9720-25, AND 9720-31 EPA ID NUMBER: TN3 89 009 0001 Page Number I. STANDARD CONDITIONS A. EFFECT OF PERMIT I-1 B. SEVERABILITY I-1 C. DEFINITIONS I-2 D. GENERAL DUTIES AND REQUIREMENTS I-4 E. CONFIDENTIAL INFORMATION I-10 F. DOCUMENTS TO BE MAINTAINED AT THE FACILITY I-10 G. ANNUAL MAINTENANCE FEE I-10 H. REQUIRED NOTICES I-10 I. ORDER OF PRECEDENCE I-11 J. PERMIT STRUCTURE I-11 II. GENERAL FACILITY CONDITIONS A. HAZARDOUS WASTES TO BE MANAGED II-1 B. MAINTENANCE OF THE FACILITY II-1 C. SAMPLING, ANALYSIS, AND MONITORING II-1

27

Bug Wars: a competitive exercise to find bugs in code  

Science Conference Proceedings (OSTI)

Software bugs are a common problem that students encounter in any Computer Science program. "Bug Wars" is a fun and competitive class exercise for student teams to identify bugs in code. To prepare for the competition, the instructor provides several ...

Renee Bryce

2011-12-01T23:59:59.000Z

28

U-204: HP Network Node Manager i Input Validation Hole Permits Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: HP Network Node Manager i Input Validation Hole Permits 4: HP Network Node Manager i Input Validation Hole Permits Cross-Site Scripting Attacks U-204: HP Network Node Manager i Input Validation Hole Permits Cross-Site Scripting Attacks July 3, 2012 - 7:00am Addthis PROBLEM: HP Network Node Manager i Input Validation Hole Permits Cross-Site Scripting Attacks PLATFORM: Version(s): 8.x, 9.0x, 9.1x ABSTRACT: Potential security vulnerabilities have been identified with HP Network Node Manager I (NNMi) for HP-UX, Linux, Solaris, and Windows. The vulnerabilities could be remotely exploited resulting in cross site scripting (XSS). reference LINKS: The Vendor's Advisory SecurityTracker Alert ID: 1027215 CVE-2012-2018 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in HP Network Node Manager i. The software does not properly filter HTML code from user-supplied input before

29

U-212: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: RSA Authentication Manager Flaws Permit Cross-Site and 2: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks U-212: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks July 13, 2012 - 7:00am Addthis PROBLEM: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks PLATFORM: RSA Authentication Manager 7.1 is vulnerable; other versions may also be affected. ABSTRACT: RSA Authentication Manager is prone to multiple security vulnerabilities because it fails to properly sanitize user-supplied input. Attackers can exploit these issues to execute arbitrary script or HTML code, steal cookie-based authentication credentials, and conduct phishing attacks. Other attacks may also be possible.

30

U-229: HP Network Node Manager i Input Validation Flaw Permits Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: HP Network Node Manager i Input Validation Flaw Permits 9: HP Network Node Manager i Input Validation Flaw Permits Cross-Site Scripting Attacks U-229: HP Network Node Manager i Input Validation Flaw Permits Cross-Site Scripting Attacks August 7, 2012 - 7:00am Addthis PROBLEM: HP Network Node Manager i Input Validation Flaw Permits Cross-Site Scripting Attacks PLATFORM: HP Network Node Manager I (NNMi) v8.x, v9.0x, v9.1x, v9.20 for HP-UX, Linux, Solaris, and Windows ABSTRACT: Potential security vulnerabilities have been identified with HP Network Node Manager i (NNMi) for HP-UX, Linux, Solaris, and Windows. The vulnerabilities could be remotely exploited resulting in cross site scripting (XSS). Reference LINKS: HP Document ID: c03405705 SecurityTracker Alert ID: 1027345 Bugtraq ID: 54815 CVE-2012-2022 IMPACT ASSESSMENT:

31

U-238: HP Service Manager Input Validation Flaw Permits Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

38: HP Service Manager Input Validation Flaw Permits Cross-Site 38: HP Service Manager Input Validation Flaw Permits Cross-Site Scripting Attacks U-238: HP Service Manager Input Validation Flaw Permits Cross-Site Scripting Attacks August 17, 2012 - 7:00am Addthis PROBLEM: HP Service Manager Input Validation Flaw Permits Cross-Site Scripting Attacks PLATFORM: Version(s): 7.11, 9.21, 9.30 ABSTRACT: Cross-site scripting (XSS) vulnerability in HP Service Manager Web Tier 7.11, 9.21, and 9.30, and HP Service Center Web Tier 6.28, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. REFERENCE LINKS: www2.hp.com http://www.securitytracker.com/id/1027399 CVE-2012-3251 IMPACT ASSESSMENT: Moderate Discussion: A vulnerability was reported in HP Service Manager. A remote user can conduct cross-site scripting attacks. The software does not properly filter

32

U-204: HP Network Node Manager i Input Validation Hole Permits Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

204: HP Network Node Manager i Input Validation Hole Permits 204: HP Network Node Manager i Input Validation Hole Permits Cross-Site Scripting Attacks U-204: HP Network Node Manager i Input Validation Hole Permits Cross-Site Scripting Attacks July 3, 2012 - 7:00am Addthis PROBLEM: HP Network Node Manager i Input Validation Hole Permits Cross-Site Scripting Attacks PLATFORM: Version(s): 8.x, 9.0x, 9.1x ABSTRACT: Potential security vulnerabilities have been identified with HP Network Node Manager I (NNMi) for HP-UX, Linux, Solaris, and Windows. The vulnerabilities could be remotely exploited resulting in cross site scripting (XSS). reference LINKS: The Vendor's Advisory SecurityTracker Alert ID: 1027215 CVE-2012-2018 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in HP Network Node Manager i. The software does not properly filter HTML code from user-supplied input before

33

U-238: HP Service Manager Input Validation Flaw Permits Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: HP Service Manager Input Validation Flaw Permits Cross-Site 8: HP Service Manager Input Validation Flaw Permits Cross-Site Scripting Attacks U-238: HP Service Manager Input Validation Flaw Permits Cross-Site Scripting Attacks August 17, 2012 - 7:00am Addthis PROBLEM: HP Service Manager Input Validation Flaw Permits Cross-Site Scripting Attacks PLATFORM: Version(s): 7.11, 9.21, 9.30 ABSTRACT: Cross-site scripting (XSS) vulnerability in HP Service Manager Web Tier 7.11, 9.21, and 9.30, and HP Service Center Web Tier 6.28, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. REFERENCE LINKS: www2.hp.com http://www.securitytracker.com/id/1027399 CVE-2012-3251 IMPACT ASSESSMENT: Moderate Discussion: A vulnerability was reported in HP Service Manager. A remote user can conduct cross-site scripting attacks. The software does not properly filter

34

AQUIS: A PC-based air inventory and permit manager  

SciTech Connect

The Air Quality Utility Information System (AQUIS) was developed to calculate and track sources, emissions, stacks, permits, and related information. The system runs on IBM-compatible personal computers with dBASE IV and tracks more than 1,200 data items distributed among various source categories. AQUIS is currently operating at nine US Air Force facilities that have up to 1,000 sources. The system provides a flexible reporting capability that permits users who are unfamiliar with database structure to design and prepare reports containing user-specified information. In addition to six criteria pollutants, AQUIS calculates compound-specific emissions and allows users to enter their own emission estimates.

Smith, A.E.; Huber, C.C.; Tschanz, J. [Argonne National Lab., IL (United States); Ryckman, S.J. Jr. [Air Force Materiel Command, Wright-Patterson AFB, OH (United States). Environmental Engineering Division

1992-11-01T23:59:59.000Z

35

AQUIS: A PC-based air inventory and permit manager  

SciTech Connect

The Air Quality Utility Information System (AQUIS) was developed to calculate and track sources, emissions, stacks, permits, and related information. The system runs on IBM-compatible personal computers with dBASE IV and tracks more than 1,200 data items distributed among various source categories. AQUIS is currently operating at nine US Air Force facilities that have up to 1,000 sources. The system provides a flexible reporting capability that permits users who are unfamiliar with database structure to design and prepare reports containing user-specified information. In addition to six criteria pollutants, AQUIS calculates compound-specific emissions and allows users to enter their own emission estimates.

Smith, A.E.; Huber, C.C.; Tschanz, J. (Argonne National Lab., IL (United States)); Ryckman, S.J. Jr. (Air Force Materiel Command, Wright-Patterson AFB, OH (United States). Environmental Engineering Division)

1992-01-01T23:59:59.000Z

36

Massive June Bug Emergence  

NLE Websites -- All DOE Office Websites (Extended Search)

Massive June Bug Emergence Massive June Bug Emergence Name: Cordell Location: N/A Country: N/A Date: N/A Question: We are infested with june bugs next to the street light near the end of my driveway. They have burrowed into the ground and underneath my driveway. Yesterday we shoveled 2/3 of a 33-gallon trash bag of just bugs. What can we spray or do to kill these june bugs? Replies: Not knowing which part of the country you are from and I could be wrong because of this fact buy this does not sound like June Bugs. This has to be a Circadia outbreak which are relatives to the June Bug. They run in 13, 17 or other year cycles and this depends upon the part of the country you are from. Ask a local garden center or naturalist and you'll probably see that this won't happen again for a number of years to come.

37

U-238: HP Service Manager Input Validation Flaw Permits Cross...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9.21, 9.30 ABSTRACT: Cross-site scripting (XSS) vulnerability in HP Service Manager Web Tier 7.11, 9.21, and 9.30, and HP Service Center Web Tier 6.28, allows remote attackers...

38

Trendy Bugs Topic Trends in the Android Bug Reports  

E-Print Network (OSTI)

Trendy Bugs Topic Trends in the Android Bug Reports Lee Martie, Vijay Krishna Palepu, Hitesh {lmartie, vpalepu, hsajnani, lopes}@ics.uci.edu Abstract--Studying vast volumes of bug and issue public issue tracker. This informs us of the features or parts of the project that are more problematic

Jones, James A.

39

Mining succinct predicated bug signatures  

Science Conference Proceedings (OSTI)

A bug signature is a set of program elements highlighting the cause or effect of a bug, and provides contextual information for debugging. In order to mine a signature for a buggy program, two sets of execution profiles of the program, one capturing ... Keywords: bug signature, feature selection, statistical debugging

Chengnian Sun; Siau-Cheng Khoo

2013-08-01T23:59:59.000Z

40

Efficient concurrency-bug detection across inputs  

Science Conference Proceedings (OSTI)

In the multi-core era, it is critical to efficiently test multi-threaded software and expose concurrency bugs before software release. Previous work has made significant progress in detecting and validating concurrency bugs under a given input. Unfortunately, ... Keywords: bug detection, concurrency bugs, multi-threaded software, software testing

Dongdong Deng, Wei Zhang, Shan Lu

2013-10-01T23:59:59.000Z

Note: This page contains sample records for the topic "manager bugs permit" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

bug | OpenEI Community  

Open Energy Info (EERE)

bug bug Home Rmckeel's picture Submitted by Rmckeel(297) Contributor 20 July, 2012 - 07:55 Image upload with broken thumbnail image bug images wiki OpenEI users can upload images to the wiki by typing a new file name http://en.openei.org/wiki/File:My_new_file.jpg However, due to a caching timing issue, right after upload, the 120px-wide thumbnail has not yet been created by the time the fetier cache goes after it. Thus, the thumbnail appears broken. Is anyone up for debugging? For users uploading images, this can be fixed by forcing a reload of the page: Rmckeel's picture Submitted by Rmckeel(297) Contributor 19 June, 2012 - 08:04 "Ghost" entries bug utility rate There is an issue that Illinois State University has come across. From Nick B: Syndicate content 429 Throttled (bot load)

42

Team Bug Bag Biogas For Nicaragua  

E-Print Network (OSTI)

Team Bug Bag Biogas For Nicaragua Project Recap The task for Team Bug Bag was to create for under $100 (USD), and be able to produce biogas that could boil water for a thirty minute time period

Demirel, Melik C.

43

Scale Insects and Mealy Bugs  

NLE Websites -- All DOE Office Websites (Extended Search)

Scale Insects and Mealy Bugs Scale Insects and Mealy Bugs Nature Bulletin No. 404-A January 30, 1971 Forest Preserve District of Cook County George W. Dunne, President Roland F. Eisenbeis, Supt. of Conservation SCALE INSECTS AND MEALY BUGS The insect world contains an enormous number and variety of species but, of them all, the Scale Insects and Mealy Bugs come nearest to being vegetables. Most insects are active animals that fly, hop, scamper, crawl or burrow, but these queer creatures spend most of their lives merely sitting in one spot, sucking plant juices from a branch, twig, leaf, or fruit. Some of our most destructive pests are included among the several hundred kinds of these highly specialized insects. They are so small that the average person seldom realizes that they are responsible for the sickly or dying condition of a tree or shrub. Adult scale insects are extremely variable in shape, and range in size from that of a pinhead up to forms which are a quarter of an inch long. Each hides under a hard protective shell, or scale, of wax secreted by pores on its body, and are frequently so numerous that they form a dense crust. The females molt a few times, and usually discard their legs and wings, before they mature. She lays eggs under the scale and then dies. These hatch into young (called "crawlers") which move around for a period varying from a few hours to a day or two before they settle down and build scales. Unlike the female, the male -always the smaller of the two -- goes through a cocoon stage from which he emerges with a pair of wings but with no means of taking food. He merely mates and dies. Males are scarce In most kinds and in many species have never been seen.

44

V-149: Microsoft Internet Explorer Object Access Bug Lets Remote...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code V-149: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary...

45

V-127: Samba Bug Lets Remote Authenticated Users Modify Files | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Samba Bug Lets Remote Authenticated Users Modify Files 7: Samba Bug Lets Remote Authenticated Users Modify Files V-127: Samba Bug Lets Remote Authenticated Users Modify Files April 5, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Samba. PLATFORM: The vulnerabilities are reported in version(s): 3.6.0 - 3.6.5 ABSTRACT: A remote authenticated user can modify files on the target share REFERENCE LINKS: SecurityTracker Alert ID: 1028389 Samba Security Announcement CVE-2013-0454 IMPACT ASSESSMENT: Medium DISCUSSION: A remote authenticated user can perform operations on the target CIFS export that are not permitted by the CIFS share access control settings. This may include writing to read-only shares. IMPACT: Modification of user information SOLUTION: Update to 3.6.6 and higher or apply the following patch Addthis

46

V-127: Samba Bug Lets Remote Authenticated Users Modify Files | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Samba Bug Lets Remote Authenticated Users Modify Files 7: Samba Bug Lets Remote Authenticated Users Modify Files V-127: Samba Bug Lets Remote Authenticated Users Modify Files April 5, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Samba. PLATFORM: The vulnerabilities are reported in version(s): 3.6.0 - 3.6.5 ABSTRACT: A remote authenticated user can modify files on the target share REFERENCE LINKS: SecurityTracker Alert ID: 1028389 Samba Security Announcement CVE-2013-0454 IMPACT ASSESSMENT: Medium DISCUSSION: A remote authenticated user can perform operations on the target CIFS export that are not permitted by the CIFS share access control settings. This may include writing to read-only shares. IMPACT: Modification of user information SOLUTION: Update to 3.6.6 and higher or apply the following patch Addthis

47

Finding and understanding bugs in C compilers  

Science Conference Proceedings (OSTI)

Compilers should be correct. To improve the quality of C compilers, we created Csmith, a randomized test-case generation tool, and spent three years using it to find compiler bugs. During this period we reported more than 325 previously unknown bugs ... Keywords: automated testing, compiler defect, compiler testing, random program generation, random testing

Xuejun Yang; Yang Chen; Eric Eide; John Regehr

2011-06-01T23:59:59.000Z

48

U-229: HP Network Node Manager i Input Validation Flaw Permits...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Network Node Manager I (NNMi) v8.x, v9.0x, v9.1x, v9.20 for HP-UX, Linux, Solaris, and Windows ABSTRACT: Potential security vulnerabilities have been identified with HP Network...

49

RCRA Permit for a Hazardous Waste Management Facility Permit Number NEV HW0101 Annual Summary/Waste Minimization Report Calendar Year 2012, Nevada National Security Site, Nevada  

SciTech Connect

This report summarizes the U.S. Environmental Protection Agency (EPA) identification number of each generator from which the Permittee received a waste stream, a description and quantity of each waste stream in tons and cubic feet received at the facility, the method of treatment, storage, and/or disposal for each waste stream, a description of the waste minimization efforts undertaken, a description of the changes in volume and toxicity of waste actually received, any unusual occurrences, and the results of tank integrity assessments. This Annual Summary/Waste Minimization Report is prepared in accordance with Section 2.13.3 of Permit Number NEV HW0101, issued 10/17/10.

,

2013-02-21T23:59:59.000Z

50

RCRA Permit for a Hazardous Waste Management Facility Permit Number NEV HW0101 Annual Summary/Waste Minimization Report Calendar Year 2011  

SciTech Connect

This report summarizes the U.S. Environmental Protection Agency (EPA) identification number of each generator from which the Permittee received a waste stream; a description and quantity of each waste stream in tons and cubic feet received at the facility; the method of treatment, storage, and/or disposal for each waste stream; a description of the waste minimization efforts undertaken; a description of the changes in volume and toxicity of waste actually received; any unusual occurrences; and the results of tank integrity assessments. This Annual Summary/Waste Minimization Report is prepared in accordance with Section 2.13.3 of Permit Number NEV HW0101.

NSTec Environmental Restoration

2012-02-16T23:59:59.000Z

51

Dynamically fighting bugs : prevention, detection and elimination  

E-Print Network (OSTI)

This dissertation presents three test-generation techniques that are used to improve software quality. Each of our techniques targets bugs that are found by different stake-holders: developers, testers, and maintainers. ...

Artzi, Shay

2009-01-01T23:59:59.000Z

52

U-153: EMC Data Protection Advisor Server and Collector Bugs...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: EMC Data Protection Advisor Server and Collector Bugs Let Remote Users Deny Service U-153: EMC Data Protection Advisor Server and Collector Bugs Let Remote Users Deny Service...

53

V-128: Xen Event Channel Tracking Pointer Bug Local Privilege...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Xen Event Channel Tracking Pointer Bug Local Privilege Escalation V-128: Xen Event Channel Tracking Pointer Bug Local Privilege Escalation April 8, 2013 - 12:28am Addthis...

54

Mining Bug Databases for Unidentified Software Vulnerabilities  

SciTech Connect

Identifying software vulnerabilities is becoming more important as critical and sensitive systems increasingly rely on complex software systems. It has been suggested in previous work that some bugs are only identified as vulnerabilities long after the bug has been made public. These vulnerabilities are known as hidden impact vulnerabilities. This paper discusses the feasibility and necessity to mine common publicly available bug databases for vulnerabilities that are yet to be identified. We present bug database analysis of two well known and frequently used software packages, namely Linux kernel and MySQL. It is shown that for both Linux and MySQL, a significant portion of vulnerabilities that were discovered for the time period from January 2006 to April 2011 were hidden impact vulnerabilities. It is also shown that the percentage of hidden impact vulnerabilities has increased in the last two years, for both software packages. We then propose an improved hidden impact vulnerability identification methodology based on text mining bug databases, and conclude by discussing a few potential problems faced by such a classifier.

Dumidu Wijayasekara; Milos Manic; Jason Wright; Miles McQueen

2012-06-01T23:59:59.000Z

55

QA procedures and emissions from nonstandard sources in AQUIS, a PC-based emission inventory and air permit manager  

Science Conference Proceedings (OSTI)

The Air Quality Utility Information System (AQUIS) is a database management system that operates under dBASE IV. It runs on an IBM-compatible personal computer (PC) with MS DOS 5.0 or later, 4 megabytes of memory, and 30 megabytes of disk space. AQUIS calculates emissions for both traditional and toxic pollutants and reports emissions in user-defined formats. The system was originally designed for use at 7 facilities of the Air Force Materiel Command, and now more than 50 facilities use it. Within the last two years, the system has been used in support of Title V permit applications at Department of Defense facilities. Growth in the user community, changes and additions to reference emission factor data, and changing regulatory requirements have demanded additions and enhancements to the system. These changes have ranged from adding or updating an emission factor to restructuring databases and adding new capabilities. Quality assurance (QA) procedures have been developed to ensure that emission calculations are correct even when databases are reconfigured and major changes in calculation procedures are implemented. This paper describes these QA and updating procedures. Some user facilities include light industrial operations associated with aircraft maintenance. These facilities have operations such as fiberglass and composite layup and plating operations for which standard emission factors are not available or are inadequate. In addition, generally applied procedures such as material balances may need special treatment to work in an automated environment, for example, in the use of oils and greases and when materials such as polyurethane paints react chemically during application. Some techniques used in these situations are highlighted here. To provide a framework for the main discussions, this paper begins with a description of AQUIS.

Smith, A.E.; Tschanz, J.; Monarch, M.

1996-05-01T23:59:59.000Z

56

U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information...

57

Individual Permit for Storm Water  

NLE Websites -- All DOE Office Websites (Extended Search)

Individual Permit Individual Permit Individual Permit for Storm Water The Individual Permit authorizes the discharge of storm water associated with historical industrial activities at LANL from specified solid waste management units and areas of concern, collectively referred to as Sites. October 15, 2012 Sandia Canyon Wetlands Sandia Canyon Wetlands in the early morning looking north. Get Expertise Environmental Communications & Public Involvement Email In the Individual Permit, to 'minimize' means to reduce and/or eliminate discharges of pollutants in storm water to the extent achievable. What is the Individual Permit for Storm Water? The Permit - NPDES No. NM0030759 - was issued by the U.S. Environmental Protection Agency, Region 6, on September 30, 2010 to Los Alamos National

58

U-021: Cisco Unified Communications Manager Directory Traversal...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Information U-125: Cisco ASA Multiple Bugs Let Remote Users Deny Service T-703: Cisco Unified Communications Manager Open Query Interface Lets Remote Users Obtain Database Contents...

59

V-073: IBM Tivoli Federated Identity Manager Signature Verification...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users Inject Commands on the Target System V-145: IBM Tivoli Federated Identity Manager Products Java Multiple Vulnerabilities...

60

An approach to detecting duplicate bug reports using natural language and execution information  

Science Conference Proceedings (OSTI)

An open source project typically maintains an open bug repository so that bug reports from all over the world can be gathered. When a new bug report is submitted to the repository, a person, called a triager, examines whether it is a duplicate of an ... Keywords: duplicate bug report, execution information, information retrieval

Xiaoyin Wang; Lu Zhang; Tao Xie; John Anvik; Jiasu Sun

2008-05-01T23:59:59.000Z

Note: This page contains sample records for the topic "manager bugs permit" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Water Permits (Louisiana)  

Energy.gov (U.S. Department of Energy (DOE))

The Water Permits Division authorizes permits administered under the Water Quality Regulations. Louisiana's Water Quality Regulations require permits for the discharge of pollutants from any point...

62

Aquatic Habitat Protection Permit (Saskatchewan, Canada) | Open...  

Open Energy Info (EERE)

aID5044&FilenameAquatic+Habitat+Protection+Permit+Application.pdf&lEnglish Summary The Environmental Management and Protection Act, 2002 (EMPA) provides for the protection of...

63

U-141: Sourcefire Defense Center Bugs | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Sourcefire Defense Center Bugs 1: Sourcefire Defense Center Bugs U-141: Sourcefire Defense Center Bugs April 5, 2012 - 8:30am Addthis PROBLEM: Sourcefire Defense Center Bugs Let Remote Users Traverse the Directory, Access the Database, and Conduct Cross-Site Scripting Attacks PLATFORM: Version(s): prior to 4.10.2.3 ABSTRACT: Several vulnerabilities were reported in Sourcefire Defense Center. A remote user can conduct cross-site scripting attacks. A remote user can access the database. A remote user can view files on the target system reference LINKS: Original Advisory Security Tracker ID 1026890 Secunia Advisory 48667 IMPACT ASSESSMENT: Medium Discussion: A remote user can cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the Sourcefire Defense

64

U-141: Sourcefire Defense Center Bugs | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Sourcefire Defense Center Bugs 1: Sourcefire Defense Center Bugs U-141: Sourcefire Defense Center Bugs April 5, 2012 - 8:30am Addthis PROBLEM: Sourcefire Defense Center Bugs Let Remote Users Traverse the Directory, Access the Database, and Conduct Cross-Site Scripting Attacks PLATFORM: Version(s): prior to 4.10.2.3 ABSTRACT: Several vulnerabilities were reported in Sourcefire Defense Center. A remote user can conduct cross-site scripting attacks. A remote user can access the database. A remote user can view files on the target system reference LINKS: Original Advisory Security Tracker ID 1026890 Secunia Advisory 48667 IMPACT ASSESSMENT: Medium Discussion: A remote user can cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the Sourcefire Defense

65

Regulatory and Permitting Issues  

DOE Green Energy (OSTI)

As part of the West Coast Regional Carbon Sequestration Partnership (WESTCARB), Terralog Technologies USA, Inc., reviewed current state and federal regulations related to carbon dioxide capture and storage within geologic formations and enhanced carbon uptake in terrestrial ecosystems. We have evaluated and summarized the current and possible future permitting requirements for the six states that comprise the West Coast Regional Partnership. Four options exist for CO{sub 2} injection into appropriate geologic formations, including storage in: (1) oil and gas reservoirs, (2) saline formations, (3) unmineable coal beds, and (4) salt caverns. Terrestrial CO{sub 2} sequestration involves improved carbon conservation management (e.g. reduction of deforestation), carbon substitution (e.g., substitution for fossil fuel-based products, energy conservation through urban forestry, biomass for energy generation), and improved carbon storage management (e.g., expanding the storage of carbon in forest ecosystems). The primary terrestrial options for the West Coast Region include: (1) reforestation of under-producing lands (including streamside forest restoration), (2) improved forest management, (3) forest protection and conservation, and (4) fuel treatments for the reduction of risk of uncharacteristically severe fires (potentially with associated biomass energy generation). The permits and/or contracts required for any land-use changes/disturbances and biomass energy generation that may occur as part of WESTCARB's activities have been summarized for each state.

Larry Myer

2005-12-01T23:59:59.000Z

66

V-016: HP Performance Insight Bugs with Sybase Database Let Remote...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Performance Insight Bugs with Sybase Database Let Remote Users Deny Service and Take Full Control of the Target System V-016: HP Performance Insight Bugs with Sybase Database Let...

67

V-183: Cisco TelePresence TC and TE Bugs Let Remote Users Deny...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Cisco TelePresence TC and TE Bugs Let Remote Users Deny Service and Remote Adjacent Authenticated Users Gain Root Shell Access V-183: Cisco TelePresence TC and TE Bugs Let...

68

U-045: Windows Win32k.sys Keyboard Layout Bug Lets Local Users...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny Service U-045: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny Service November 25, 2011 - 9:00am...

69

T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

68: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request Forgery Attacks and Execute Arbitrary Code T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site...

70

U-092: Sudo Format String Bug Lets Local Users Gain Elevated...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Sudo Format String Bug Lets Local Users Gain Elevated Privileges U-092: Sudo Format String Bug Lets Local Users Gain Elevated Privileges January 31, 2012 - 5:45am Addthis...

71

Microsoft Word - BUGS_The Next Smart Grid Peak Resource Final...  

NLE Websites -- All DOE Office Websites (Extended Search)

April 15, 2010 DOENETL-20101406 Backup Generators (BUGS): The Next Smart Grid Peak Resource Backup Generators (BUGS): The Next Smart Grid Peak Resource v1.0 ii DISCLAIMER This...

72

U-073: Bugzilla Flaws Permit Cross-Site Scripting and Cross-Site Request  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

73: Bugzilla Flaws Permit Cross-Site Scripting and Cross-Site 73: Bugzilla Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks U-073: Bugzilla Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks January 3, 2012 - 10:30am Addthis PROBLEM: Bugzilla Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks PLATFORM: Version(s): prior to 3.4.13, 3.6.7, 4.0.3, 4.2rc1 ABSTRACT: Several vulnerabilities were reported in Bugzilla. A remote user can conduct cross-site scripting attacks. reverence LINKS: SecurityTracker Alert ID: 1026480 3.4.12 Security Advisory Bug 697699 Bug 703975 Bug 703983 IMPACT ASSESSMENT: Medium Discussion: Tabular and graphical reports, as well as new charts have a debug mode which displays raw data as plain text. This text is not correctly escaped and a crafted URL could use this vulnerability to inject code leading to

73

Bed bugs are blood-sucking insects in the family Cimicidae. Both nymphs  

E-Print Network (OSTI)

- trol this pest. IDENTIFICATION AND LIFE CYCLE Adult bed bugs (Figure 1) are oval, wing- less, about 1/5 inch long, and rusty red or mahogany. Their bodies are flattened, they have well-developed antennae, conenose bugs (also known as kissing bugs), by their smaller size, more rounded shape, and lack of wings

Hammock, Bruce D.

74

ConAir: featherweight concurrency bug recovery via single-threaded idempotent execution  

Science Conference Proceedings (OSTI)

Many concurrency bugs are hidden in deployed software and cause severe failures for end-users. When they finally manifest and become known by developers, they are difficult to fix correctly. To support end-users, we need techniques that ... Keywords: bug fixing, concurrency bugs, failure recovery, idempotency, static analysis

Wei Zhang; Marc de Kruijf; Ang Li; Shan Lu; Karthikeyan Sankaralingam

2013-04-01T23:59:59.000Z

75

Microsoft Word - Final BUGS article final.docx  

NLE Websites -- All DOE Office Websites (Extended Search)

October 18, 2010 DOE/NETL-2010/1435 BUGS: The Next Smart Grid Peak Resource? BUGS: The Next Smart Grid Peak Resource? 2 Prepared by: Booz Allen Hamilton (BAH) Steve Pullins Horizon Energy Group DOE Contract number: DE-FE000400 BUGS: The Next Smart Grid Peak Resource? 3 Acknowledgements This report was prepared by Booz Allen Hamilton, Inc. (BAH) for the United States Department of Energy's National Energy Technology Laboratory. This work was completed under DOE NETL Contract Number DE-FE000400, and performed under BAH Task 430.04. The authors wish to acknowledge the excellent guidance, contributions, and cooperation of the NETL staff, particularly: Steven Bossart, Integrated Electric Power Systems Division Director Keith Dodrill, Integrated Electric Power Systems Division NETL Technical Monitor

76

V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

IMPACT ASSESSMENT: High DISCUSSION: A remote user can exploit the valueOf() method of window.location to, in combination with some plugins, inject scripting code to cause...

77

Brown Marmorated The brown marmorated stink bug (BMSB), Halyomorpha  

E-Print Network (OSTI)

abdominal edge extending beyond wings MATURE NYMPH Banded antennae Spines in front of eyes and on shoulder edges Banded legs Dark bands on wing tips Blue-green metallic depressions on head and shoulder,UC JACKKELLYCLARK,UC RED SHOULDERED STINK BUG Edgeofabdomenconcealed;antennal bands, if present, are not white; less

Ishida, Yuko

78

Is this a bug or an obsolete test?  

Science Conference Proceedings (OSTI)

In software evolution, developers typically need to identify whether the failure of a test is due to a bug in the source code under test or the obsoleteness of the test code when they execute a test suite. Only after finding the cause of a failure can ...

Dan Hao, Tian Lan, Hongyu Zhang, Chao Guo, Lu Zhang

2013-07-01T23:59:59.000Z

79

Coalfleet IGCC Permits Database  

Science Conference Proceedings (OSTI)

The CoalFleet IGCC Permits Database presents comprehensive information on permitting requirements and permit conditions for Integrated Gasification Combined Cycle (IGCC) power plants in an online database format. This Technical Update is a compilation of the Database contents as of April 1, 2009.

2009-05-01T23:59:59.000Z

80

T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

68: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site 68: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request Forgery Attacks and Execute Arbitrary Code T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request Forgery Attacks and Execute Arbitrary Code March 2, 2011 - 3:05pm Addthis PROBLEM: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request Forgery Attacks and Execute Arbitrary Code. PLATFORM: Firefox, Thunderbird, SeaMonkey ABSTRACT: Mozilla developers identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and Mozilla presume that with enough effort at least some of these could be exploited to run arbitrary code. reference LINKS:

Note: This page contains sample records for the topic "manager bugs permit" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Presidential Permits | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Assurance Cybersecurity Below is a listing of all the presidential permits grouped by Canada and Mexico. View the Presidental Permits - Mexico View the Presidential Permits -...

82

Stormwater Permits (Vermont)  

Energy.gov (U.S. Department of Energy (DOE))

Stormwater permits are required for the construction of a new generation facility, the reconstruction or expansion of a facility, the operation of a generation facility which discharges stormwater...

83

OpenEI/URDB Bug? | OpenEI Community  

Open Energy Info (EERE)

OpenEI/URDB Bug? OpenEI/URDB Bug? Home > Groups > Utility Rate Clarknd's picture Submitted by Clarknd(20) Member 26 November, 2012 - 07:39 I ran into a problem today on the Utility Rate Database (URDB). Every time I select the "Assume net metering (buy = sell)" box and go to save the page for some reason it doesn't save that change and reverts back to "No" rather than "Yes". Groups: Utility Rate Login to post comments Latest discussions Rmckeel New page curation tool Posted: 7 May 2013 - 08:16 by Rmckeel Rmckeel Considering removing "Show Preview" button on utility rate form edit Posted: 22 Apr 2013 - 13:55 by Rmckeel 5 comment(s) 1 of 10 ›› Groups Menu You must login in order to post into this group. Latest discussion comments NickL

84

Metabolic engineering of microorganisms for biofuels production: from bugs to synthetic biology to fuels  

E-Print Network (OSTI)

DK, Weiss R: Synthetic biology: new engineering rules for anfrom bugs to synthetic biology to fuels Sung Kuk Lee, Howardengineering and synthetic biology will provide new tools for

Kuk Lee, Sung

2010-01-01T23:59:59.000Z

85

DON'T LET THE BED BUGS BITE We've all heard the saying, "sleep tight, don't let the bed bugs bite." Most of us have never  

E-Print Network (OSTI)

and appear bright red after feeding. The wings of bed bugs are vestigial, so they cannot fly. Bed bugs can. Small, flat, or raised bumps on the skin are the most common sign; redness, swelling, and itching

Bertini, Robert L.

86

NSLS Committees | Work Planning/Permit Review Committee  

NLE Websites -- All DOE Office Websites (Extended Search)

require enhanced work planning. Committees review and approve submitted work permits. NSLS reports to Operations Section Head, Emil Zitvogel. NSLS-II reports to ESH Manager,...

87

HQ Work Control Permit | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

HQ Work Control Permit HQ Work Control Permit HQ Work Control Permit To ensure safe operations when undertaking work at DOE Headquarters, the Office of Headquarters Health and Safety has developed a Work Permit document (doc) to help ensure the safety of all workers and headquarters employees. The form should be completed and brought to the Office of Headquarters Safety, Health and Security office at GE-112 at the Forrestal facility, or the Germantown Building Manager's office at E-076 for review and sign off. Any questions can be directed to the HQ Health and Safety office on (202) 586-1005. HQ_Work_Control_Permit.docx More Documents & Publications Preliminary Notice of Violation, Petsco and Son, Inc - EA-96-06 OSS 19.10 Barriers and Postings 5/26/95 OSS 19.3 Confined Space Entry 5/23/95

88

HQ Work Control Permit | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

HQ Work Control Permit HQ Work Control Permit HQ Work Control Permit To ensure safe operations when undertaking work at DOE Headquarters, the Office of Headquarters Health and Safety has developed a Work Permit document (doc) to help ensure the safety of all workers and headquarters employees. The form should be completed and brought to the Office of Headquarters Safety, Health and Security office at GE-112 at the Forrestal facility, or the Germantown Building Manager's office at E-076 for review and sign off. Any questions can be directed to the HQ Health and Safety office on (202) 586-1005. HQ_Work_Control_Permit.docx More Documents & Publications Preliminary Notice of Violation, Petsco and Son, Inc - EA-96-06 OSS 19.3 Confined Space Entry 5/23/95 WA_02_026_UNITED_TECHNOLOGIES_Waiver_of_Domestic_and_Foreign

89

WuKong: automatically detecting and localizing bugs that manifest at large system scales  

Science Conference Proceedings (OSTI)

A key challenge in developing large scale applications is finding bugs that are latent at the small scales of testing, but manifest themselves when the application is deployed at a large scale. Here, we ascribe a dual meaning to "large scale"---it could ... Keywords: feature reconstruction, program behavior prediction, scale-dependent bug

Bowen Zhou; Jonathan Too; Milind Kulkarni; Saurabh Bagchi

2013-06-01T23:59:59.000Z

90

Catch me if you can: performance bug detection in the wild  

Science Conference Proceedings (OSTI)

Profilers help developers to find and fix performance problems. But do they find performance bugs -- performance problems that real users actually notice? In this paper we argue that -- especially in the case of interactive applications -- traditional ... Keywords: latency bug, perceptible performance, profiling

Milan Jovic; Andrea Adamoli; Matthias Hauswirth

2011-10-01T23:59:59.000Z

91

T-700:Red Hat: kernel security, bug fix, and enhancement update |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

700:Red Hat: kernel security, bug fix, and enhancement update 700:Red Hat: kernel security, bug fix, and enhancement update T-700:Red Hat: kernel security, bug fix, and enhancement update August 24, 2011 - 3:45pm Addthis PROBLEM: Updated kernel packages that fix several security issues, various bugs, and add two enhancements are now available for Red Hat Enterprise Linux 6. PLATFORM: Red Hat Enterprise Linux Desktop (v. 6) Red Hat Enterprise Linux HPC Node (v. 6) Red Hat Enterprise Linux Server (v. 6) Red Hat Enterprise Linux Server EUS (v. 6.1.z) Red Hat Enterprise Linux Workstation (v. 6) ABSTRACT: Red Hat: kernel security, bug fix, and enhancement update. reference LINKS: RHSA-2011: 1189-1 Secunia Advisory: SA45746 Red Hat Download CVE-2011-1182 , CVE-2011-1576 CVE-2011-1593 , CVE-2011-1776 CVE-2011-1898 , CVE-2011-2183

92

V-040: Apache Tomcat Bug Lets Remote Users Bypass Security Constraints |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Apache Tomcat Bug Lets Remote Users Bypass Security 0: Apache Tomcat Bug Lets Remote Users Bypass Security Constraints V-040: Apache Tomcat Bug Lets Remote Users Bypass Security Constraints December 5, 2012 - 1:00am Addthis PROBLEM: Apache Tomcat Bug Lets Remote Users Bypass Security Constraints PLATFORM: Version(s): 6.0.0 - 6.0.35, 7.0.0 - 7.0.29 ABSTRACT: A vulnerability was reported in Apache Tomcat. REFERENCE LINKS: Apache Tomcat Red Hat Bugzilla - Bug 883634 SecurityTracker Alert ID: 1027833 CVE-2012-3546 IMPACT ASSESSMENT: High DISCUSSION: When using FORM authentication it was possible to bypass the security constraint checks in the FORM authenticator by appending /j_security_check to the end of the URL if some other component (such as the Single-Sign-On valve) had called request.setUserPrincipal() before the call to

93

V-098: Linux Kernel Extended Verification Module Bug Lets Local Users Deny  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Linux Kernel Extended Verification Module Bug Lets Local 8: Linux Kernel Extended Verification Module Bug Lets Local Users Deny Service V-098: Linux Kernel Extended Verification Module Bug Lets Local Users Deny Service February 25, 2013 - 12:12am Addthis PROBLEM: Linux Kernel Extended Verification Module Bug Lets Local Users Deny Service PLATFORM: The Linux Kernel prior to 3.7.5 ABSTRACT: A vulnerability was reported in the Linux Kernel. REFERENCE LINKS: The Linux Kernel Archives Linux Kernel Red Hat Bugzilla - Bug 913266 SecurityTracker Alert ID: 1028196 CVE-2013-0313 IMPACT ASSESSMENT: Medium DISCUSSION: A local user can exploit a null pointer dereference in the evm_update_evmxattr() function in 'security/integrity/evm/evm_crypto.c' to cause the target system to crash. IMPACT: A local user can cause denial of service conditions.

94

U-068:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated 8:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated Privileges U-068:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated Privileges December 23, 2011 - 8:45am Addthis PROBLEM: Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated Privileges PLATFORM: Red Hat Enterprise Linux Desktop (v. 6) Red Hat Enterprise Linux HPC Node (v. 6) Red Hat Enterprise Linux Server (v. 6) Red Hat Enterprise Linux Server AUS (v. 6.2) Red Hat Enterprise Linux Server EUS (v. 6.2.z) Red Hat Enterprise Linux Workstation (v. 6) ABSTRACT: A local privileged user on the guest operating system can obtain elevated privileges on the target system. reference LINKS: Red Hat kernel security and bug fix update SecurityTracker Alert ID: 1026453 SecurityTracker Alert ID: 1026454

95

EIS-0442: Reauthorization of Permits, Maintenance, and Vegetation Management on Western Area Power Administration Transmission Lines on Forest Service Lands, Colorado, Nebraska, and Utah  

Energy.gov (U.S. Department of Energy (DOE))

This EIS is being prepared jointly by DOEs Western Area Power Administration and the U.S. Forest Service. The EIS evaluates the potential environmental impacts of Westerns proposed changes to vegetation management along its transmission line rights-of-way on National Forest System lands in Colorado, Utah, and Nebraska.

96

Aquatic Habitat Protection Permit (Saskatchewan, Canada) | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Aquatic Habitat Protection Permit (Saskatchewan, Canada) Aquatic Habitat Protection Permit (Saskatchewan, Canada) Aquatic Habitat Protection Permit (Saskatchewan, Canada) < Back Eligibility Agricultural Commercial Construction Developer Industrial Installer/Contractor Institutional Investor-Owned Utility Local Government Low-Income Residential Multi-Family Residential Municipal/Public Utility Nonprofit Residential Rural Electric Cooperative Schools Utility Savings Category Buying & Making Electricity Water Home Weatherization Solar Wind Program Info State Saskatchewan Program Type Environmental Regulations Siting and Permitting Provider Saskatchewan Ministry of the Environment The Environmental Management and Protection Act, 2002 (EMPA) provides for the protection of aquatic habitat and states that a permit is required: to

97

Early Site Permit Model Program Plan  

Science Conference Proceedings (OSTI)

"The Early Site Permit (ESP) Model Program Plan (MPP)" provides step-by-step guidelines on preparing an ESP application. The Plan identifies work tasks necessary to prepare the application and guides applicants on effectively planning and managing the ESP program, including identifying and managing subcontracted resources. A model program plan details how to prepare applications. The MPP also describes interfaces among tasks and provides a generic schedule for executing the steps in preparing an ESP appl...

2002-06-12T23:59:59.000Z

98

U-210: Linux Kernel epoll_ctl() Bug Lets Local Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

10: Linux Kernel epoll_ctl() Bug Lets Local Users Deny Service 10: Linux Kernel epoll_ctl() Bug Lets Local Users Deny Service U-210: Linux Kernel epoll_ctl() Bug Lets Local Users Deny Service July 11, 2012 - 7:00am Addthis PROBLEM: Linux Kernel epoll_ctl() Bug Lets Local Users Deny Service PLATFORM: Version(s): 2.6.x ABSTRACT: A vulnerability was reported in the Linux Kernel. A local user can cause denial of service conditions. reference LINKS: The Vendor's Advisory SecurityTracker Alert ID: 1027237 SecurityTracker Alert ID: 1027240 Red Hat advisory CVE-2012-3375 IMPACT ASSESSMENT: Medium Discussion: The Linux kernel's Event Poll (epoll) subsystem does not properly handle resource clean up when an ELOOP error code is returned. A local user can exploit this to cause the target system to crash. Impact: A local user can cause the target system to crash.

99

U-008: Symantec Data Loss Prevention Bugs in KeyView Filter Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

08: Symantec Data Loss Prevention Bugs in KeyView Filter Lets 08: Symantec Data Loss Prevention Bugs in KeyView Filter Lets Remote Users Deny Service U-008: Symantec Data Loss Prevention Bugs in KeyView Filter Lets Remote Users Deny Service October 11, 2011 - 8:00am Addthis PROBLEM: Symantec Data Loss Prevention Bugs in KeyView Filter Lets Remote Users Deny Service PLATFORM: Symantec Data Loss Prevention Enforce/Detection Servers for Windows 10.x, 11.x ABSTRACT: A remote user can create a file that, when processed by the target filter, will cause partial denial of service conditions. reference LINKS: Symantec Security Advisory SYM11-013 SecurityTracker Alert ID: 1026157 IMPACT ASSESSMENT: Medium Discussion: Multiple vulnerabilities were reported in Symantec Data Loss Prevention. A remote user can cause denial of service conditions on the target system.A

100

U-217: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Red Hat Certificate System Bugs Let Remote Users Conduct 7: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site Scripting and Denial of Service Attacks U-217: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site Scripting and Denial of Service Attacks July 20, 2012 - 7:00am Addthis PROBLEM: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site Scripting and Denial of Service Attacks PLATFORM: Red Hat Certificate System v8 ABSTRACT: Two vulnerabilities were reported in Red Hat Certificate System. A remote user can conduct cross-site scripting attacks. A remote authenticated user can revoke the CA certificate. reference LINKS: Advisory: RHSA-2012:1103-1 SecurityTracker Alert ID: 1027284 CVE-2012-2662 CVE-2012-3367 IMPACT ASSESSMENT: Medium Discussion: The Agent and End Entity pages do not properly filter HTML code from

Note: This page contains sample records for the topic "manager bugs permit" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

U-130: JBoss Operations Network LDAP Authentication Bug Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: JBoss Operations Network LDAP Authentication Bug Lets Remote 0: JBoss Operations Network LDAP Authentication Bug Lets Remote Users Bypass Authentication U-130: JBoss Operations Network LDAP Authentication Bug Lets Remote Users Bypass Authentication March 21, 2012 - 7:00am Addthis PROBLEM: JBoss Operations Network LDAP Authentication Bug Lets Remote Users Bypass Authentication PLATFORM: JBoss Operations Network 2.x ABSTRACT: A vulnerability was reported in JBoss Operations Network. A remote user can login with an arbitrary password in certain cases. reference LINKS: SecurityTracker Alert ID: 1026826 Secunia Advisory SA48471 CVE-2012-1100 IMPACT ASSESSMENT: Medium Discussion: The vulnerability is caused due to an error within the Lightweight Directory Access Protocol (LDAP) authentication when handling invalid bind account credentials, which can be exploited to log-in to LDAP-based

102

V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

10: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 10: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code March 13, 2013 - 12:04am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): 1.6.602.171 and prior for Windows/Mac; other versions on other platforms ABSTRACT: Several vulnerabilities were reported in Adobe Flash Player. REFERENCE LINKS: Adobe Vulnerability identifier: APSB13-09 SecurityTracker Alert ID: 1028277 CVE-2013-0646 CVE-2013-0650 CVE-2013-1371 CVE-2013-1375 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user.

103

U-074: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Microsoft .NET Bugs Let Remote Users Execute Arbitrary 4: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users U-074: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users January 4, 2012 - 8:00am Addthis PROBLEM: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users . PLATFORM: Windows XP Service Pack 3 Windows XP Professional x64 Edition Service Pack 2 Windows Server 2003 Service Pack 2 Windows Server 2003 x64 Edition Service Pack 2 Windows Server 2003 with SP2 for Itanium-based Systems Windows Vista Service Pack 2 Windows Vista x64 Edition Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 Windows Server 2008 for x64-based Systems Service Pack 2

104

U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain 9: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication May 1, 2012 - 7:00am Addthis PROBLEM: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication PLATFORM: Red Hat Enterprise MRG v2 for Red Hat Enterprise Linux (version 6) ABSTRACT: A vulnerability was reported in Red Hat Enterprise MRG Messaging. A remote user can access cluster messages and view the internal configuration. reference LINKS: SecurityTracker Alert ID: 1026990 CVE-2011-3620 Red Hat advisory IMPACT ASSESSMENT: High Discussion: Qpid may accept arbitrary passwords and SASL mechanims. A remote user on the local private interconnect network with knowledge of a valid cluster

105

V-016: HP Performance Insight Bugs with Sybase Database Let Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: HP Performance Insight Bugs with Sybase Database Let Remote 6: HP Performance Insight Bugs with Sybase Database Let Remote Users Deny Service and Take Full Control of the Target System V-016: HP Performance Insight Bugs with Sybase Database Let Remote Users Deny Service and Take Full Control of the Target System November 5, 2012 - 6:00am Addthis PROBLEM: HP Performance Insight Bugs with Sybase Database Let Remote Users Deny Service and Take Full Control of the Target System PLATFORM: HP Performance Insight v5.31, v5.40 and v5.41 running on HP-UX, Solaris, Linux, and Windows and using Sybase as the database ABSTRACT: Two vulnerabilities were reported in HP Performance Insight. REFERENCE LINKS: HP Support Document ID: c03555488 SecurityTracker Alert ID: 1027719 CVE-2012-3269 CVE-2012-3270 IMPACT ASSESSMENT: High DISCUSSION:

106

U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

57: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny 57: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service September 12, 2012 - 6:00am Addthis PROBLEM: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service PLATFORM: ColdFusion 10, 9.0.2, 9.0.1, 9.0, 8.0.1, and 8.0 for Windows, Macintosh and UNIX ABSTRACT: Adobe ColdFusion is prone to a remote denial-of-service vulnerability. reference LINKS: Adobe Security bulletins and advisories Adobe Vulnerability identifier: APSB12-21 SecurityTracker Alert ID: 1027516 Bugtraq ID: 55499 CVE-2012-2048 IMPACT ASSESSMENT: Medium Discussion: Adobe has released a security hotfix for ColdFusion 10 and earlier versions for Windows, Macintosh and UNIX. This update resolves a vulnerability which

107

U-079: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

79: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute 79: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code U-079: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code January 11, 2012 - 8:00am Addthis PROBLEM: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code. PLATFORM: Adobe Acrobat/Reader Version(s): 9.x prior to 9.5, 10.x prior to 10.1.2 ABSTRACT: A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026496 Adobe Security Bulletin APSB12-01 CVE-2011-2462, CVE-2011-4369, CVE-2011-4370, CVE-2011-4371, CVE-2011-4372, CVE-2011-4373. IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in Adobe Acrobat/Reader. A remote

108

U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

21: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, 21: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information March 9, 2012 - 7:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information PLATFORM: Apple iOS Version(s): prior to 5.1 ABSTRACT: Multiple vulnerabilities were reported in Apple iOS. reference LINKS: SecurityTracker Alert ID: 1026774 Apple Security Updates About the security content of iOS 5.1 Software Update CVE-2012-0641, CVE-2012-0642, CVE-2012-0643, CVE-2011-3453, CVE-2012-0644,

109

U-233: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote 3: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote Authenticated Users Gain Elevated Privileges U-233: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote Authenticated Users Gain Elevated Privileges August 13, 2012 - 7:00am Addthis PROBLEM: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote Authenticated Users Gain Elevated Privileges PLATFORM: Oracle Database Server versions 10.2.0.3, 10.2.0.4, 10.2.0.5, 11.1.0.7, 11.2.0.2, 11.2.0.3 ABSTRACT: A remote authenticated user with 'Create Table' privileges can gain 'SYS' privileges on the target system. Reference LINKS: Oracle Security Alert Oracle Security Alert - CVE-2012-3132 Risk Matrices SecurityTracker Alert ID: 1027367 CVE-2012-3132 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Oracle Database. This vulnerability is not

110

U-026: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Cisco Small Business SRP500 Series Bug Lets Remote Users 6: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject Commands U-026: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject Commands November 3, 2011 - 8:15am Addthis PROBLEM: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject Commands. PLATFORM: The following models are affected when running firmware prior to version 1.1.24: Cisco SRP521W Cisco SRP526W Cisco SRP527W The following models are affected when running firmware prior to version 1.2.1: Cisco SRP541W Cisco SRP546W Cisco SRP547W ABSTRACT: A remote user can create a URL that, when loaded by the target authenticated administrative user, will execute arbitrary commands on the target system. reference LINKS: Advisory ID: cisco-sa-20111102-srp500 SecurityTracker Alert ID: 1026266

111

U-155: WebCalendar Access Control and File Inclusion Bugs Let Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: WebCalendar Access Control and File Inclusion Bugs Let 5: WebCalendar Access Control and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code U-155: WebCalendar Access Control and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code April 25, 2012 - 7:00am Addthis PROBLEM: WebCalendar Access Control and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code PLATFORM: 1.2.4 and prior versions ABSTRACT: Two vulnerabilities were reported in WebCalendar. A remote user may be able to execute arbitrary PHP code on the target system. reference links: SecurityTracker Alert ID: 1026966 CVE-2012-1495 CVE-2012-1496 IMPACT ASSESSMENT: Medium Discussion: A remote user can access '/install/index.php' to potentially modify '/includes/settings/' with arbitrary values or PHP code. A remote

112

T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3:Adobe Flash Player Multiple Bugs Let Remote Users Obtain 3:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code September 22, 2011 - 8:00am Addthis PROBLEM: Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code. PLATFORM: Adobe Flash Player 10.3.183.7 and earlier versions for Windows, Macintosh, Linux and Solaris. Adobe Flash Player 10.3.186.6 and earlier versions for Android. ABSTRACT: An attacker can exploit this issue by enticing an unsuspecting victim into visiting a malicious website. reference LINKS: Adobe Security Bulletin

113

V-037: Wireshark Multiple Bugs Let Remote Users Deny Service | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Wireshark Multiple Bugs Let Remote Users Deny Service 7: Wireshark Multiple Bugs Let Remote Users Deny Service V-037: Wireshark Multiple Bugs Let Remote Users Deny Service November 30, 2012 - 3:30am Addthis PROBLEM: Wireshark Multiple Bugs Let Remote Users Deny Service PLATFORM: Version(s): prior to 1.6.12, 1.8.4 ABSTRACT: Several vulnerabilities were reported in Wireshark. REFERENCE LINKS: Wireshark Security Advisories Secunia Advisory SA51422 Seclists SecurityTracker Alert ID: 1027822 CVE-2012-5592 CVE-2012-5593 CVE-2012-5594 CVE-2012-5595 CVE-2012-5596 CVE-2012-5597 CVE-2012-5598 CVE-2012-5599 CVE-2012-5600 CVE-2012-5601 CVE-2012-5602 IMPACT ASSESSMENT: Medium DISCUSSION: Several vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions. A user can obtain potentially sensitive information.

114

U-163: PHP Command Parameter Bug Lets Remote Users Obtain Potentially  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: PHP Command Parameter Bug Lets Remote Users Obtain 3: PHP Command Parameter Bug Lets Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code U-163: PHP Command Parameter Bug Lets Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code May 7, 2012 - 7:00am Addthis PROBLEM: PHP Command Parameter Bug Lets Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code PLATFORM: Prior to 5.3.12 and 5.4.2 ABSTRACT: A vulnerability was reported in PHP. A remote user can obtain potentially sensitive information. A remote user can execute arbitrary code on the target system. reference LINKS: SecurityTracker Alert ID: 1027022 CVE-2012-1823 CVE-2012-2311 IMPACT ASSESSMENT: High Discussion: A remote user can submit a specially crafted request containing a command

115

V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Apple Safari Bugs Let Remote Users Execute Arbitrary Code 1: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks June 5, 2013 - 1:05am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks PLATFORM: Apple Safari prior to 6.0.5 ABSTRACT: Several vulnerabilities were reported in Apple Safari. REFERENCE LINKS: Apple Article: HT5785 SecurityTracker Alert ID: 1028627 CVE-2013-0926 CVE-2013-1009 CVE-2013-1012 CVE-2013-1013 CVE-2013-1023 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary

116

U-076: OpenSSL Bugs Let Remote Users Deny Service, Obtain Information, and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

76: OpenSSL Bugs Let Remote Users Deny Service, Obtain 76: OpenSSL Bugs Let Remote Users Deny Service, Obtain Information, and Potentially Execute Arbitrary Code U-076: OpenSSL Bugs Let Remote Users Deny Service, Obtain Information, and Potentially Execute Arbitrary Code January 6, 2012 - 8:15am Addthis PROBLEM: OpenSSL Bugs Let Remote Users Deny Service, Obtain Information, and Potentially Execute Arbitrary Code PLATFORM: OpenSSL prior to 0.9.8s; 1.x prior to 1.0.0f ABSTRACT: A remote user may be able to execute arbitrary code on the target system. reference LINKS: SecurityTracker Alert ID: 1026485 OpenSSL Security Advisory IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in OpenSSL. A remote user can cause denial of service conditions. A remote user can obtain sensitive information. A remote user may be able to execute arbitrary code on the

117

V-135: Cisco ASA Multiple Bugs Let Remote Users Deny Service | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Cisco ASA Multiple Bugs Let Remote Users Deny Service 5: Cisco ASA Multiple Bugs Let Remote Users Deny Service V-135: Cisco ASA Multiple Bugs Let Remote Users Deny Service April 16, 2013 - 12:21am Addthis PROBLEM: Cisco ASA Multiple Bugs Let Remote Users Deny Service PLATFORM: Cisco ASA Software for Cisco ASA 5500 Series Adaptive Security Appliances, Cisco ASA Services Module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers, and Cisco ASA 1000V Cloud Firewall are affected by multiple vulnerabilities. Affected versions of Cisco ASA Software will vary depending on the specific vulnerability. ABSTRACT: Several vulnerabilities were reported in Cisco ASA. REFERENCE LINKS: Cisco Security Advisory Secunia Advisory SA52989 SecurityTracker Alert ID: 1028415 CVE-2013-1149 CVE-2013-1150 CVE-2013-1151 CVE-2013-1152

118

V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site 0: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information April 23, 2013 - 12:26am Addthis PROBLEM: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information PLATFORM: Apache ActiveMQ versions prior to 5.8.0 ABSTRACT: Several vulnerabilities were reported in Apache ActiveMQ. REFERENCE LINKS: Apache ActiveMQ SecurityTracker Alert ID: 1028457 CVE-2012-6092 CVE-2012-6551 CVE-2013-3060 IMPACT ASSESSMENT: High DISCUSSION: Several web demos do not properly filter HTML code from user-supplied input

119

T-589: Citrix XenApp and Citrix Presentation Server Bug | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Citrix XenApp and Citrix Presentation Server Bug 9: Citrix XenApp and Citrix Presentation Server Bug T-589: Citrix XenApp and Citrix Presentation Server Bug March 28, 2011 - 3:05pm Addthis PROBLEM: Citrix XenApp and Citrix Presentation Server Bug in ActiveSync Lets Remote Users Execute Arbitrary Code. PLATFORM: Citrix XenApp Presentation versions 4.5, 5 ABSTRACT: A vulnerability was reported in Citrix XenApp (Presentation Server). A remote user can execute arbitrary code on the target system. -------------------------------------------------------------------------------- LINKS: DOE-CIRC BULLETIN: http://www.doecirc.energy.gov/bulletins/t-589.shtml OTHER LINKS: Citrix Document: CTX128366 SecurityTracker Alert ID: 1025254 Citrix Support Technical Support Downloads --------------------------------------------------------------------------------

120

U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny 7: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service September 12, 2012 - 6:00am Addthis PROBLEM: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service PLATFORM: ColdFusion 10, 9.0.2, 9.0.1, 9.0, 8.0.1, and 8.0 for Windows, Macintosh and UNIX ABSTRACT: Adobe ColdFusion is prone to a remote denial-of-service vulnerability. reference LINKS: Adobe Security bulletins and advisories Adobe Vulnerability identifier: APSB12-21 SecurityTracker Alert ID: 1027516 Bugtraq ID: 55499 CVE-2012-2048 IMPACT ASSESSMENT: Medium Discussion: Adobe has released a security hotfix for ColdFusion 10 and earlier versions for Windows, Macintosh and UNIX. This update resolves a vulnerability which

Note: This page contains sample records for the topic "manager bugs permit" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

T-667: Red Hat Enterprise Linux kernel security and bug fix update |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Red Hat Enterprise Linux kernel security and bug fix update 7: Red Hat Enterprise Linux kernel security and bug fix update T-667: Red Hat Enterprise Linux kernel security and bug fix update July 13, 2011 - 7:24am Addthis PROBLEM: Red Hat Enterprise Linux kernel security and bug fix update PLATFORM: Vulnerable Linux Kernels; Red Hat Enterprise Linux Desktop (v. 6), Red Hat Enterprise Linux HPC Node (v. 6), Red Hat Enterprise Linux Server (v. 6), Red Hat Enterprise Linux Server EUS (v. 6.1.z), Red Hat Enterprise Linux Workstation (v. 6) ABSTRACT: It was found that the receive hook in the ipip_init() function in the ipip module, and in the ipgre_init() function in the ip_gre module, could be called before network namespaces setup is complete. If packets were received at the time the ipip or ip_gre module was still being loaded into

122

U-075: Apache Struts Bug Lets Remote Users Overwrite Files and Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

075: Apache Struts Bug Lets Remote Users Overwrite Files and 075: Apache Struts Bug Lets Remote Users Overwrite Files and Execute Arbitrary Code U-075: Apache Struts Bug Lets Remote Users Overwrite Files and Execute Arbitrary Code January 5, 2012 - 8:15am Addthis PROBLEM: Apache Struts Bug Lets Remote Users Overwrite Files and Execute Arbitrary Code PLATFORM: Version(s): 2.1.0 - 2.3.1 ABSTRACT: A remote user can execute arbitrary Java code on the target system. reference LINKS: SecurityTracker Alert ID: 1026484 Secunia Advisory SA47393 Bugtraq ID: 51257 Apache Struts 2 Documentation S2-008 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Apache Struts. A remote user can execute arbitrary Java code on the target system. A remote user can overwrite arbitrary files on the target system. A remote user can send specially

123

V-030: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

30: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny 30: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service V-030: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service November 21, 2012 - 3:00am Addthis PROBLEM: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service PLATFORM: ColdFusion 10 Update 1 and above for Windows ABSTRACT: Adobe ColdFusion Denial of Service Vulnerability REFERENCE LINKS: Adobe Vulnerability identifier: APSB12-25 SecurityTracker Alert ID: 1027787 Secunia Advisory SA51335 CVE-2012-5674 IMPACT ASSESSMENT: High DISCUSSION: A vulnerability was reported in Adobe ColdFusion. A remote user can cause denial of service conditions. A remote user can send specially crafted data to cause unspecified denial of service conditions on the target ColdFusion service on Windows Internet

124

U-045: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny Service  

NLE Websites -- All DOE Office Websites (Extended Search)

5: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny 5: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny Service U-045: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny Service November 25, 2011 - 9:00am Addthis PROBLEM: A vulnerability was reported in the Windows Kernel. A local user can cause denial of service conditions. PLATFORM: Windows Win32k.sys ABSTRACT: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny reference LINKS: SecurityTracker Alert ID: 1026347 Secunia ID: SA46919 IMPACT ASSESSMENT: Low Discussion: A vulnerability has been discovered in Microsoft Windows, which can be exploited by malicious, local users to cause a DoS (Denial of Service). The vulnerability is caused due to an indexing error in the win32k.sys driver when loading a keyboard layout file. This can be exploited to access

125

V-091: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary 1: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary Code V-091: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary Code February 14, 2013 - 12:22am Addthis PROBLEM: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary Code PLATFORM: Adobe Reader XI (11.0.01 and earlier) for Windows and Macintosh Adobe Reader X (10.1.5 and earlier) for Windows and Macintosh Adobe Reader 9.5.3 and earlier 9.x versions for Windows and Macintosh Adobe Acrobat XI (11.0.01 and earlier) for Windows and Macintosh Adobe Acrobat X (10.1.5 and earlier) for Windows and Macintosh Adobe Acrobat 9.5.3 and earlier 9.x versions for Windows and Macintosh ABSTRACT: Adobe has identified critical vulnerabilities in Adobe Reader and Acrobat REFERENCE LINKS: Adobe Reader and Acrobat Vulnerability Report

126

V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code 3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code March 18, 2013 - 1:53am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 6.0.3 ABSTRACT: Two vulnerabilities were reported in Apple Safari. REFERENCE LINKS: Apple security update, Article: HT1222 SecurityTracker Alert ID: 1028292 CVE-2013-0960 CVE-2013-0961 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. IMPACT: A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

127

T-563: Red Hat Directory Server Bugs Let Local Users Gain Elevated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Red Hat Directory Server Bugs Let Local Users Gain Elevated 3: Red Hat Directory Server Bugs Let Local Users Gain Elevated Privileges and Remote and Local Users Deny Service T-563: Red Hat Directory Server Bugs Let Local Users Gain Elevated Privileges and Remote and Local Users Deny Service February 23, 2011 - 7:00am Addthis PROBLEM: Red Hat Directory Server Bugs Let Local Users Gain Elevated Privileges and Remote and Local Users Deny Service. PLATFORM: Red Hat Directory Server v8 EL4, Red Hat Directory Server v8 EL5 ABSTRACT: Several vulnerabilities were reported in Red Hat Directory Server. A local user can obtain elevated privileges on the target system. A remote user can cause denial of service conditions. A local user can cause denial of service conditions. A remote user can send multiple simple paged search requests to cause the

128

U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, 2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information July 27, 2012 - 7:00am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information PLATFORM: Version(s):Apple Safari prior to 6.0 ABSTRACT: Multiple vulnerabilities were reported in Apple Safari. reference LINKS: The Vendor's Advisory Bugtraq ID: 54683 SecurityTracker Alert ID: 1027307 IMPACT ASSESSMENT:

129

U-053: Linux kexec Bugs Let Local and Remote Users Obtain Potentially  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

53: Linux kexec Bugs Let Local and Remote Users Obtain 53: Linux kexec Bugs Let Local and Remote Users Obtain Potentially Sensitive Information U-053: Linux kexec Bugs Let Local and Remote Users Obtain Potentially Sensitive Information December 7, 2011 - 7:30am Addthis PROBLEM: Linux kexec Bugs Let Local and Remote Users Obtain Potentially Sensitive Information . PLATFORM: Red Hat Enterprise Linux Desktop (v. 6) Red Hat Enterprise Linux HPC Node (v. 6) Red Hat Enterprise Linux Server (v. 6) Red Hat Enterprise Linux Workstation (v. 6) ABSTRACT: Several vulnerabilities were reported in Linux kexec. A remote or local user can obtain potentially sensitive information. reference LINKS: Red Hat Security Advisory: RHSA-2011:1532-3 SecurityTracker Alert ID: 1026375 IMPACT ASSESSMENT: Medium Discussion: Kdump uses the SSH "StrictHostKeyChecking=no" option when dumping to SSH

130

U-208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary 208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code U-208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code July 10, 2012 - 7:00am Addthis PROBLEM: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code PLATFORM: HP Operations Agent for AIX, HP-UX, Linux, Solaris, and Windows prior to v11.03.12. ABSTRACT: Two vulnerabilities were reported in HP Operations Agent. A remote user can execute arbitrary code on the target system reference LINKS: The Vendor's Advisory SecurityTracker Alert ID: 1027225 CVE-2012-2019 CVE-2012-2020 IMPACT ASSESSMENT: High Discussion: Potential security vulnerabilities have been identified with HP Operations Agent for AIX, HP-UX, Linux, Solaris, and Windows. The vulnerabilities could be remotely exploited resulting in the execution of arbitrary code.

131

U-072:Apache Tomcat Hash Table Collision Bug Lets Remote Users Deny Service  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

72:Apache Tomcat Hash Table Collision Bug Lets Remote Users Deny 72:Apache Tomcat Hash Table Collision Bug Lets Remote Users Deny Service U-072:Apache Tomcat Hash Table Collision Bug Lets Remote Users Deny Service December 30, 2011 - 9:15am Addthis PROBLEM: Apache Tomcat Hash Table Collision Bug Lets Remote Users Deny Service PLATFORM: apache Tomcat 5.5.34, 6.0.34, 7.0.22; and prior versions aBSTRACT: A remote user can cause performance to degrade on the target server. reference LINKS: Apache Tomcat Security Alert SecurityTracker Alert ID: 1026477 nruns Advisory SA-2011.004 Secunia Advisory SA47411 CVE-2011-4084 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Apache Tomcat. A remote user can cause denial of service conditions. A remote user can send specially crafted POST request values to trigger hash collisions and cause significant performance

132

T-538: HP OpenView Storage Data Protector Bug Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

T-538: HP OpenView Storage Data Protector Bug Lets Remote Users T-538: HP OpenView Storage Data Protector Bug Lets Remote Users Execute Arbitrary Code T-538: HP OpenView Storage Data Protector Bug Lets Remote Users Execute Arbitrary Code January 20, 2011 - 6:39am Addthis PROBLEM: HP OpenView Storage Data Protector Bug Lets Remote Users Execute Arbitrary Code. PLATFORM: HP OpenView Storage Data Protector v6.11 ABSTRACT: A vulnerability was reported in HP OpenView Storage Data Protector. A remote user can execute arbitrary code on the target system. reference LINKS: HP Security Bulletin SecurityTracker Alert ID: 1024983 CVE-2011-0273 IMPACT ASSESSMENT: High Discussion: A potential security vulnerability has been identified with HP OpenView Storage Data Protector. The vulnerability could be remotely exploited to execute arbitrary code.

133

U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Cisco Firewall Services Module Bugs Let Remote Users Execute 9: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service October 11, 2012 - 6:00am Addthis PROBLEM: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service PLATFORM: Version(s): prior to 4.1(9) ABSTRACT: Several vulnerabilities were reported in Cisco Firewall Services Module. reference LINKS: Cisco Advisory ID: cisco-sa-20121010-fwsm SecurityTracker Alert ID: 1027640 CVE-2012-4661 CVE-2012-4662 CVE-2012-4663 IMPACT ASSESSMENT: High Discussion: A remote user can send specially crafted DCERPC data through the target device to trigger a stack overflow in the DCERPC inspection engine and execute arbitrary code on the target device or cause the target device to

134

U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

42: HP Onboard Administrator Bugs Let Remote Users Gain Access, 42: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks April 6, 2012 - 7:00am Addthis PROBLEM: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks PLATFORM: HP Onboard Administrator (OA) up to and including v3.32 ABSTRACT: A remote user can obtain potentially sensitive information. reference LINKS: HP Support Document ID: c03263573 SecurityTracker Alert ID: 1026889 CVE-2012-0128, CVE-2012-0129, CVE-2012-0130 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in HP Onboard Administrator. A remote

135

V-189: Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users Deny  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users 9: Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users Deny Service on the Target Host V-189: Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users Deny Service on the Target Host July 1, 2013 - 12:48am Addthis PROBLEM: Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users Deny Service on the Target Host PLATFORM: VirtualBox 4.2.12 ABSTRACT: A vulnerability was reported in Oracle VirtualBox. REFERENCE LINKS: VirtualBox ticket: 11863 SecurityTracker Alert ID: 1028712 IMPACT ASSESSMENT: Medium DISCUSSION: A local user on the guest operating system can issue a 'tracepath' command to cause the network on the target host system to become unavailable. IMPACT: A local user on a guest operating system can cause denial of service conditions on the target host system.

136

V-063: Adobe ColdFusion Bugs Let Remote Users Gain Access and Obtain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Adobe ColdFusion Bugs Let Remote Users Gain Access and 3: Adobe ColdFusion Bugs Let Remote Users Gain Access and Obtain Information V-063: Adobe ColdFusion Bugs Let Remote Users Gain Access and Obtain Information January 7, 2013 - 1:00am Addthis PROBLEM: Adobe ColdFusion Bugs Let Remote Users Gain Access and Obtain Information PLATFORM: ColdFusion 10, 9.0.2, 9.0.1 and 9.0 for Windows, Macintosh and UNIX ABSTRACT: Adobe has identified three vulnerabilities affecting ColdFusion for Windows, Macintosh and UNIX REFERENCE LINKS: Adobe Security Bulletin APSA13-01 SecurityTracker Alert ID: 1027938 CVE-2013-0625 CVE-2013-0629 CVE-2013-0631 IMPACT ASSESSMENT: High DISCUSSION: A remote user can bypass authentication and take control of the target system [CVE-2013-0625]. Systems with password protection disabled or with no password set are affected.

137

U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: HP Onboard Administrator Bugs Let Remote Users Gain Access, 2: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks April 6, 2012 - 7:00am Addthis PROBLEM: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks PLATFORM: HP Onboard Administrator (OA) up to and including v3.32 ABSTRACT: A remote user can obtain potentially sensitive information. reference LINKS: HP Support Document ID: c03263573 SecurityTracker Alert ID: 1026889 CVE-2012-0128, CVE-2012-0129, CVE-2012-0130 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in HP Onboard Administrator. A remote

138

U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Cisco IOS Intrusion Prevention System DNS Processing Bug 9: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service September 27, 2012 - 4:07am Addthis PROBLEM: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service PLATFORM: Devices configured with Cisco IOS IPS are affected ABSTRACT: A vulnerability was reported in Cisco IOS. reference LINKS: SecurityTracker Alert ID: 1027580 Cisco Security Advisory CVE-2012-3950 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Cisco IOS. A remote user can cause denial of service conditions. A remote user can send specially crafted (but legitimate) DNS packets through the target device to cause the device to

139

U-203: HP Photosmart Bug Lets Remote Users Deny Service | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

03: HP Photosmart Bug Lets Remote Users Deny Service 03: HP Photosmart Bug Lets Remote Users Deny Service U-203: HP Photosmart Bug Lets Remote Users Deny Service July 2, 2012 - 8:00am Addthis PROBLEM: HP Photosmart Bug Lets Remote Users Deny Service PLATFORM: HP Photosmart Wireless e-All-in-One Printer series - B110 HP Photosmart e-All-in-One Printer series - D110 HP Photosmart Plus e-All-in-One Printer series - B210 HP Photosmart eStation All-in-One Printer series - C510 HP Photosmart Ink Advantage e-All-in-One Printer series - K510 HP Photosmart Premium Fax e-All-in-One Printer series - C410 ABSTRACT: A vulnerability was reported in HP Photosmart. A remote user can cause denial of service conditions. Reference LINKS: The Vendor's Advisory SecurityTracker Alert ID: 1027213 CVE-2012-2017 IMPACT ASSESSMENT: High Discussion:

140

U-231: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

31: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service 31: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service U-231: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service August 9, 2012 - 7:00am Addthis PROBLEM: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service PLATFORM: Version(s): ASA 5500 Series; 8.2 - 8.4 ABSTRACT: Two vulnerabilities were reported in Cisco ASA. A remote or remote authenticated user can cause denial of service conditions. reference LINKS: Release Notes for the Cisco ASA 5500 Series, 8.4(x) SecurityTracker Alert ID: 1027355 CVE-2012-2472 CVE-2012-2474 IMPACT ASSESSMENT: Medium Discussion: Two vulnerabilities were reported in Cisco ASA. 1. On systems with SIP inspection enabled, a remote user can send specially crafted SIP traffic to cause the target device to create many identical

Note: This page contains sample records for the topic "manager bugs permit" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, 2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information July 27, 2012 - 7:00am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information PLATFORM: Version(s):Apple Safari prior to 6.0 ABSTRACT: Multiple vulnerabilities were reported in Apple Safari. reference LINKS: The Vendor's Advisory Bugtraq ID: 54683 SecurityTracker Alert ID: 1027307 IMPACT ASSESSMENT:

142

V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site 0: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information April 23, 2013 - 12:26am Addthis PROBLEM: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information PLATFORM: Apache ActiveMQ versions prior to 5.8.0 ABSTRACT: Several vulnerabilities were reported in Apache ActiveMQ. REFERENCE LINKS: Apache ActiveMQ SecurityTracker Alert ID: 1028457 CVE-2012-6092 CVE-2012-6551 CVE-2013-3060 IMPACT ASSESSMENT: High DISCUSSION: Several web demos do not properly filter HTML code from user-supplied input

143

U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

41: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 41: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information August 22, 2012 - 7:00am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information PLATFORM: Adobe Flash Player 11.3.300.271 and earlier versions for Windows, Macintosh and Linux operating systems Adobe Flash Player 11.1.115.11 and earlier versions for Android 4.x Adobe Flash Player 11.1.111.10 and earlier versions for Android 3.x and 2.x Adobe AIR 3.3.0.3670 and earlier versions for Windows and Macintosh Adobe AIR 3.3.0.3690 SDK (includes AIR for iOS) and earlier versions Adobe AIR 3.3.0.3650 and earlier versions for Android ABSTRACT:

144

T-712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement  

NLE Websites -- All DOE Office Websites (Extended Search)

712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and 712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update T-712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update September 8, 2011 - 10:30am Addthis PROBLEM: A flaw was discovered in Cumin where it would log broker authentication credentials to the Cumin log file. A vulnerability was reported in Red Hat Enterprise MRG Grid. A local user can access the broker password. PLATFORM: Red Hat Enterprise MRG v2 for Red Hat Enterprise Linux (version 5) ABSTRACT: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update. reference LINKS: RHSA-2011:1249-1 SecurityTracker Alert ID: 1026021 CVE-2011-2925 IMPACT ASSESSMENT: Medium Discussion: A local user exploiting this flaw could connect to the broker outside of Cumin's control and perform certain operations such as scheduling jobs,

145

T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users 7: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass Authentication or Obtain Information T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass Authentication or Obtain Information August 31, 2011 - 12:00pm Addthis PROBLEM: A vulnerability was reported in Apache Tomcat. A remote user can bypass authentication or obtain potentially sensitive information. PLATFORM: Apache Tomcat 5.5.0 to 5.5.33, 6.0.0 to 6.0.33, 7.0.0 to 7.0.20 ABSTRACT: Apache Tomcat AJP protocol processing bug lets remote users bypass authentication or obtain information. reference LINKS: SecurityTracker Alert ID: 1025993 CVE-2011-3190 (under review) Apache Tomcat Security Updates IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Apache Tomcat. A remote user can bypass

146

T-589: Citrix XenApp and Citrix Presentation Server Bug | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

89: Citrix XenApp and Citrix Presentation Server Bug 89: Citrix XenApp and Citrix Presentation Server Bug T-589: Citrix XenApp and Citrix Presentation Server Bug March 28, 2011 - 3:05pm Addthis PROBLEM: Citrix XenApp and Citrix Presentation Server Bug in ActiveSync Lets Remote Users Execute Arbitrary Code. PLATFORM: Citrix XenApp Presentation versions 4.5, 5 ABSTRACT: A vulnerability was reported in Citrix XenApp (Presentation Server). A remote user can execute arbitrary code on the target system. -------------------------------------------------------------------------------- LINKS: DOE-CIRC BULLETIN: http://www.doecirc.energy.gov/bulletins/t-589.shtml OTHER LINKS: Citrix Document: CTX128366 SecurityTracker Alert ID: 1025254 Citrix Support Technical Support Downloads --------------------------------------------------------------------------------

147

U-055: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 5: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code U-055: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code December 8, 2011 - 8:30am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code . PLATFORM: Adobe Flash Player 11.1.102.55 on Windows and Mac OS X and prior versions ABSTRACT: Two vulnerabilities exploited by the Intevydis vd_adobe_fp module in VulnDisco Step Ahead were reported in Adobe Flash Player. reference LINKS: Secunia Advisory: SA47161 SecurityTracker Alert ID: 1026392 CVE-2011-4693 CVE-2011-4694 IMPACT ASSESSMENT: High Discussion: A remote or local user can obtain potentially sensitive information. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a specially crafted SWF file that, when

148

U-071:HP Database Archiving Software Bugs Let Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1:HP Database Archiving Software Bugs Let Remote Users Execute 1:HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code U-071:HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code December 29, 2011 - 8:15am Addthis PROBLEM: HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code PLATFORM: HP Database Archiving Software v6.31 ABSTRACT: A remote user can execute arbitrary code on the target system. reference LINKS: HP Database Document ID: c03128302 SecurityTracker Alert ID: 1026467 CVE-2011-4163 CVE-2011-4164 CVE-2011-4165 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in HP Database Archiving Software. A remote user can execute arbitrary code on the target system. Impact: A remote user can execute arbitrary code on the target system. Solution:

149

V-015: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, 5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information V-015: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information November 2, 2012 - 6:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information PLATFORM: Apple iOS prior to 6.0.1 ABSTRACT: Three vulnerabilities were reported in Apple iOS. REFERENCE LINKS: Apple Article: HT5567 SecurityTracker Alert ID: 1027716 Bugtraq ID: 56363 CVE-2012-3748 CVE-2012-3749 CVE-2012-3750 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the

150

U-061: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: RSA Adaptive Authentication Bugs Let Remote Users Bypass 1: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain Security Controls U-061: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain Security Controls December 14, 2011 - 8:17am Addthis PROBLEM: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain Security Controls. PLATFORM: 6.0.2.1 SP1 Patch 2 and SP1 Patch 3 6.0.2.1 SP2 and SP2 Patch 1 6.0.2.1 SP3 ABSTRACT: A remote user may be able to bypass certain security controls. reference LINKS: SecurityTracker Alert ID: 1026420 Security Focus: ESA-2011-036 IMPACT ASSESSMENT: Medium Discussion: Two vulnerabilities were reported in RSA Adaptive Authentication (On-Premise). A remote user may be able to bypass certain security controls. A remote user can send specially crafted data elements to affect the Device

151

U-118: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

18: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 18: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information U-118: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information March 6, 2012 - 7:00am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information PLATFORM: Adobe Flash Player 10.x, Adobe Flash Player 11.x ABSTRACT: Two vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can obtain potentially information. reference LINKS: Secunia Advisory SA48281 CVE-2012-0769 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will trigger a memory corruption error in Matrix3D and execute

152

V-149: Microsoft Internet Explorer Object Access Bug Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Microsoft Internet Explorer Object Access Bug Lets Remote 9: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code V-149: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code May 6, 2013 - 12:07am Addthis PROBLEM: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code PLATFORM: Internet Explorer 8 ABSTRACT: A vulnerability was reported in Microsoft Internet Explorer. REFERENCE LINKS: SecurityTracker Alert ID: 1028514 Microsoft Security Advisory (2847140) CVE-2013-1347 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will access and object that has been deleted or not properly allocated and execute arbitrary code on the target system. The code will run with the privileges of the target user.

153

U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Cisco IOS Intrusion Prevention System DNS Processing Bug 9: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service September 27, 2012 - 4:07am Addthis PROBLEM: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service PLATFORM: Devices configured with Cisco IOS IPS are affected ABSTRACT: A vulnerability was reported in Cisco IOS. reference LINKS: SecurityTracker Alert ID: 1027580 Cisco Security Advisory CVE-2012-3950 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Cisco IOS. A remote user can cause denial of service conditions. A remote user can send specially crafted (but legitimate) DNS packets through the target device to cause the device to

154

V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code 3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code March 18, 2013 - 1:53am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 6.0.3 ABSTRACT: Two vulnerabilities were reported in Apple Safari. REFERENCE LINKS: Apple security update, Article: HT1222 SecurityTracker Alert ID: 1028292 CVE-2013-0960 CVE-2013-0961 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. IMPACT: A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

155

V-160: Wireshark Multiple Bugs Let Remote Users Deny Service | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

60: Wireshark Multiple Bugs Let Remote Users Deny Service 60: Wireshark Multiple Bugs Let Remote Users Deny Service V-160: Wireshark Multiple Bugs Let Remote Users Deny Service May 21, 2013 - 12:09am Addthis PROBLEM: Wireshark Multiple Bugs Let Remote Users Deny Service PLATFORM: Versions 1.8.0 to 1.8.6 ABSTRACT: Multiple vulnerabilities have been reported in Wireshark REFERENCE LINKS: Wireshark Docid: wnpa-sec-2013-23 Secunia Advisory SA53425 SecurityTracker Alert ID: 1028582 CVE-2013-2486 CVE-2013-2487 IMPACT ASSESSMENT: Medium DISCUSSION: Multiple vulnerabilities have been reported in Wireshark, which can be exploited by malicious people to cause a DoS (Denial of Service). 1) An error in the RELOAD dissector (dissectors/packet-reload.c) can be exploited to trigger infinite loops and consume CPU resources via specially

156

U-005: Apache mod_proxy Pattern Matching Bug Lets Remote Users Access  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apache mod_proxy Pattern Matching Bug Lets Remote Users 5: Apache mod_proxy Pattern Matching Bug Lets Remote Users Access Internal Servers U-005: Apache mod_proxy Pattern Matching Bug Lets Remote Users Access Internal Servers October 6, 2011 - 9:30am Addthis PROBLEM: Apache mod_proxy Pattern Matching Bug Lets Remote Users Access Internal Servers. PLATFORM: Apache HTTP Server 1.3.x, 2.2.21 and prior versions ABSTRACT: A remote user can access internal servers. reference LINKS: The Apache HTTP Server Project SecurityTracker Alert ID: 1026144 CVE-2011-3368 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Apache mod_proxy. A remote user can access internal servers. When this system is configured in reverse proxy mode and uses the RewriteRule or ProxyPassMatch directives with a pattern match, a remote user can send a specially crafted request to access internal

157

V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 0: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code March 13, 2013 - 12:04am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): 1.6.602.171 and prior for Windows/Mac; other versions on other platforms ABSTRACT: Several vulnerabilities were reported in Adobe Flash Player. REFERENCE LINKS: Adobe Vulnerability identifier: APSB13-09 SecurityTracker Alert ID: 1028277 CVE-2013-0646 CVE-2013-0650 CVE-2013-1371 CVE-2013-1375 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user.

158

U-012: BlackBerry Enterprise Server Collaboration Service Bug Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

12: BlackBerry Enterprise Server Collaboration Service Bug Lets 12: BlackBerry Enterprise Server Collaboration Service Bug Lets Remote Users Impersonate Intra-organization Messages U-012: BlackBerry Enterprise Server Collaboration Service Bug Lets Remote Users Impersonate Intra-organization Messages October 17, 2011 - 9:45am Addthis PROBLEM: BlackBerry Enterprise Server Collaboration Service Bug Lets Remote Users Impersonate Intra-organization Messages. PLATFORM: Exchange and Domino 5.0.3 through 5.0.3 MR4 BlackBerry Client for use with Microsoft Office Communications Server 2007 R2 BlackBerry Client for use with Microsoft Lync Server 2010 ABSTRACT: A vulnerability was reported in BlackBerry Enterprise Server. A remote user can impersonate another messaging user within the same organization. reference LINKS: BlackBerry Security Advisory ID: KB28524

159

ConMem: detecting severe concurrency bugs through an effect-oriented approach  

Science Conference Proceedings (OSTI)

Multicore technology is making concurrent programs increasingly pervasive. Unfortunately, it is difficult to deliver reliable concurrent programs, because of the huge and non-deterministic interleaving space. In reality, without the resources to thoroughly ... Keywords: concurrency bugs, software testing

Wei Zhang; Chong Sun; Shan Lu

2010-03-01T23:59:59.000Z

160

V-046: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

46: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 46: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code V-046: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code December 13, 2012 - 3:30am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): 11.5.502.110 and prior for Windows/Mac; 11.2.202.251 and prior for Linux ABSTRACT: Several vulnerabilities were reported in Adobe Flash Player. REFERENCE LINKS: Adobe Vulnerability identifier: APSB12-27 SecurityTracker Alert ID: 1027854 Secunia Advisory SA51560 RHSA-2012:1569-1 CVE-2012-5676 CVE-2012-5677 CVE-2012-5678 IMPACT ASSESSMENT: High DISCUSSION: A buffer overflow can trigger code execution [CVE-2012-5676]. An integer overflow can trigger code execution [CVE-2012-5677]. A memory corruption flaw can trigger code execution [CVE-2012-5678].

Note: This page contains sample records for the topic "manager bugs permit" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote  

NLE Websites -- All DOE Office Websites (Extended Search)

71: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets 71: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service January 17, 2013 - 12:00am Addthis PROBLEM: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service PLATFORM: The vulnerability is reported in versions 8.7.1 and 8.7.1.1. ABSTRACT: A vulnerability has been reported in Cisco ASA 1000V Cloud Firewall REFERENCE LINKS: Cisco Advisory ID: cisco-sa-20130116-asa1000v SecurityTracker Alert ID: 1028005 Secunia Advisory SA51897 CVE-2012-5419 IMPACT ASSESSMENT: Medium DISCUSSION: A vulnerability has been reported in Cisco ASA 1000V Cloud Firewall, which can be exploited by malicious people to cause a DoS (Denial of Service).

162

T-708:Pidgin Bugs Let Remote Users Deny Service and Potentially Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

T-708:Pidgin Bugs Let Remote Users Deny Service and Potentially T-708:Pidgin Bugs Let Remote Users Deny Service and Potentially Execute Arbitrary Code T-708:Pidgin Bugs Let Remote Users Deny Service and Potentially Execute Arbitrary Code September 1, 2011 - 12:00pm Addthis PROBLEM: gtkutils.c in Pidgin before 2.10.0 on Windows allows user-assisted remote attackers to execute arbitrary programs via a file: URL in a message. PLATFORM: Pidgin before 2.10.0 on Windows ABSTRACT: Pidgin bugs let remote users deny service and potentially execute arbitrary code. reference LINKS: CVE-2011-3185 CVE-2011-2943 CVE-2011-3184 SecurityTracker Alert ID: 1025961 Pidgin Security Advisories IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in Pidgin. A remote user can cause denial of service conditions. A remote user can cause arbitrary code to be

163

U-071:HP Database Archiving Software Bugs Let Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1:HP Database Archiving Software Bugs Let Remote Users Execute 1:HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code U-071:HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code December 29, 2011 - 8:15am Addthis PROBLEM: HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code PLATFORM: HP Database Archiving Software v6.31 ABSTRACT: A remote user can execute arbitrary code on the target system. reference LINKS: HP Database Document ID: c03128302 SecurityTracker Alert ID: 1026467 CVE-2011-4163 CVE-2011-4164 CVE-2011-4165 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in HP Database Archiving Software. A remote user can execute arbitrary code on the target system. Impact: A remote user can execute arbitrary code on the target system. Solution:

164

Presidential Permits - Procedures | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Permits - Procedures Presidential Permits - Procedures Electricity Advisory Committee Technology Development Electricity Policy Coordination and Implementation Transmission...

165

Closed BLM Public Lands: Geothermal Leases Not Permitted The...  

Open Energy Info (EERE)

Closed BLM Public Lands: Geothermal Leases Not Permitted The U.S. Bureau of Land Management (BLM) released a series of GIS layers of public lands closed to geothermal leases...

166

Permitting of Consumptive Uses of Water (Florida) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Permitting of Consumptive Uses of Water (Florida) Permitting of Consumptive Uses of Water (Florida) Permitting of Consumptive Uses of Water (Florida) < Back Eligibility Agricultural Commercial Construction Developer Fed. Government Fuel Distributor General Public/Consumer Industrial Installer/Contractor Institutional Investor-Owned Utility Local Government Low-Income Residential Multi-Family Residential Municipal/Public Utility Nonprofit Residential Retail Supplier Rural Electric Cooperative Schools State/Provincial Govt Systems Integrator Transportation Tribal Government Utility Savings Category Water Buying & Making Electricity Home Weatherization Program Info State Florida Program Type Siting and Permitting Provider Florida Department of Environmental Protection Local water management districts are required to establish programs and

167

History's Worst Software Bugs By Simson Garfinkel Story location: http://www.wired.com/news/technology/bugs/0,2924,69355,00.html  

E-Print Network (OSTI)

,000 of its Prius hybrid vehicles following reports of vehicle warning lights illuminating for no reason, the root of the Prius issue wasn't a hardware problem -- it was a programming error in the smart car's embedded code. The Prius had a software bug. With that recall, the Pruis joined the ranks of the buggy

Overstreet, C. Michael

168

Microsoft Word - Groundwater Discharge Permit  

NLE Websites -- All DOE Office Websites (Extended Search)

State Renews Groundwater Discharge Permit for WIPP CARLSBAD, N.M., September 11, 2008 - The New Mexico Environment Department (NMED) has renewed the U.S. Department of Energy's (DOE) Waste Isolation Pilot Plant (WIPP) groundwater discharge permit until 2013. The permit regulates the discharge of water from WIPP facilities and operations to lined ponds, which protect groundwater resources. The permit allows WIPP to discharge domestic wastewater, non-hazardous wastewater and storm water into 13 on-site, synthetically-lined ponds. The new permit also provides for increased daily discharge volumes to allow more flexibility in plant operations. "This permit is the result of a positive year-long effort with the New Mexico Groundwater Quality Bureau," said Jody Plum, DOE Carlsbad Field Office Permitting and

169

Air Pollution Control Permit to Construct and Permit to Operate...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

may be required prior to commencing construction of the facility. Fuel-burning boilers, coal, oil, or natural gas-fired boiler steam generators require a permit. Gas...

170

Backup Generators (BUGS): The Next Smart Grid Peak Resource? | Open Energy  

Open Energy Info (EERE)

Backup Generators (BUGS): The Next Smart Grid Peak Resource? Backup Generators (BUGS): The Next Smart Grid Peak Resource? Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Backup Generators (BUGS): The Next Smart Grid Peak Resource? Focus Area: Crosscutting Topics: Potentials & Scenarios Website: www.netl.doe.gov/smartgrid/referenceshelf/articles/10-18-2010_BUGS%20a Equivalent URI: cleanenergysolutions.org/content/backup-generators-bugs-next-smart-gri Language: English Policies: "Deployment Programs,Financial Incentives,Regulations" is not in the list of possible values (Deployment Programs, Financial Incentives, Regulations) for this property. DeploymentPrograms: Demonstration & Implementation Regulations: "Resource Integration Planning,Energy Standards" is not in the list of possible values (Agriculture Efficiency Requirements, Appliance & Equipment Standards and Required Labeling, Audit Requirements, Building Certification, Building Codes, Cost Recovery/Allocation, Emissions Mitigation Scheme, Emissions Standards, Enabling Legislation, Energy Standards, Feebates, Feed-in Tariffs, Fuel Efficiency Standards, Incandescent Phase-Out, Mandates/Targets, Net Metering & Interconnection, Resource Integration Planning, Safety Standards, Upgrade Requirements, Utility/Electricity Service Costs) for this property.

171

Water Use Permitting (Wisconsin) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Permitting (Wisconsin) Water Use Permitting (Wisconsin) Eligibility Utility Program Information Start Date 2011 Wisconsin Program Type Siting and Permitting Withdrawers in the...

172

Maintenance and Veg Management  

NLE Websites -- All DOE Office Websites (Extended Search)

Functions Infrastructure projects Interconnection OASIS OATT Reauthorization of Transmission Line Permits, Maintenance and Vegetation Management on Forest Service Lands...

173

U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated 2: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated Privileges, Inject SQL Commands, and Spoof Certificates U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated Privileges, Inject SQL Commands, and Spoof Certificates February 28, 2012 - 8:45am Addthis PROBLEM: A vulnerability was reported in PostgreSQL. PLATFORM: Version(s): prior to 8.3.18, 8.4.11, 9.0.7, 9.1.3 ABSTRACT: A remote authenticated user can gain elevated privileges. A remote authenticated user can inject SQL commands. A remote user can spoof connections in certain cases. reference LINKS: Vendor Advisory Security Tracker ID 1026744 CVE-2012-0866 IMPACT ASSESSMENT: Medium Discussion: For trigger functions marked SECURITY DEFINER, a remote authenticated user can execute a trigger function and gain elevated privileges CVE-2012-0866.

174

V-203: HP LoadRunner Multiple Bugs Let Remote Users Deny Service and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: HP LoadRunner Multiple Bugs Let Remote Users Deny Service 3: HP LoadRunner Multiple Bugs Let Remote Users Deny Service and Execute Arbitrary Code V-203: HP LoadRunner Multiple Bugs Let Remote Users Deny Service and Execute Arbitrary Code July 26, 2013 - 3:31am Addthis PROBLEM: A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions. PLATFORM: HP LoadRunner prior to 11.52 ABSTRACT: Multiple vulnerabilities were reported in HP LoadRunner. REFERENCE LINKS: Security Tracker Alert ID: 1028833 CVE-2013-2368 CVE-2013-2369 CVE-2013-2370 CVE-2013-4797 CVE-2013-4798 CVE-2013-4799 CVE-2013-4800 CVE-2013-4801 IMPACT ASSESSMENT: Medium DISCUSSION: Potential security vulnerabilities have been identified with HP LoadRunner. The vulnerabilities could be remotely exploited to allow execution of code

175

U-092: Sudo Format String Bug Lets Local Users Gain Elevated Privileges |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Sudo Format String Bug Lets Local Users Gain Elevated 2: Sudo Format String Bug Lets Local Users Gain Elevated Privileges U-092: Sudo Format String Bug Lets Local Users Gain Elevated Privileges January 31, 2012 - 5:45am Addthis PROBLEM: A vulnerability was reported in Sudo. A local user can obtain elevated privileges on the target system. PLATFORM: Linux (Any) Version(s): 1.8.0 - 1.8.3p1 ABSTRACT: A local user can supply a specially crafted command line argument to trigger a format string flaw and execute arbitrary commands on the target system with root privileges. reference LINKS: CVE-2012-0809 SecurityTracker Alert ID: 1026600 Vendor Site IMPACT ASSESSMENT: Medium Discussion: The vulnerability resides in the sudo_debug() function in 'src/sudo.c'. This can be exploited by local users, regardless of whether they are listed

176

V-128: Xen Event Channel Tracking Pointer Bug Local Privilege Escalation |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Xen Event Channel Tracking Pointer Bug Local Privilege 8: Xen Event Channel Tracking Pointer Bug Local Privilege Escalation V-128: Xen Event Channel Tracking Pointer Bug Local Privilege Escalation April 8, 2013 - 12:28am Addthis PLATFORM: Version(s): 3.2 and later ABSTRACT: A vulnerability was reported in Xen. REFERENCE LINKS: SecurityTracker Alert ID: 1028388 CVE-2013-1920 IMPACT ASSESSMENT: Medium DISCUSSION: A local user with kernel level privileges on the guest operating system can exploit a memory pointer error when the hypervisor is under memory pressure and Xen Security Module (XSM) is enabled to execute arbitrary code on the target host system IMPACT: A local user on the guest operating system can obtain elevated privileges on the target host system. SOLUTION: The vendor has issued a fix (xsa47-4.1.patch, xsa47-4.2-unstable.patch).

177

U-110: Samba Bug Lets Remote Users Execute Arbitrary Code | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Samba Bug Lets Remote Users Execute Arbitrary Code 0: Samba Bug Lets Remote Users Execute Arbitrary Code U-110: Samba Bug Lets Remote Users Execute Arbitrary Code February 24, 2012 - 7:30am Addthis PROBLEM: A vulnerability was reported in Samba. PLATFORM: Version(s): prior to 3.4.0 ABSTRACT: A remote user can send specially crafted data to the smbd service to trigger a flaw in chain_reply() and construct_reply() and execute arbitrary code on the target system. reference LINKS: Vendor Advisory Security Tracker ID 1026739 CVE-2012-0870 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Samba. A remote user can execute arbitrary code on the target system. A remote user can send specially crafted data to the smbd service to trigger a flaw in chain_reply() and construct_reply() and execute arbitrary code on the target system. The code will run with the

178

U-096: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny 6: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny Service U-096: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny Service February 6, 2012 - 7:00am Addthis PROBLEM: Vulnerability in AIX TCP stack PLATFORM: Version(s): 5.3, 6.1, 7.1 ABSTRACT: A remote user can send a series of specially crafted TCP packets to trigger a kernel panic on the target system. reference LINKS: SecurityTracker Alert ID: 1026640 IBM Security Advisory CVE-2012-0194 IMPACT ASSESSMENT: Medium Discussion: AIX could allow a remote attacker to cause a denial of service, caused by an error when the TCP large send offload option is enabled on a network interface. By sending a specially-crafted sequence of packets, an attacker could exploit this vulnerability to cause a kernel panic.

179

V-077: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Barracuda SSL VPN Bug Lets Remote Users Bypass 7: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication V-077: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication January 25, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Barracuda SSL VPN. PLATFORM: The vulnerability has been verified to exist in Barracuda SSL VPN version 2.2.2.203 ABSTRACT: A remote user can gain administrative access to the target system. REFERENCE LINKS: SecurityTracker Alert ID: 1028039 Barracuda Networks Advisory IMPACT ASSESSMENT: High DISCUSSION: A remote user can set a specially crafted Java system property (via 'setSysProp.jsp') to bypass access restrictions and gain access to the API functionality. This can be exploited to download configuration files, download database dumps, shutdown the system, and set new administrative

180

T-654: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Apple QuickTime Multiple Bugs Let Remote Users Execute 4: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary T-654: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary June 24, 2011 - 4:39am Addthis PROBLEM: A vulnerability was reported in QuickTime. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Version(s): prior to QuickTime 7.6.8 ABSTRACT: A remote user can create a specially crafted file that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. reference LINKS: SecurityTracker Alert ID: 1025705 Apple Security Article: HT4339 Apple Security Article: HT4723 Apple Security Article: HT1222 CVE-2011-0213 Secunia Advisory: SA45054 IMPACT ASSESSMENT High Discussion:

Note: This page contains sample records for the topic "manager bugs permit" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

T-647: PHP File Upload Bug May Let Remote Users Overwrite Files on the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: PHP File Upload Bug May Let Remote Users Overwrite Files on 7: PHP File Upload Bug May Let Remote Users Overwrite Files on the Target System T-647: PHP File Upload Bug May Let Remote Users Overwrite Files on the Target System June 15, 2011 - 3:45pm Addthis PROBLEM: A vulnerability was reported in PHP. A remote user may be able to overwrite files on the target system. PLATFORM: PHP prior to 5.3.7 ABSTRACT: PHP is prone to a security-bypass vulnerability.Successful exploits will allow an attacker to delete files from the root directory, which may aid in further attacks. PHP 5.3.6 is vulnerable; other versions may also be affected. reference LINKS: PHP Security Notice PHP CVE-2011-2202 SecurityTracker Alert ID: 1025659 Secunia Advisory: SA44874 CVE-2011-2202 IMPACT ASSESSMENT: High Discussion: The vulnerability lies in the 'SAPI_POST_HANDLER_FUNC()' function in

182

U-192: VMware Workstation/Player VM Remote Device Bug Lets Local or Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

92: VMware Workstation/Player VM Remote Device Bug Lets Local or 92: VMware Workstation/Player VM Remote Device Bug Lets Local or Remote Users Deny Service U-192: VMware Workstation/Player VM Remote Device Bug Lets Local or Remote Users Deny Service June 15, 2012 - 7:00am Addthis PROBLEM: A vulnerability was reported in VMware Workstation/Player. PLATFORM: Version(s): Workstation 8.x, Player 4.x aBSTRACT: A local or remote user can cause denial of service conditions on the target virtual system. reference LINKS: Vendor Advisory Security Tracker ID 1027173 CVE-2012-3289 IMPACT ASSESSMENT: High Discussion: A user with the ability to modify communications data between a remote virtual device (e.g., CD-ROM, keyboard) located on a physically separate system and the target virtual machine can cause the target virtual machine to crash.

183

T-652: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and 2: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and Execute Arbitrary Code T-652: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and Execute Arbitrary Code June 22, 2011 - 2:55pm Addthis PROBLEM: Multiple vulnerabilities were reported in Mozilla Thunderbird. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can obtain cookies from another domain in certain cases. A remote user can create specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system [CVE-2011-2364, CVE-2011-2374, CVE-2011-2375, CVE-2011-2376]. The code will run with the privileges of the target user. PLATFORM: Mozilla Thunderbird prior to 3.1.11

184

V-183: Cisco TelePresence TC and TE Bugs Let Remote Users Deny Service and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Cisco TelePresence TC and TE Bugs Let Remote Users Deny 3: Cisco TelePresence TC and TE Bugs Let Remote Users Deny Service and Remote Adjacent Authenticated Users Gain Root Shell Access V-183: Cisco TelePresence TC and TE Bugs Let Remote Users Deny Service and Remote Adjacent Authenticated Users Gain Root Shell Access June 21, 2013 - 6:00am Addthis PROBLEM: Three vulnerabilities were reported in Cisco TelePresence TC and TE PLATFORM: The following product models are affected by the vulnerabilities: Cisco TelePresence MX Series Cisco TelePresence System EX Series Cisco TelePresence Integrator C Series Cisco TelePresence Profiles Series running Cisco TelePresence Quick Set Series Cisco IP Video Phone E20 ABSTRACT: Cisco TelePresence TC and TE Software contain two vulnerabilities in the implementation of the Session Initiation Protocol (SIP) that could allow an

185

U-088: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary 8: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary Code U-088: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary Code January 25, 2012 - 6:00am Addthis PROBLEM: A remote user can execute arbitrary code on the target system. PLATFORM: Version(s): 12.5 SP3; pcAnywhere Solutions 7.1 GA, SP 1, and SP 2 ABSTRACT: Two vulnerabilities were reported in Symantec pcAnywhere. A remote user can execute arbitrary code on the target system. A local user can obtain elevated privileges on the target system. reference LINKS: Symantec Advisory Secunia Advisory SecurityTracker Alert ID:102576 IMPACT ASSESSMENT: Medium Discussion: A remote user can send specially crafted data to TCP port 5631 to trigger a but in the validation of authentication data and execute arbitrary code.

186

U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code June 6, 2012 - 7:00am Addthis PROBLEM: Multiple vulnerabilities were reported in Mozilla Firefox. PLATFORM: Version(s): prior to 13.0 ABSTRACT: A remote user can cause arbitrary code to be executed on the target user's system. A remote user can conduct cross-site scripting attacks. A remote user can obtain potentially sensitive information. Reference Links: Security Tracker ID 1027120 CVE-2012-0441,CVE-2012-1937 Vendor URL IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system [CVE-2012-1937 , CVE-2012-1938, CVE-2012-1939 ].

187

U-192 VMware Workstation/Player VM Remote Device Bug Lets Local or Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

VMware Workstation/Player VM Remote Device Bug Lets Local or VMware Workstation/Player VM Remote Device Bug Lets Local or Remote Users Deny Service U-192 VMware Workstation/Player VM Remote Device Bug Lets Local or Remote Users Deny Service June 15, 2012 - 7:00am Addthis PROBLEM: A vulnerability was reported in VMware Workstation/Player. PLATFORM: Version(s): Workstation 8.x, Player 4.x ABSTRACT: A local or remote user can cause denial of service conditions on the target virtual system. reference LINKS: Vendor Advisory Security Tracker ID 1027173 CVE-2012-3289 IMPACT ASSESSMENT: High Discussion: A user with the ability to modify communications data between a remote virtual device (e.g., CD-ROM, keyboard) located on a physically separate system and the target virtual machine can cause the target virtual machine to crash. Impact:

188

V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Cisco Wireless LAN Controller Bugs Let Remote Users Deny 6: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code January 24, 2013 - 6:00am Addthis PROBLEM: Several vulnerabilities were reported in Cisco Wireless LAN Controller. PLATFORM: The vulnerabilities are reported in: Cisco 2000 Series WLC Cisco 2100 Series WLC Cisco 2500 Series WLC Cisco 4100 Series WLC Cisco 4400 Series WLC Cisco 5500 Series WLC Cisco 7500 Series WLC Cisco 8500 Series WLC Cisco 500 Series Wireless Express Mobility Controllers Cisco Wireless Services Module (Cisco WiSM) Cisco Wireless Services Module version 2 (Cisco WiSM version 2)

189

Expedited Permitting Process for Solar Photovoltaic Systems ...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Expedited Permitting Process for Solar Photovoltaic Systems (Vermont) Expedited Permitting Process for Solar Photovoltaic Systems (Vermont) Eligibility Agricultural Commercial...

190

Environment/Health/Safety (EHS): Operating Permits for LBNL Activities  

NLE Websites -- All DOE Office Websites (Extended Search)

Operating Permits for LBNL Activities Operating Permits for LBNL Activities LBNL Main Site Agency Expiration Date Certified Unified Program Agency Permit and Registration Hazardous Materials Release Response Plan (Hazardous Materials Business Plan) Aboveground Petroleum Storage Tanks, Spill Prevention Control and Countermeasures Plan Underground Storage Tank Program Hazardous Waste Generator Program Tiered Permit Program for Onsite Treatment of Hazardous Wastes City of Berkeley March 1, 2014 Fuel Dispensing Sources at Building 76: E85 Unleaded Bay Area Air Quality Management District July 1, 2014 Stationary Air Emission Sources (28 permits): Diesel-powered Emergency Standby Generators: Buildings 2, 31, 37(2), 48, 50A, 50B, 55, 62, 64(2), 66, 67, 68, 70, 70A, 72, 74, 77, 84B, 85 and three (3) portable units

191

Air Pollution Control Permit to Construct and Permit to Operate...  

Open Energy Info (EERE)

to commencing construction of the facility. Fuel-burning boilers, coal, oil, or natural gas-fired boiler steam generators require a permit. Gas turbines, as well as simple cycle...

192

Presidential Permits | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

Presidential Permits Presidential Permits Presidential Permits Below is a listing of all the presidential permits grouped by Canada and Mexico. View the Presidental Permits - Mexico View the Presidential Permits - Canada PRESIDENTIAL PERMITS - CANADA BACK TO TOP Docket No. Company Date Issued PP-6 Puget Sound Energy 04/28/81 PP-10 BPA 10/27/45 PP-10-1 BPA 11/30/65 PP-11-2 Fraser Papers 02/29/99 PP-11 Fraser Papers (Rescinded in PP-366) 11/18/10 PP-12 Maine 12/05/63 PP-13 NiMo Hogansburg 01/31/48 PP-18 Glacier Electric 12/12/52 PP-20 Eastern Maine 05/25/65 PP-22 BC Hydro 08/24/67 PP-22-1 BC Hydro 07/21/55 PP-22-2 BC Hydro 02/04/58 PP-22-3 BC Hydro 08/24/67 PP-22-4 BCTC 09/05/07 PP-23 Netley 07/20/55 PP-24 Long Sault 06/06/80 PP-25 NYPA 06/06/80 PP-28 Northern Electric 04/17/63

193

V-115: Apple iOS Bugs Let Local Users Gain Elevated Privileges | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apple iOS Bugs Let Local Users Gain Elevated Privileges 5: Apple iOS Bugs Let Local Users Gain Elevated Privileges V-115: Apple iOS Bugs Let Local Users Gain Elevated Privileges March 20, 2013 - 12:08am Addthis PROBLEM: Apple iOS Bugs Let Local Users Gain Elevated Privileges PLATFORM: Version(s): prior to 6.1.3 ABSTRACT: Several vulnerabilities were reported in Apple iOS REFERENCE LINKS: Apple security Article: HT1222 SecurityTracker Alert ID: 1028314 CVE-2013-0977 CVE-2013-0978 CVE-2013-0979 CVE-2013-0981 IMPACT ASSESSMENT: High DISCUSSION: A local user can exploit a flaw in the handling of Mach-O executable files with overlapping segments to execute unsigned code on the target system [CVE-2013-0977]. A local user can exploit a flaw in the ARM prefetch abort handling to determine the address of structures in the kernel [CVE-2013-0978].

194

U-119: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users 9: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute Arbitrary Code U-119: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute Arbitrary Code March 7, 2012 - 7:00am Addthis PROBLEM: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute Arbitrary Code PLATFORM: BlackBerry 6, BlackBerry 7, BlackBerry 7.1, and BlackBerry PlayBook tablet software ABSTRACT: A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026769 BlackBerry Security Notice Article ID: KB30152 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Blackberry PlayBook. A remote user can cause arbitrary code to be executed on the target user's system. A remote

195

V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to 1: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems April 24, 2013 - 1:06am Addthis PROBLEM: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems PLATFORM: HP ElitePad 900 with BIOS version vF.00 ABSTRACT: A vulnerability was reported in HP ElitePad 900 REFERENCE LINKS: HP Document ID: c03727435 SecurityTracker Alert ID: 1028461 CVE-2012-5218 IMPACT ASSESSMENT: Medium DISCUSSION: The BIOS secure boot feature of the BIOS may not be enabled. A local user may be able to bypass the secure boot feature and boot an alternate operating system. IMPACT: A local user can may be able to boot to an alternate operating system. SOLUTION:

196

U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and 5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs May 9, 2012 - 7:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs PLATFORM: prior to 5.1.1; iPhone 3GS, iPhone 4, iPhone 4S, iPod touch (3rd generation) and later, iPad, iPad 2 ABSTRACT: Two vulnerabilities were reported in Apple iOS. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can spoof the address bar URL. reference LINKS: SecurityTracker Alert ID: 1027028 CVE-2012-0672 CVE-2012-0674 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a specially crafted file that, when loaded by the

197

T-714:Wireshark OpenSafety and CSN.1 Dissector Bugs | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

714:Wireshark OpenSafety and CSN.1 Dissector Bugs 714:Wireshark OpenSafety and CSN.1 Dissector Bugs T-714:Wireshark OpenSafety and CSN.1 Dissector Bugs September 12, 2011 - 9:00am Addthis PROBLEM: Several vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions. PLATFORM: Version(s): 1.4.0 to 1.4.8, 1.6.0 to 1.6.1 ABSTRACT: Wireshark OpenSafety and CSN.1 Dissector Bugs Lets Remote Users Deny Service. reference LINKS: Wireshark 1.6.2 Release Notes Wireshark 1.4.9 Release Notes Docid: wnpa-sec-2011-12 Docid: wnpa-sec-2011-14 Docid: wnpa-sec-2011-15 Docid: wnpa-sec-2011-16 SecurityTracker Alert ID: 1026030 IMPACT ASSESSMENT: High Discussion: A remote user can cause arbitrary scripting code to be executed on the target user's system. A large loop in the OpenSafety dissector could cause a crash. A remote user

198

T-579: BlackBerry Device Software Bug in WebKit Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: BlackBerry Device Software Bug in WebKit Lets Remote Users 9: BlackBerry Device Software Bug in WebKit Lets Remote Users Execute Code T-579: BlackBerry Device Software Bug in WebKit Lets Remote Users Execute Code March 15, 2011 - 5:05pm Addthis PROBLEM: A vulnerability was reported in BlackBerry Device Software. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: BlackBerry Device Software version 6.0 and later. ABSTRACT: BlackBerry Device Software Bug in WebKit Lets Remote Users Execute Code. reference LINKS: BlackBerry Advisory: KB26132 CVE-2011-1290 BlackBerry Security Note BlackBerry Device Storage IMPACT ASSESSMENT: Moderate Discussion: A vulnerability exists in the open source WebKit browser engine provided in BlackBerry Device Software version 6.0 and later. The issue could result in

199

U-085: OpenSSL DTLS Bug Lets Remote Users Deny Service | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: OpenSSL DTLS Bug Lets Remote Users Deny Service 5: OpenSSL DTLS Bug Lets Remote Users Deny Service U-085: OpenSSL DTLS Bug Lets Remote Users Deny Service January 20, 2012 - 9:15am Addthis PROBLEM: OpenSSL DTLS Bug Lets Remote Users Deny Service PLATFORM: Only DTLS applications using OpenSSL 1.0.0f and 0.9.8s are affected. ABSTRACT: A flaw in the fix to CVE-2011-4108 can be exploited in a denial of service attack. REFERNCE LINKS: CVE-2012-0050 SecurityTracker Alert ID: 1026548 OpenSSL Security Advisory [18 Jan 2011] OpenSSL News IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in OpenSSL. The fix to correct the Datagram Transport Layer Security (DTLS) vulnerability referenced by CVE-2011-4108 introduced a flaw. A remote user can send specially crafted data to cause denial of service conditions on the target system.

200

V-029: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

29: Mozilla Firefox Multiple Bugs Let Remote Users Execute 29: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks V-029: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks November 21, 2012 - 2:00am Addthis PROBLEM: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks PLATFORM: Version(s): prior to 17.0 ABSTRACT: Multiple vulnerabilities were reported in Mozilla Firefox REFERENCE LINKS: Mozilla Foundation Security Advisories Bugtraq ID: 55260 SecurityTracker Alert ID: 1027791 CVE-2012-4201, CVE-2012-4202, CVE-2012-4203, CVE-2012-4204, CVE-2012-4205, CVE-2012-4206, CVE-2012-4207,CVE-2012-4208, CVE-2012-4209, CVE-2012-4210, CVE-2012-4212, CVE-2012-4213, CVE-2012-4214, CVE-2012-4215, CVE-2012-4216,

Note: This page contains sample records for the topic "manager bugs permit" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and 5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs May 9, 2012 - 7:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs PLATFORM: prior to 5.1.1; iPhone 3GS, iPhone 4, iPhone 4S, iPod touch (3rd generation) and later, iPad, iPad 2 ABSTRACT: Two vulnerabilities were reported in Apple iOS. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can spoof the address bar URL. reference LINKS: SecurityTracker Alert ID: 1027028 CVE-2012-0672 CVE-2012-0674 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a specially crafted file that, when loaded by the

202

T-718:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute 8:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code T-718:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code September 15, 2011 - 8:45am Addthis PROBLEM: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code. PLATFORM: Adobe Reader X (10.1) and earlier 10.x versions for Windows and Macintosh Adobe Reader 9.4.5 and earlier 9.x versions for Windows, Macintosh and UNIX Adobe Reader 8.3 and earlier 8.x versions for Windows and Macintosh Adobe Acrobat X (10.1) and earlier 10.x versions for Windows and Macintosh Adobe Acrobat 9.4.5 and earlier 9.x versions for Windows and Macintosh Adobe Acrobat 8.3 and earlier 8.x versions for Windows and Macintosh ABSTRACT: A remote user can create a file that, when loaded by the target user, will

203

U-176: Wireshark Multiple Bugs Let Remote Users Deny Service | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-176: Wireshark Multiple Bugs Let Remote Users Deny Service U-176: Wireshark Multiple Bugs Let Remote Users Deny Service U-176: Wireshark Multiple Bugs Let Remote Users Deny Service May 24, 2012 - 7:00am Addthis PROBLEM: Wireshark Multiple Bugs Let Remote Users Deny Service PLATFORM: 1.4.0 to 1.4.12, 1.6.0 to 1.6.7 ABSTRACT: Several vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions. Reference Links: SecurityTracker Alert ID: 1027094 CVE-2012-2392 CVE-2012-2393 CVE-2012-2394 IMPACT ASSESSMENT: Medium Discussion: A remote user can send specially crafted ANSI MAP, ASF, BACapp, Bluetooth HCI, IEEE 802.11, IEEE 802.3, LTP, and R3 data to cause Wireshark to hang or enter an infinite loop. A remote user can cause the DIAMETER dissector to crash. A remote user can trigger a memory error on SPARC or Itanium processors and

204

U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Apple iOS Bugs Let Remote Users Execute Arbitrary Code 6: Apple iOS Bugs Let Remote Users Execute Arbitrary Code U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code November 15, 2011 - 8:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Obtain Information and Let Local Users Bypass Authentication. PLATFORM: iOS 3.0 through 5.0 for iPhone 3GS iPhone 4 and iPhone 4S iOS 3.1 through 5.0 for iPod touch (3rd generation) and later iOS 3.2 through 5.0 for iPad, iOS 4.3 through 5.0 for iPad 2 ABSTRACT: A remote user can create content that, when loaded by the target user, will execute arbitrary code on or obtain potentially sensitive information from the target user's system. reference LINKS: Apple Security Article: HT5052 Apple Product Security SecurityTracker Alert ID: 1026311 IMPACT ASSESSMENT:

205

U-211: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

11: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote 11: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories U-211: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories July 12, 2012 - 7:00am Addthis PROBLEM: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories PLATFORM: EMC Celerra Network Server versions 6.0.36.4 through 6.0.60.2 EMC VNX versions 7.0.12.0 through 7.0.53.1 EMC VNXe 2.0 (including SP1, SP2, and SP3) EMC VNXe MR1 (including SP1, SP2, SP3, and SP3.1) EMC VNXe MR2 (including SP0.1) ABSTRACT: A vulnerability was reported in EMC Celerra/VNX/VNXe. A remote authenticated user can access files and directories on the target file system. reference LINKS: The Vendor's Advisory

206

V-031: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote 1: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated Users Gain Elevated Privileges and Remote Users Deny Service V-031: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated Users Gain Elevated Privileges and Remote Users Deny Service November 22, 2012 - 3:00am Addthis PROBLEM: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated Users Gain Elevated Privileges and Remote Users Deny Service PLATFORM: Version(s): XC10 2.0.0.0 - 2.0.0.3, 2.1.0.0 - 2.1.0.2 ABSTRACT: Several vulnerabilities were reported in IBM WebSphere DataPower. REFERENCE LINKS: IBM Security Bulletin SecurityTracker Alert ID: 1027798 CVE-2012-5758 CVE-2012-5759 CVE-2012-5756 IMPACT ASSESSMENT: High DISCUSSION: Several vulnerabilities were reported in IBM WebSphere DataPower. A remote

207

V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to 1: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems April 24, 2013 - 1:06am Addthis PROBLEM: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems PLATFORM: HP ElitePad 900 with BIOS version vF.00 ABSTRACT: A vulnerability was reported in HP ElitePad 900 REFERENCE LINKS: HP Document ID: c03727435 SecurityTracker Alert ID: 1028461 CVE-2012-5218 IMPACT ASSESSMENT: Medium DISCUSSION: The BIOS secure boot feature of the BIOS may not be enabled. A local user may be able to bypass the secure boot feature and boot an alternate operating system. IMPACT: A local user can may be able to boot to an alternate operating system. SOLUTION:

208

Well Permits (District of Columbia)  

Energy.gov (U.S. Department of Energy (DOE))

Well permits are required for the installation of wells in private and public space. Wells are defined as any trest hole, shaft, or soil excavation created by any means including, but not limited...

209

EIS-0442: Reauthorization of Permits, Maintenance, and Vegetation  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

42: Reauthorization of Permits, Maintenance, and Vegetation 42: Reauthorization of Permits, Maintenance, and Vegetation Management on Western Area Power Administration Transmission Lines on Forest Service Lands, Colorado, Nebraska, and Utah EIS-0442: Reauthorization of Permits, Maintenance, and Vegetation Management on Western Area Power Administration Transmission Lines on Forest Service Lands, Colorado, Nebraska, and Utah Summary This EIS is being prepared jointly by DOE's Western Area Power Administration and the U.S. Forest Service. The EIS evaluates the potential environmental impacts of Western's proposed changes to vegetation management along its transmission line rights-of-way on National Forest System lands in Colorado, Utah, and Nebraska. The EIS website is http://ww2.wapa.gov/sites/western/transmission/infrastruct/Pages/Western%20FS%20EIS.aspx.

210

permitting | OpenEI Community  

Open Energy Info (EERE)

permitting permitting Home Alevine's picture Submitted by Alevine(5) Member 29 July, 2013 - 14:46 Texas Legal Review BHFS flora and fauna leasing Legal review permitting roadmap Texas The NREL roadmap team recently met with our legal team Brownstein Hyatt Farber and Schreck (www.bhfs.com) for a review of the Texas portion of the Geothermal Regulatory Roadmap (GRR). BHFS provided excellent suggestions to the Section 3 flowcharts for geothermal leases on Texas state lands. The Texas portion of the GRR now encompasses a flowchart for Texas state land leasing on Permanent School Fund Lands, Texas Parks and Wildlife Department Lands, Land Trade Lands, and Relinquishment Act Lands. Additionally, BHFS provided many other helpful tips for clarifying other issue Kyoung's picture Submitted by Kyoung(155)

211

Transmission/Permitting Atlas | Open Energy Information  

Open Energy Info (EERE)

Atlas < Transmission Jump to: navigation, search PermittingAtlasHeader.png Roadmap Compare States General Transmission Dashboard Permitting Atlas Compare States Arizona California...

212

PP-16 Alendatory Permit | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Permit to construct, operate, and maintain electric transmission facilities at the U.S-Mexican border. PP-16 Alendatory Permit More Documents & Publications PP-16-1 UNS...

213

SRS seeks RCRA Hazardous Waste Permit Renewal  

NLE Websites -- All DOE Office Websites (Extended Search)

ery Act (RCRA) permit be renewed. The current permit for the Mixed Waste Storage Buildings (MWSB), Mixed Waste Man- agement Facility (MWMF), and Sanitary Landfill (SLF)...

214

Water Pollution Control Permit Regulations (Vermont)  

Energy.gov (U.S. Department of Energy (DOE))

These regulations outline the permits and permitting processes for point discharges to surface waters and outline the monitoring and reporting requirements.

215

Direct Discharge Permit (Vermont) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Discharge Permit (Vermont) Direct Discharge Permit (Vermont) Eligibility Utility Agricultural Investor-Owned Utility Industrial MunicipalPublic Utility Rural Electric Cooperative...

216

Wind Energy Permitting Standards | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Wind Energy Permitting Standards Wind Energy Permitting Standards < Back Eligibility Commercial Construction Industrial InstallerContractor Savings Category Wind Buying & Making...

217

Permits handbook for coal development  

SciTech Connect

This coal permits handbook was prepared for Region VIII comprised of the states of Colorado, Utah, Montana, Wyoming, North Dakota, and South Dakota. The first part of the handbook provides the background and overview of information on coal with emphasis on federal and state regulatory authority and includes a status report on litigation affecting the coal industry. A discussion on specific analyses of the majority of environmental permits required to operate and develop coal mines comprises the second part of the book. Significant supportive information including the content of state regulations and standards, sample forms, guidelines, and a discussion of coal severance taxation are included on the appendices. (BLM)

Wayman, C.H.; Genasci, G.A.

1980-01-01T23:59:59.000Z

218

GRR/Elements/18-CA-c.1 - What Level of Hazardous Waste Facility Permit Does  

Open Energy Info (EERE)

GRR/Elements/18-CA-c.1 - What Level of Hazardous Waste Facility Permit Does GRR/Elements/18-CA-c.1 - What Level of Hazardous Waste Facility Permit Does the Facility Require < GRR‎ | Elements Jump to: navigation, search Edit 18-CA-b.1 - What Level of Hazardous Waste Facility Permit Does the Facility Require California employs a five-tier permitting program which imposes regulatory requirements matching the degree of risk posed by the level of hazardous waste: * The Full Permit Tier includes all facilities requiring a RCRA permit as well as selected non-RCRA activities under Title 22 California Code of Regulations. * The Standardized Permit Tier includes facilities that manage waste not regulated by RCRA, but regulated as hazardous waste in California. * Onsite Treatment Permits (3-Tiered) includes onsite treatment of non-RCRA waste regulated in California.

219

GRR/Section 18-ID-b - Hazardous Waste Permit Process | Open Energy  

Open Energy Info (EERE)

GRR/Section 18-ID-b - Hazardous Waste Permit Process GRR/Section 18-ID-b - Hazardous Waste Permit Process < GRR Jump to: navigation, search GRR-logo.png GEOTHERMAL REGULATORY ROADMAP Roadmap Home Roadmap Help List of Sections Section 18-ID-b - Hazardous Waste Permit Process 18IDBHazardousWastePermitProcess.pdf Click to View Fullscreen Contact Agencies Idaho Department of Environmental Quality Regulations & Policies Idaho Hazardous Waste Management Act IDAPA 58.01.05 Rules and Standards for Hazardous Waste 40 CFR 124.31 Pre-application public meeting and notice 40 CRF 124.10 Public notice of permit actions and public comment period 40 CFR 124.12 Public hearings 40 CFR 270.13 Contents of Part A of the permit application Triggers None specified Click "Edit With Form" above to add content 18IDBHazardousWastePermitProcess.pdf 18IDBHazardousWastePermitProcess.pdf

220

GRR/Section 15-CO-a - Air Permit - Construction Permit | Open Energy  

Open Energy Info (EERE)

5-CO-a - Air Permit - Construction Permit 5-CO-a - Air Permit - Construction Permit < GRR Jump to: navigation, search GRR-logo.png GEOTHERMAL REGULATORY ROADMAP Roadmap Home Roadmap Help List of Sections Section 15-CO-a - Air Permit - Construction Permit 15COAAirPermitConstructionPermit.pdf Click to View Fullscreen Contact Agencies Colorado Department of Public Health and Environment Regulations & Policies 5 CCR 1001-5 Colorado Stationary Source Permitting and Air Pollution Control Emission Notice Requirements Triggers None specified Click "Edit With Form" above to add content 15COAAirPermitConstructionPermit.pdf 15COAAirPermitConstructionPermit.pdf 15COAAirPermitConstructionPermit.pdf Error creating thumbnail: Page number not in range. Flowchart Narrative The Colorado Department of Public Health and Environment (CDPHE) Air

Note: This page contains sample records for the topic "manager bugs permit" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Microsoft Word - BUGS_The Next Smart Grid Peak Resource Final 4_19.docx  

NLE Websites -- All DOE Office Websites (Extended Search)

April 15, 2010 April 15, 2010 DOE/NETL-2010/1406 Backup Generators (BUGS): The Next Smart Grid Peak Resource Backup Generators (BUGS): The Next Smart Grid Peak Resource v1.0 ii DISCLAIMER This report was prepared as an account of work sponsored by an agency of the United States Government. Neither the United States Government nor any agency thereof, nor any of their employees, makes any warranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would not infringe privately owned rights. Reference therein to any specific commercial product, process, or service by trade name, trademark, manufacturer, or

222

T-633: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets 3: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets Remote Users Deny Service T-633: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets Remote Users Deny Service May 31, 2011 - 3:35pm Addthis PROBLEM: A vulnerability was reported in BIND. A remote user can cause denial of service conditions. PLATFORM: BIND Version(s): 9.4-ESV-R3 and later, 9.6-ESV-R2 and later, 9.6.3, 9.7.1 and later, 9.8.0 and later; prior to 9.4-ESV-R4-P1, 9.6-ESV-R4-P1, 9.7.3-P1, 9.8.0-P2 ABSTRACT: A remote DNS server can supply very large RRSIG RRsets in a negative response to trigger an off-by-one error in a buffer size check and cause the target requesting named process to crash. A remote user can cause named to crash. reference LINKS: SecurityTracker Alert ID: 1025575 SecurityTracker Alert ID: 1025572

223

V-210: HP LaserJet Pro Printer Bug Lets Remote Users Access Data |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

V-210: HP LaserJet Pro Printer Bug Lets Remote Users Access Data V-210: HP LaserJet Pro Printer Bug Lets Remote Users Access Data V-210: HP LaserJet Pro Printer Bug Lets Remote Users Access Data August 3, 2013 - 2:37am Addthis PROBLEM: A vulnerability was reported in HP Printers. A remote user can obtain potentially sensitive information. PLATFORM: HP LaserJet Pro products ABSTRACT: A potential security vulnerability has been identified with certain HP LaserJet Pro printers. The vulnerability could be exploited remotely to gain unauthorized access to data. REFERENCE LINKS: SecurityTracker Alert ID 1028869 CVE-2013-4807 Vendor URL IMPACT ASSESSMENT: Medium DISCUSSION: The following models are affected: HP LaserJet Pro P1102w CE657A/CE658A HP LaserJet Pro P1606dn CE749A HP LaserJet Pro M1212nf MFP CE841A HP LaserJet Pro M1213nf MFP CE845A

224

Single Family Residential Stormwater Management Guidelines  

E-Print Network (OSTI)

stormwater general permit (permit) implements the federal Clean Water Act. The permit is administered by the Washington State Department of Ecology and requires stormwater management for new development and redevelopment projects (including Single Family

Single Family Residential

2012-01-01T23:59:59.000Z

225

PERMITTING LEADERSHIP IN THE UNITED STATES  

SciTech Connect

In accordance with the Southern States Energy Board (SSEB) proposal, as incorporated into NETL/DE-FC26-97FT34199, the objective of this agreement is to streamline the environmental technology permitting process site-to-site, state-to-state, and industry-to-industry to achieve remediation and waste processing faster, better and cheaper. SSEB is working with member Governors, legislators and regulators to build consensus on streamlining the permitting process for new and innovative technologies for addressing the legacy of environmental problems from 50 years of weapons research, development and production. This report reviews mechanisms whereby industry consortiums and the Department of Energy (DOE) have been working with State regulators and other officials in technology deployment decisions within the DOE complex. The historic development of relationships with State regulators is reviewed and the current nature of the relationships examined. The report contains observations from internal DOE reviews as well as recommendations from the General Accounting Office (GAO) and other external organizations. The report discusses reorganization initiatives leading up to a DOE Top-to-Bottom review of the Environmental Management (EM) Program and highlights points of consideration for maintaining effective linkages with State regulators. It notes how the proposed changes will place new demands upon the National Energy Technology Laboratory (NETL) and how NETL can leverage its resources by refocusing existing EM efforts specifically to states that have DOE facilities within their borders (host-states). Finally, the report discusses how SSEB's Permitting Leadership in the United States (PLUS) program can provide the foundation for elements of NETL's technical assistance program that are delivered to regulators and other decision- makers in host-states. As a regional compact commission, SSEB provides important direct linkages to regulators and stakeholders who need technical assistance to evaluate DOE's cleanup plans. In addition, the PLUS program has facilitated the involvement of key regulators from host-states beyond the Southern region.

Ken Nemeth

2002-09-01T23:59:59.000Z

226

Permit Regulations for the Construction and, or Operation of...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Type Environmental Regulations Siting & Permitting The Permit Board will issue two types of air pollution control permits, a permit to construct air emissions equipment and...

227

General Air Permits (Louisiana) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

General Air Permits (Louisiana) General Air Permits (Louisiana) General Air Permits (Louisiana) < Back Eligibility Agricultural Construction Industrial Investor-Owned Utility Municipal/Public Utility Rural Electric Cooperative Utility Program Info State Louisiana Program Type Environmental Regulations Provider Louisiana Department of Environmental Quality Any source, including a temporary source, which emits or has the potential to emit any air contaminant requires an air permit. Facilities with potential emissions less than 5 tons per year of any regulated air pollutant do not need a permit. The Louisiana Department of Environmental Quality issues Title V General Permits. The permit is developed based on equipment types versus facility types, the general permits are not limited in their use to a specific industry or category. Title V permits combine

228

GRR/Section 19-CO-c - Designated Ground Water Basin Well Permitting Process  

Open Energy Info (EERE)

GRR/Section 19-CO-c - Designated Ground Water Basin Well Permitting Process GRR/Section 19-CO-c - Designated Ground Water Basin Well Permitting Process < GRR Jump to: navigation, search GRR-logo.png GEOTHERMAL REGULATORY ROADMAP Roadmap Home Roadmap Help List of Sections Section 19-CO-c - Designated Ground Water Basin Well Permitting Process 19COCDesignatedGroundWaterBasinWellPermit.pdf Click to View Fullscreen Contact Agencies Colorado Division of Water Resources Colorado Ground Water Commission Regulations & Policies CRS 37-90-107 CRS 37-90-108 Ground Water Management District Rules 2 CCR 410-1 - Rules and Regulations for the Management and Control of Designated Ground Water Basins Triggers None specified Click "Edit With Form" above to add content 19COCDesignatedGroundWaterBasinWellPermit.pdf 19COCDesignatedGroundWaterBasinWellPermit.pdf

229

GRR/Section 18-OR-b - Hazardous Waste Permit Process | Open Energy  

Open Energy Info (EERE)

OR-b - Hazardous Waste Permit Process OR-b - Hazardous Waste Permit Process < GRR Jump to: navigation, search GRR-logo.png GEOTHERMAL REGULATORY ROADMAP Roadmap Home Roadmap Help List of Sections Section 18-OR-b - Hazardous Waste Permit Process 18ORBHazardousWastePermitProcess (1).pdf Click to View Fullscreen Contact Agencies United States Environmental Protection Agency Oregon Department of Environmental Quality Oregon Public Health Division Oregon Public Utility Commission Oregon Department of Fish and Wildlife Oregon Water Resources Department Regulations & Policies OAR 340-105: Management Facility Permits OAR 340-120: Hazardous Waste Management ORS 466: Storage, Treatment, and Disposal Triggers None specified Click "Edit With Form" above to add content 18ORBHazardousWastePermitProcess (1).pdf

230

Environmental Management Commission (Alabama)  

Energy.gov (U.S. Department of Energy (DOE))

The Alabama Department of Environmental Management is charged with developing the state's environmental policy, hearing administrative appeals of permits, administrative orders and variances issued...

231

Construction Permits and Fees (New Mexico)  

Energy.gov (U.S. Department of Energy (DOE))

Industries that wish to build or modify facilities that emit air pollutants (emissions) into the air must obtain an air quality permit prior to constructing. Thus, these permits are called...

232

Air Permitting for Stationary Sources (New Hampshire)  

Energy.gov (U.S. Department of Energy (DOE))

The permitting system implements the permitting requirements of RSA 125-C and 125-I to regulate the operation and modification of new and existing stationary sources, area sources, and devices to...

233

WIPP Hazardous Waste Permit - Approved Modifications  

NLE Websites -- All DOE Office Websites (Extended Search)

August 3, 2011 Class 1 Permit Modification Notification - Revise Tables 4.1.1 and G-1 dated August 8, 2011 Class 2 Permit Modification Request TRUPACT-III dated January 10, 2011...

234

Air permitting of IGCC plants  

SciTech Connect

The IGCC process is, currently, the preferred choice over conventional thermal power production in regard to cleanup of fuel and significantly reduced contaminant emissions. The air permitting requirements include the review of: feed preparation and PM emissions; feed gasification and contaminant emissions; elemental sulfur recovery and SO{sub 2} emissions; options for carbon-dioxide recovery; syngas characteristics for combustion; CT design and combustion mechanisms; air contaminant emissions of CT; controlled CT emissions of nitrogen-oxides and carbon-monoxide gases using the SCR and oxidation catalysts, respectively; and, emission of volatile organic compounds (VOCs), and hazardous air pollutants (HAPs). However, the IGCC processes are being rigorously reviewed for the system integration and reliability, and significant reduction of air contaminant emissions (including the greenhouse gases). This paper included a review of IGCC air contaminant emission rates, and various applicable regulatory requirements, such as NSR (New Source Review), NSPS (New Source Performance Standards), and MACT (Maximum Achievable Control Technology). The IGCC facility's NOX, CO, SO{sub 2}, PM, VOCs, and HAPs emission rates would be significantly low. Thus, effective, construction and installation, and operation air permits would be necessary for IGCC facilities.

Chitikela, S.R.

2007-07-01T23:59:59.000Z

235

RENEWABLE ENERGY ACTION TEAM Milestones to Permit California Renewable Portfolio Standard Energy Projects  

E-Print Network (OSTI)

1 RENEWABLE ENERGY ACTION TEAM Milestones to Permit California Renewable Portfolio Standard Energy renewable energy resources. In November 2008, the CEC, DFG, the Bureau of Land Management (BLM the Renewable Energy Action Team (REAT) to address permitting issues associated with specific renewable energy

236

GRR/Section 15-ID-b - Air Quality Permit - Tier II Operating Permit | Open  

Open Energy Info (EERE)

GRR/Section 15-ID-b - Air Quality Permit - Tier II Operating Permit GRR/Section 15-ID-b - Air Quality Permit - Tier II Operating Permit < GRR Jump to: navigation, search GRR-logo.png GEOTHERMAL REGULATORY ROADMAP Roadmap Home Roadmap Help List of Sections Section 15-ID-b - Air Quality Permit - Tier II Operating Permit 15IDBAirQualityPermitTierIIOperatingPermit.pdf Click to View Fullscreen Contact Agencies Idaho Department of Environmental Quality Regulations & Policies IDAPA 58.01.01 Triggers None specified Click "Edit With Form" above to add content 15IDBAirQualityPermitTierIIOperatingPermit.pdf Error creating thumbnail: Page number not in range. Error creating thumbnail: Page number not in range. Error creating thumbnail: Page number not in range. Flowchart Narrative Tier II Operating Permits are issued to facilities or stationary sources

237

Siting & Permitting | Open Energy Information  

Open Energy Info (EERE)

Siting & Permitting Siting & Permitting Jump to: navigation, search Siting and permitting policies can facilitate the installation of clean energy systems by specifying the conditions and fees involved in project development. Some local governments have adopted simplified or expedited permitting standards for wind and/or solar projects. “Top-of-the-stack” or fast-track permitting saves system owners and project developers time and money. Some states have established maximum fees that local governments may charge for a permit for a solar or wind energy system. In addition, some states have developed (or have supported the development of) model wind ordinances for use by local governments. [1] References ↑ DSIRE Glossary Retrieved from "http://en.openei.org/w/index.php?title=Siting_%26_Permitting&oldid=538321"

238

Annual Hanford Site Environmental Permitting status report  

Science Conference Proceedings (OSTI)

The information contained in, and/or referenced in, this Annual Hanford Site Environmental Permitting Status Report addresses Permit Condition II.W (Other Permits and/or Approvals) of the Dangerous Waste Portion of the Resource Conservation and Recovery Act Permit for the Treatment, Storage, and Disposal of Dangerous Waste, issued by the Washington State Department of Ecology (WA7890008967). Condition II.W specifies that the Permittees are responsible for obtaining all other applicable federal, state, and local permits authorizing the development and operation of the Hanford Facility. Condition II.W further specifies that the Permittees are to use their best efforts to obtain such permits. For the purposes of this Permit Condition, ''best efforts'' mean submittal of documentation and/or approval(s) in accordance with schedules specified in applicable regulations, or as determined through negotiations with the applicable regulatory agencies.

SONNICHSEN, J.C.

1999-10-18T23:59:59.000Z

239

GRR/Section 15-ID-a - Air Quality Permit - Permit to Construct | Open  

Open Energy Info (EERE)

15-ID-a - Air Quality Permit - Permit to Construct 15-ID-a - Air Quality Permit - Permit to Construct < GRR Jump to: navigation, search GRR-logo.png GEOTHERMAL REGULATORY ROADMAP Roadmap Home Roadmap Help List of Sections Section 15-ID-a - Air Quality Permit - Permit to Construct 15IDAAirQualityPermitPermitToConstruct (1).pdf Click to View Fullscreen Contact Agencies Idaho Department of Environmental Quality Regulations & Policies IDAPA 58.01.01 Triggers None specified Click "Edit With Form" above to add content 15IDAAirQualityPermitPermitToConstruct (1).pdf Error creating thumbnail: Page number not in range. Error creating thumbnail: Page number not in range. Error creating thumbnail: Page number not in range. Flowchart Narrative The Idaho Department of Environmental Quality (DEQ) requires an air quality

240

GRR/Section 15-CA-b - Air Permit - Operating Permit | Open Energy  

Open Energy Info (EERE)

15-CA-b - Air Permit - Operating Permit 15-CA-b - Air Permit - Operating Permit < GRR Jump to: navigation, search GRR-logo.png GEOTHERMAL REGULATORY ROADMAP Roadmap Home Roadmap Help List of Sections Section 15-CA-b - Air Permit - Operating Permit 15CABAirPermitOperatingPermit.pdf Click to View Fullscreen Contact Agencies California Air Resources Board Regulations & Policies Clean Air Act (42 USC 1857 et seq.) California Air Pollution Control Laws Triggers None specified Click "Edit With Form" above to add content 15CABAirPermitOperatingPermit.pdf Error creating thumbnail: Page number not in range. Error creating thumbnail: Page number not in range. Error creating thumbnail: Page number not in range. Flowchart Narrative A developer operating a facility that emits air pollutants must obtain an

Note: This page contains sample records for the topic "manager bugs permit" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

GRR/Section 19-CO-h - Denver Basin and Designated Basin Permitting Process  

Open Energy Info (EERE)

9-CO-h - Denver Basin and Designated Basin Permitting Process 9-CO-h - Denver Basin and Designated Basin Permitting Process < GRR Jump to: navigation, search GRR-logo.png GEOTHERMAL REGULATORY ROADMAP Roadmap Home Roadmap Help List of Sections Section 19-CO-h - Denver Basin and Designated Basin Permitting Process 19COHDenverBasinAndDesignatedBasinPermittingProcess.pdf Click to View Fullscreen Contact Agencies Colorado Ground Water Commission Colorado Division of Water Resources Regulations & Policies CRS 37-90-107 Application for Use of Ground Water 2 CCR 410-1 Rules and Regulations for the Management and Control of Designated Ground Water Triggers None specified Click "Edit With Form" above to add content 19COHDenverBasinAndDesignatedBasinPermittingProcess.pdf 19COHDenverBasinAndDesignatedBasinPermittingProcess.pdf

242

GRR/Section 18-NV-c - Waste Disposal Permit | Open Energy Information  

Open Energy Info (EERE)

NV-c - Waste Disposal Permit NV-c - Waste Disposal Permit < GRR Jump to: navigation, search GRR-logo.png GEOTHERMAL REGULATORY ROADMAP Roadmap Home Roadmap Help List of Sections Section 18-NV-c - Waste Disposal Permit 18NVCWasteDisposalPermit.pdf Click to View Fullscreen Contact Agencies Nevada Division of Environmental Protection Regulations & Policies Nevada Revised Statutes (NRS) Nevada Administrative Code (NAC) Triggers None specified Click "Edit With Form" above to add content 18NVCWasteDisposalPermit.pdf Error creating thumbnail: Page number not in range. Error creating thumbnail: Page number not in range. Error creating thumbnail: Page number not in range. Flowchart Narrative Within the Nevada Division of Environmental Protection in Nevada, the Bureau of Waste Management (BWM) operates a permitting and compliance

243

U-029: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

29: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets Remote 29: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets Remote Users Gain Unauthorized Access U-029: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets Remote Users Gain Unauthorized Access November 8, 2011 - 8:00am Addthis PROBLEM: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets Remote Users Gain Unauthorized Access. PLATFORM: HP TCP/IP Services for OpenVMS v5.6 and v5.7 on iTanium and ALPHA Servers. ABSTRACT: A remote user can gain unauthorized access reference LINKS: HP Support document ID: c01908983 SecurityTracker Alert ID: 1026279 CVE-2011-3168 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in TCP/IP Services for OpenVMS. A remote user can gain unauthorized access. On systems running POP or IMAP servers, a remote user can gain unauthorized access.

244

U-232: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

32: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny 32: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the Host OS U-232: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the Host OS August 10, 2012 - 7:00am Addthis PROBLEM: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the Host OS PLATFORM: This vulnerability effects only Xen 4.0 and 4.1. Xen 3.4 and earlier and xen-unstable are not vulnerable. ABSTRACT: A vulnerability was reported in Xen. A local user on a guest operating system can cause denial of service conditions on the host. reference LINKS: Xen Security Announcements SecurityTracker Alert ID: 1027365 seclists.org CVE-2012-3433 IMPACT ASSESSMENT: Medium Discussion: An HVM guest is able to manipulate its physical address space such that tearing down the guest takes an extended period amount of time searching

245

U-265: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users 5: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain Information and Execute Arbitrary Code U-265: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain Information and Execute Arbitrary Code September 21, 2012 - 6:00am Addthis PROBLEM: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain Information and Execute Arbitrary Code PLATFORM: HP SiteScope v11.10, v11.11, v11.12 for Windows, Linux and Solaris ABSTRACT: A vulnerability was reported in HP SiteScope. reference LINKS: HP Security Bulletin Document ID: c03489683 SecurityTracker Alert ID: 1027547 CVE-2012-3259 CVE-2012-3260 CVE-2012-3261 CVE-2012-3262 CVE-2012-3263 CVE-2012-3264 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in HP SiteScope. A remote user can execute

246

This Bug Man Is a Pest George Ledin teaches students how to write viruses, and it makes  

E-Print Network (OSTI)

's going on in Ledin's classroom. He has been likened to A.Q. Khan, the Pakistani scientist who sold--and the http://www.newsweek.com/2008/08/01/this-bug-man-is-a-pest.prin... 1 of 2 #12;hackers. "We've changed

Ravikumar, B.

247

U-265: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users 5: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain Information and Execute Arbitrary Code U-265: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain Information and Execute Arbitrary Code September 21, 2012 - 6:00am Addthis PROBLEM: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain Information and Execute Arbitrary Code PLATFORM: HP SiteScope v11.10, v11.11, v11.12 for Windows, Linux and Solaris ABSTRACT: A vulnerability was reported in HP SiteScope. reference LINKS: HP Security Bulletin Document ID: c03489683 SecurityTracker Alert ID: 1027547 CVE-2012-3259 CVE-2012-3260 CVE-2012-3261 CVE-2012-3262 CVE-2012-3263 CVE-2012-3264 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in HP SiteScope. A remote user can execute

248

U-232: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

32: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny 32: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the Host OS U-232: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the Host OS August 10, 2012 - 7:00am Addthis PROBLEM: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the Host OS PLATFORM: This vulnerability effects only Xen 4.0 and 4.1. Xen 3.4 and earlier and xen-unstable are not vulnerable. ABSTRACT: A vulnerability was reported in Xen. A local user on a guest operating system can cause denial of service conditions on the host. reference LINKS: Xen Security Announcements SecurityTracker Alert ID: 1027365 seclists.org CVE-2012-3433 IMPACT ASSESSMENT: Medium Discussion: An HVM guest is able to manipulate its physical address space such that tearing down the guest takes an extended period amount of time searching

249

CoalFleet IGCC Permitting Guidelines  

Science Conference Proceedings (OSTI)

This report provides guidance to owners of planned Integrated Gasification Combined Cycle (IGCC) power plants in order to assist them in permitting these advanced coal power generation facilities. The CoalFleet IGCC Permitting Guidelines summarize U.S. federal requirements for obtaining air, water, and solid waste permits for a generic IGCC facility, as described in EPRI report 1012227, the CoalFleet User Design Basis Specification (UDBS). The Guidelines present characteristics of IGCC emissions that mus...

2006-11-16T23:59:59.000Z

250

GRR/Section 15-TX-a - Air Permit - Permit to Construct | Open Energy  

Open Energy Info (EERE)

GRR/Section 15-TX-a - Air Permit - Permit to Construct GRR/Section 15-TX-a - Air Permit - Permit to Construct < GRR Jump to: navigation, search GRR-logo.png GEOTHERMAL REGULATORY ROADMAP Roadmap Home Roadmap Help List of Sections Section 15-TX-a - Air Permit - Permit to Construct 15TXAAirPermitPermitToConstruct (1).pdf Click to View Fullscreen Contact Agencies Texas Commission on Environmental Quality Regulations & Policies Title 30 of the Texas Administrative Code 30 TAC 116.114 30 TAC 39.418 30 TAC 39.604 30 TAC 39.605 30 TAC 39.409 30 TAC 116.136 30 TAC 55.254 30 TAC 116.136 30 TAC 116.137 Triggers None specified Click "Edit With Form" above to add content 15TXAAirPermitPermitToConstruct (1).pdf 15TXAAirPermitPermitToConstruct (1).pdf 15TXAAirPermitPermitToConstruct (1).pdf Error creating thumbnail: Page number not in range.

251

Wastewater Construction and Operation Permits (Iowa)  

Energy.gov (U.S. Department of Energy (DOE))

These regulations describe permit requirements for the construction and operation of facilities treating wastewater, and provide separation distances from other water sources.

252

Disclosure of Permitted Communication Concerning Fossil Fuel...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Disclosure of Permitted Communication Concerning Fossil Fuel Energy Consumption Reduction for New Construction and Major Renovations of Federal Buildings -- Docket No....

253

Permits for Electricity Generating Facilities (Iowa)  

Energy.gov (U.S. Department of Energy (DOE))

All applicants for conditional permits for electricity generating facilities must provide opportunity for public participation and quantify expected air emissions from the proposed project.

254

Washington Joint Aquatic Resources Permit Application (JARPA...  

Open Energy Info (EERE)

Washington Joint Aquatic Resources Permit Application (JARPA) Jump to: navigation, search OpenEI Reference LibraryAdd to library Legal Document- OtherOther: Washington Joint...

255

Solar Permitting Law (Oregon) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Residential Residential Savings Category Solar Buying & Making Electricity Heating & Cooling Water Heating Program Info State Oregon Program Type SolarWind Permitting...

256

Industrial Discharge Permits (District of Columbia)  

Energy.gov (U.S. Department of Energy (DOE))

All businesses and government agencies discharging process wastewater to the public sewer system must report their activities to DC Water's Pretreatment Center. Wastewater discharge permits are...

257

PETSc: Docs: Code Management  

NLE Websites -- All DOE Office Websites (Extended Search)

Code Management Code Management Home Download Features Documentation Manual pages and Users Manual Citing PETSc Tutorials Installation SAWs Changes Bug Reporting Code Management FAQ License Linear Solver Table Applications/Publications Miscellaneous External Software Developers Site In this file we list some of the techniques that may be used to increase one's efficiency when developing PETSc application codes. We have learned to use these techniques ourselves, and they have improved our efficiency tremendously. Editing and Compiling The biggest time sink in code development is generally the cycle of EDIT-COMPILE-LINK-RUN. We often see users working in a single window with a cycle such as: Edit a file with emacs. Exit emacs. Run make and see some error messages. Start emacs and try to fix the errors; often starting emacs hides

258

Presidential Permits and Export Authorizations - About the Program...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Presidential Permits and Export Authorizations - About the Program Presidential Permits and Export Authorizations - About the Program Electricity Advisory Committee Technology...

259

Major developments in section 404-permitting  

Science Conference Proceedings (OSTI)

Mountain coal mining in the Central Appalachians faces increased challenge under the Clean Water Act (CWA). These challenges have included the US Environmental Protection Agency's (EPA) increased involvement in permitting under Section 404 of the CWA; active opposition by environmental groups to Section 404 permits; and proposed federal legislation to reduce the availability of these permits. These recent challenges culminated in a June 11, 2009, Memorandum of Understanding (MoU) between the PEA, the Department of Interior (DoI) and the Army Corps of Engineers (Corps) that will limit the use of general permits for mountaintop coal mining and increase the scrutiny applied to individual permits, while also providing a coordinated approach for reviewing the backlog of pending permit application. By entering into the MoU, the federal agencies aim to reduce the environmental impacts of mountaintop coal mining while increasing certainty and transparency for permit applications. Challenges to Section 404 permitting for mountaintop coal mining are dynamic and new developments occur almost daily. This article provides a snapshot of the current climate.

Ahrens, M.; Orr, S. [Lathan & Watkins LLP (United States)

2009-06-15T23:59:59.000Z

260

GRR/Section 7-NV-a - Permit to Construct and Permit to Operate | Open  

Open Energy Info (EERE)

7-NV-a - Permit to Construct and Permit to Operate 7-NV-a - Permit to Construct and Permit to Operate < GRR Jump to: navigation, search GRR-logo.png GEOTHERMAL REGULATORY ROADMAP Roadmap Home Roadmap Help List of Sections Section 7-NV-a - Permit to Construct and Permit to Operate 07NVAPermitToConstructAndPermitToOperate (3).pdf Click to View Fullscreen Contact Agencies Nevada Division of Environmental Protection Triggers None specified Click "Edit With Form" above to add content 07NVAPermitToConstructAndPermitToOperate (3).pdf Error creating thumbnail: Page number not in range. Error creating thumbnail: Page number not in range. Error creating thumbnail: Page number not in range. Flowchart Narrative _ 7-NV-a.1 and 6-NV-a.2 - Has an Environmental Review been Completed for Construction? The developer must make sure to undergo an environmental process before

Note: This page contains sample records for the topic "manager bugs permit" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Coordinating Permit Office | OpenEI Community  

Open Energy Info (EERE)

Coordinating Permit Office Coordinating Permit Office Home Kyoung's picture Submitted by Kyoung(155) Contributor 9 July, 2013 - 20:57 GRR 3rd Quarter - Stakeholder Update Meeting Alaska analysis appropriations Categorical Exclusions Coordinating Permit Office Cost Mechanisms Cost Recovery geothermal Hawaii NEPA permitting quarterly meeting White Papers On June 26th, we held the 3rd Quarter GRR Stakeholder Update at the Grand Sierra Resort in Reno, NV. The meeting was well-attended with over 40 attendees, including in-person and webinar attendance. Thanks to all who attended! Files: application/pdf icon Presentation: 3rd Quarterly Stakeholder Update Meeting application/vnd.openxmlformats-officedocument.presentationml.presentation icon Mock-up: GRR Permitting Wizard Interface Kyoung's picture Submitted by Kyoung(155)

262

Operating Permits (New Jersey) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Operating Permits (New Jersey) Operating Permits (New Jersey) Operating Permits (New Jersey) < Back Eligibility Utility Fed. Government Commercial Agricultural Investor-Owned Utility State/Provincial Govt Industrial Construction Municipal/Public Utility Local Government Residential Installer/Contractor Rural Electric Cooperative Tribal Government Low-Income Residential Schools Retail Supplier Institutional Multi-Family Residential Systems Integrator Fuel Distributor Nonprofit General Public/Consumer Transportation Program Info State New Jersey Program Type Siting and Permitting Provider Department of Environmental Protection The owner or operator of a facility subject to this article shall obtain and maintain an operating permit for the facility. The owner or operator of a facility subject to this article shall ensure that no person shall use or

263

Solar Construction Permitting Standards | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Standards Standards Solar Construction Permitting Standards < Back Eligibility Agricultural Commercial General Public/Consumer Industrial Local Government Nonprofit Residential Savings Category Solar Buying & Making Electricity Heating & Cooling Water Heating Program Info State Colorado Program Type Solar/Wind Permitting Standards Provider Colorado Energy Office Owners of solar photovoltaic (PV) systems and solar water heating systems in Colorado are required to obtain a building permit before their systems may be installed. Permits are handled at the local level and awarded by counties and municipalities. Traditionally, counties and municipalities have been free to assign their own fees for a permit. These fees can vary broadly in size across jurisdictions and in some cases, can be large enough

264

Wind Project Permitting | Open Energy Information  

Open Energy Info (EERE)

Project Permitting Project Permitting Jump to: navigation, search Invenergy is the developer of the 129-MW Forward Wind Energy Center project near Fond du Lac, Wisconsin, that came online in 2008. Photo by Ruth Baranowski, NREL 16412 As with other energy facility permitting processes, the goal of the wind project permitting process is to reach decisions that are timely, minimize challenges, and ensure compliance with laws and regulations that provide for necessary environmental protection.[1] Resources National Wind Coordinating Committee. (2002). Permitting of Wind Energy Facilities. Accessed August 28, 2013. This handbook is written for individuals and groups involved in evaluating wind projects: decision-makers and agency staff at all levels of government, wind developers, interested parties and the public.

265

GRR/Section 6-MT-e - Floodplain Development Permit | Open Energy  

Open Energy Info (EERE)

6-MT-e - Floodplain Development Permit 6-MT-e - Floodplain Development Permit < GRR Jump to: navigation, search GRR-logo.png GEOTHERMAL REGULATORY ROADMAP Roadmap Home Roadmap Help List of Sections Section 6-MT-e - Floodplain Development Permit 06MTEFloodplainDevelopmentPermit (1).pdf Click to View Fullscreen Contact Agencies Montana Department of Natural Resources & Conservation Federal Emergency Management Agency Triggers None specified Click "Edit With Form" above to add content 06MTEFloodplainDevelopmentPermit (1).pdf Error creating thumbnail: Page number not in range. Error creating thumbnail: Page number not in range. Error creating thumbnail: Page number not in range. Flowchart Narrative Anyone planning new development within a designated Special Flood Hazard Areas (SFHA). Check with local floodplain [www.mtfloodplain.mt.gov

266

GRR/Section 14-NV-c - Underground Injection Control Permit | Open Energy  

Open Energy Info (EERE)

4-NV-c - Underground Injection Control Permit 4-NV-c - Underground Injection Control Permit < GRR Jump to: navigation, search GRR-logo.png GEOTHERMAL REGULATORY ROADMAP Roadmap Home Roadmap Help List of Sections Section 14-NV-c - Underground Injection Control Permit 14NVCUndergroundInjectionControlPermit.pdf Click to View Fullscreen Contact Agencies Nevada Division of Environmental Protection Nevada Division of Minerals Nevada Division of Water Resources Bureau of Land Management Regulations & Policies Nevada Revised Statutes (NRS) Nevada Administrative Code (NAC) Triggers None specified Click "Edit With Form" above to add content 14NVCUndergroundInjectionControlPermit.pdf Error creating thumbnail: Page number not in range. Error creating thumbnail: Page number not in range. Error creating thumbnail: Page number not in range.

267

GRR/Section 12-FD-b - Bald & Golden Eagle Permit | Open Energy Information  

Open Energy Info (EERE)

GRR/Section 12-FD-b - Bald & Golden Eagle Permit GRR/Section 12-FD-b - Bald & Golden Eagle Permit < GRR Jump to: navigation, search GRR-logo.png GEOTHERMAL REGULATORY ROADMAP Roadmap Home Roadmap Help List of Sections Section 12-FD-b - Bald & Golden Eagle Permit 12FDBBaldGoldenEaglePermit.pdf Click to View Fullscreen Contact Agencies Fish and Wildlife Service Bureau of Land Management Regulations & Policies Bald and Golden Eagle Protection Act National Environmental Policy Act Triggers None specified Click "Edit With Form" above to add content 12FDBBaldGoldenEaglePermit.pdf Error creating thumbnail: Page number not in range. Error creating thumbnail: Page number not in range. Error creating thumbnail: Page number not in range. Flowchart Narrative The Bald and Golden Eagle Act prohibits anyone from "taking" bald eagles.

268

GRR/Section 19-HI-a - Surface Water Use Permit | Open Energy Information  

Open Energy Info (EERE)

GRR/Section 19-HI-a - Surface Water Use Permit GRR/Section 19-HI-a - Surface Water Use Permit < GRR Jump to: navigation, search GRR-logo.png GEOTHERMAL REGULATORY ROADMAP Roadmap Home Roadmap Help List of Sections Section 19-HI-a - Surface Water Use Permit 19HIASurfaceWaterUsePermit.pdf Click to View Fullscreen Contact Agencies Hawaii Department of Land and Natural Resources Commission on Water Resource Management Regulations & Policies Hawaii Revised Statutes 174C Hawaii Administrative Rules Title 13, Chapter 171 Triggers None specified Click "Edit With Form" above to add content 19HIASurfaceWaterUsePermit.pdf Error creating thumbnail: Page number not in range. Error creating thumbnail: Page number not in range. Error creating thumbnail: Page number not in range. Flowchart Narrative Under Hawaii Revised Statutes 174C and Hawaii Administrative Rules Title

269

Disclosure of Permitted Communication Concerning Regional Standards  

NLE Websites -- All DOE Office Websites (Extended Search)

Disclosure of Permitted Communication Concerning Regional Standards Disclosure of Permitted Communication Concerning Regional Standards Enforcement Framework Document -- Docket No. EERE-2011-BT-CE-0077 Disclosure of Permitted Communication Concerning Regional Standards Enforcement Framework Document -- Docket No. EERE-2011-BT-CE-0077 This memo provides an overview of communications made to DOE staff on the subject of a policy for providing waivers from new regional furnace efficiency standards. memo_furnace_std_waiver_policy.pdf More Documents & Publications Disclosure of Permitted Communication Concerning Fossil Fuel Energy Consumption Reduction for New Construction and Major Renovations of Federal Buildings -- Docket No. EERE-2010-BT-STD-0031; RIN 1904-AB96 Record of Communication Concerning Ceiling Fan and Ceiling Fan Light Kit

270

Wind Energy Permitting Standards (North Carolina)  

Energy.gov (U.S. Department of Energy (DOE))

North Carolina has statewide permitting requirements for wind energy facilities. Any wind turbine or collection of wind turbines located within a half mile of each other with a collective rated...

271

Regulations and Permits Related to Dams (Vermont)  

Energy.gov (U.S. Department of Energy (DOE))

Vermont law requires a permit, or a dam order, for the construction, alteration, or removal of dams impounding more than 500,000 cubic feet of water, including any accumulated sediments. Dam...

272

Catawba County - Green Construction Permitting Incentive Program...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

(LEED), NC HealthyBuilt Homes, Energy Star, or the National Association of Home Builders' Model Green Home Building Guidelines can receive a 25% blanket permit fee rebate, not to...

273

Major Source Permits (District of Columbia) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Major Source Permits (District of Columbia) Major Source Permits (District of Columbia) Major Source Permits (District of Columbia) < Back Eligibility Utility Commercial Industrial Program Info State District of Columbia Program Type Environmental Regulations Provider District Department of the Environment The District reviews designs for new pollution sources and design modifications for existing sources. Permits are issued to allow sources to emit limited and specified amounts of pollution as allowed by air quality laws and regulations. Major sources include power plants, heating plants, and large printing facilities. Three types of permits are issued: pre-construction review permits; new source review permits; and operating permits. These permits include conditions intended to minimize emissions of

274

Solid Waste Management Program (Missouri)  

Energy.gov (U.S. Department of Energy (DOE))

The Solid Waste Management Program in the Department of Natural Resources regulates the management of solid waste in the state of Missouri. A permit is required prior to the construction or...

275

Management  

E-Print Network (OSTI)

Research has indicated that, depending upon driver and passenger characteristics, passengers can have either a positive or negative influence upon driver behaviour. In conclusion to a recent study investigating the roles that passengers can play to influence, positively and negatively, driver behaviour, Regan and Mitsopoulos (2001) recommended, among other things, that the principles of Crew Resource Management (CRM) training may increase passengers ability to positively influence driver behaviour and also drivers ability to accept constructive feedback. The present study investigated the potential application of CRM training within young driver training in the Australian Capital Territory (ACT). This involved a literature review, an analysis of the differences between the driving and aviation domains, an analysis of the team-based activities and the knowledge, skills and attitudes required during driving to perform those activities, consultation with CRM experts from the aviation and medicine domains and the conduct of six focus groups involving young learner drivers, provisional licence drivers and course teachers. The findings indicate that CRM training as part of young driver training in the ACT is a viable concept to pursue. The application of CRM training within young driver training has potential to significantly enhance the positive and reduce the negative effects of passengers on young driver behaviour, and thus the safety of young drivers and passengers alike. The outcomes of this study formed the basis for a set of recommendations for the development of a young driver CRM training program in the ACT.

Young Drivers; Eve Mitsopoulos; Michael Regan; Janet Anderson; Paul Salmon; Jessica Edquist; Ii Report Documentation Page

2005-01-01T23:59:59.000Z

276

GRR/Section 3-AK-g - Utility Permit to Construct on ADOT&PF ROW | Open  

Open Energy Info (EERE)

GRR/Section 3-AK-g - Utility Permit to Construct on ADOT&PF ROW GRR/Section 3-AK-g - Utility Permit to Construct on ADOT&PF ROW < GRR Jump to: navigation, search GRR-logo.png GEOTHERMAL REGULATORY ROADMAP Roadmap Home Roadmap Help List of Sections Section 3-AK-g - Utility Permit to Construct on ADOT&PF ROW 03AKGUtilityPermitToConstructOnADOTROW (1).pdf Click to View Fullscreen Contact Agencies Alaska Department of Transportation and Public Facilities U S Army Corps of Engineers United States Coast Guard Bureau of Indian Affairs Bureau of Land Management Federal Aviation Administration Alaska Department of Natural Resources Regulations & Policies 11 AAC 195.010: Anadromous Fish 17 AAC 15.021: Application for Utility Permit Triggers None specified Click "Edit With Form" above to add content 03AKGUtilityPermitToConstructOnADOTROW (1).pdf

277

U-252: Barracuda Web Filter Input Validation Flaws Permit Cross...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Barracuda Web Filter Input Validation Flaws Permit Cross-Site Scripting Attacks U-252: Barracuda Web Filter Input Validation Flaws Permit Cross-Site Scripting Attacks September...

278

Wind Access and Permitting Law | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Access and Permitting Law Wind Access and Permitting Law < Back Eligibility Residential Savings Category Wind Buying & Making Electricity Program Info State Delaware Program Type...

279

Form GWS-45 - Well Permit Application | Open Energy Information  

Open Energy Info (EERE)

Form GWS-45 - Well Permit Application Jump to: navigation, search GEOTHERMAL ENERGYGeothermal Home Reference Material: Form GWS-45 - Well Permit Application Details Activities (0)...

280

Application for Presidential Permit OE Docket No. PP-387 Soule...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Application for Presidential Permit OE Docket No. PP-387 Soule Hydro: Comments from City of Saxman, Alaska Application for Presidential Permit OE Docket No. PP-387 Soule Hydro:...

Note: This page contains sample records for the topic "manager bugs permit" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

City of Portland - Streamlined Building Permits for Residential...  

Open Energy Info (EERE)

Share this page on Facebook icon Twitter icon City of Portland - Streamlined Building Permits for Residential Solar Systems (Oregon) SolarWind Permitting Standards...

282

City of San Jose - Photovoltaic Permit Requirements (California...  

Open Energy Info (EERE)

Jose - Solar Hot Water Heaters & Photovoltaic Systems Permit Requirements Incentive Type SolarWind Permitting Standards Applicable Sector Commercial, Construction, Industrial,...

283

Clark County - Solar and Wind Building Permit Guides (Nevada...  

Open Energy Info (EERE)

and commercial wind projects must submit commercial electrical sub permit applications. Solar permit applications must include minimum electric design information to confirm that...

284

Application for presidential permit OE Docket No. PP-362 Champlain...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

You are here Home Application for presidential permit OE Docket No. PP-362 Champlain Hudson Power Express Inc Application for presidential permit OE Docket No. PP-362...

285

City of Chicago - Green Permit and Green Homes Programs | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Administration Other Agencies You are here Home Savings City of Chicago - Green Permit and Green Homes Programs City of Chicago - Green Permit and Green Homes...

286

Application for Presidential Permit OE Docket No. PP-229 Tucson...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Application for Presidential Permit OE Docket No. PP-229 Tucson Electric Power Company Application for Presidential Permit OE Docket No. PP-229 Tucson Electric Power Company...

287

Improving Performance of Federal Permitting and Review of Infrastructu...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Improving Performance of Federal Permitting and Review of Infrastructure Projects Improving Performance of Federal Permitting and Review of Infrastructure Projects Electricity...

288

Amendment of Water Rights Permit | Open Energy Information  

Open Energy Info (EERE)

Amendment of Water Rights Permit Jump to: navigation, search GEOTHERMAL ENERGYGeothermal Home Reference Material: Amendment of Water Rights Permit Details Activities (0) Areas (0)...

289

Westinghouse and Fuzhou Permitted to Restart Distribution of...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Westinghouse and Fuzhou Permitted to Restart Distribution of Light Bulb Products Westinghouse and Fuzhou Permitted to Restart Distribution of Light Bulb Products August 6, 2010 -...

290

EIS-0463: Presidential Permit Application for Northern Pass Transmissi...  

NLE Websites -- All DOE Office Websites (Extended Search)

63: Presidential Permit Application for Northern Pass Transmission, New Hampshire EIS-0463: Presidential Permit Application for Northern Pass Transmission, New Hampshire Summary...

291

Coordination of Federal Transmission Permitting on Federal Lands...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Coordination of Federal Transmission Permitting on Federal Lands (216(h)) Coordination of Federal Transmission Permitting on Federal Lands (216(h)) On October 23, 2009, the...

292

Request for Information on Permitting of Transmission Lines:...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Information on Permitting of Transmission Lines: Federal Register Notice Volume 77, No. 38 - Feb. 27, 2012 Request for Information on Permitting of Transmission Lines: Federal...

293

Air Quality Approvals and Permits (New Brunswick, Canada) | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Air Quality Approvals and Permits (New Brunswick, Canada) Air Quality Approvals and Permits (New Brunswick, Canada) Eligibility Commercial Construction Developer Industrial...

294

Application for Presidential Permit OE Docket No. PP-387 Soule...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

City of Saxman, Alaska Application for Presidential Permit OE Docket No. PP-387 Soule Hydro: Comments from Alaska Energy Authority Application for Presidential Permit OE Docket...

295

Application for Presidential Permit OE Docket No. PP-387 Soule...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Presidential Permit OE Docket No. PP-387 Soule Hydro: Comments from Alaska Energy Authority Application for Presidential Permit OE Docket No. PP-387 Soule Hydro: Comments from...

296

Application for Presidential Permit OE Docket No. PP-387 Soule...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Department of Agriculture Application for Presidential Permit OE Docket No. PP-387 Soule Hydro: Comments from Alaska Energy Authority Application for Presidential Permit OE Docket...

297

Underground Injection Control Permits and Registrations (Texas) |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

You are here You are here Home » Underground Injection Control Permits and Registrations (Texas) Underground Injection Control Permits and Registrations (Texas) < Back Eligibility Utility Agricultural Investor-Owned Utility State/Provincial Govt Industrial Construction Municipal/Public Utility Local Government Installer/Contractor Rural Electric Cooperative Fuel Distributor Savings Category Buying & Making Electricity Program Info State Texas Program Type Environmental Regulations Safety and Operational Guidelines Provider Texas Commission on Environmental Quality Chapter 27 of the Texas Water Code (the Injection Well Act) defines an "injection well" as "an artificial excavation or opening in the ground made by digging, boring, drilling, jetting, driving, or some other

298

Permitting of Wind Energy Facilities: A Handbook  

DOE Green Energy (OSTI)

This handbook has been written for individuals and groups involved in evaluating wind projects: decision-makers and agency staff at all levels of government, wind developers, interested parties and the public. Its purpose is to help stakeholders make permitting wind facility decisions in a manner which assures necessary environmental protection and responds to public needs.

NWCC Siting Work Group

2002-08-01T23:59:59.000Z

299

Renewable Energy Permitting Barriers in Hawaii: Experience from the Field  

Science Conference Proceedings (OSTI)

This white paper presents a summary of the solicited input from permitting agencies and renewable energy developers on the permitting process in Hawaii to provide stakeholders in Hawaii, particularly those involved in permitting, with information on current permitting barriers that renewable energy developers are experiencing.

Busche, S.; Donnelly, C.; Atkins, D.; Fields, R.; Black, C.

2013-03-01T23:59:59.000Z

300

Class 1 Permit Modification Notification Addition of Structures within Technical Area 54, Area G, Pad 11, Dome 375 Los Alamos National Laboratory Hazardous Waste Facility Permit, July 2012  

SciTech Connect

The purpose of this letter is to notify the New Mexico Environment Department-Hazardous Waste Bureau (NMED-HWB) of a Class 1 Permit Modification to the Los Alamos National Laboratory (LANL) Hazardous Waste Facility Permit issued to the Department of Energy (DOE) and Los Alamos National Security, LLC (LANS) in November 2010. The modification adds structures to the container storage unit at Technical Area (TA) 54 Area G, Pad 11. Permit Section 3.1(3) requires that changes to the location of a structure that does not manage hazardous waste shall be changed within the Permit as a Class 1 modification without prior approval in accordance with Code of Federal Regulations, Title 40 (40 CFR), {section}270.42(a)(1). Structures have been added within Dome 375 located at TA-54, Area G, Pad 11 that will be used in support of waste management operations within Dome 375 and the modular panel containment structure located within Dome 375, but will not be used as waste management structures. The Class 1 Permit Modification revises Figure 36 in Attachment N, Figures; and Figure G.12-1 in Attachment G.12, Technical Area 54, Area G, Pad 11 Outdoor Container Storage Unit Closure Plan. Descriptions of the structures have also been added to Section A.4.2.9 in Attachment A, TA - Unit Descriptions; and Section 2.0 in Attachment G.12, Technical Area 54, Area G, Pad 11 Outdoor Container Storage Unit Closure Plan. Full description of the permit modification and the necessary changes are included in Enclosure 1. The modification has been prepared in accordance with 40 CFR {section}270.42(a)(l). This package includes this letter and an enclosure containing a description of the permit modification, text edits of the Permit sections, and the revised figures (collectively LA-UR-12-22808). Accordingly, a signed certification page is also enclosed. Three hard copies and one electronic copy of this submittal will be delivered to the NMED-HWB.

Vigil-Holterman, Luciana R. [Los Alamos National Laboratory; Lechel, Robert A. [Los Alamos National Laboratory

2012-08-31T23:59:59.000Z

Note: This page contains sample records for the topic "manager bugs permit" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Streamlining the Federal geothermal leasing and permitting process: background papers, analysis and recommendations  

DOE Green Energy (OSTI)

The federal leasing and permitting programs were analyzed as well as those of the five states in the Pacific Region. The relevant statutoring and regulatory frameworks of the land management agencies involved were also analyzed, as well as the options prepared by the DOE Streamlining Task Force and the California State-Federal-Local Task Group. The present stationary responsibilities and management structure of the Forest Service, BLM, and the Pacific Region States, as well as the roles of DOE and DOD. (MHR)

Not Available

1978-07-30T23:59:59.000Z

302

Streamlining the Federal geothermal leasing and permitting process: background papers, analysis and recommendations  

DOE Green Energy (OSTI)

The Federal leasing and permitting programs were analyzed, as well as those of the states of Alaska, California, Hawaii, Oregon, and Washington. The relevant statutory and regulatory frameworks of the land management agencies involved, as well as the options prepared by the Streamlining Task Force and the California State-Federal-Local Task Group were analyzed. The agencies studied include the Forest Service, the Bureau of Land Management, the Pacific Region States, as well as the roles of DOE and DOD. (MHR)

Not Available

1978-07-30T23:59:59.000Z

303

Alternative Fuels Data Center: Biofuels Construction and Permitting  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Biofuels Construction Biofuels Construction and Permitting Assistance to someone by E-mail Share Alternative Fuels Data Center: Biofuels Construction and Permitting Assistance on Facebook Tweet about Alternative Fuels Data Center: Biofuels Construction and Permitting Assistance on Twitter Bookmark Alternative Fuels Data Center: Biofuels Construction and Permitting Assistance on Google Bookmark Alternative Fuels Data Center: Biofuels Construction and Permitting Assistance on Delicious Rank Alternative Fuels Data Center: Biofuels Construction and Permitting Assistance on Digg Find More places to share Alternative Fuels Data Center: Biofuels Construction and Permitting Assistance on AddThis.com... More in this section... Federal State Advanced Search All Laws & Incentives Sorted by Type

304

Alternative Fuels Data Center: Hydrogen Fueling Infrastructure Permitting  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Hydrogen Fueling Hydrogen Fueling Infrastructure Permitting and Safety to someone by E-mail Share Alternative Fuels Data Center: Hydrogen Fueling Infrastructure Permitting and Safety on Facebook Tweet about Alternative Fuels Data Center: Hydrogen Fueling Infrastructure Permitting and Safety on Twitter Bookmark Alternative Fuels Data Center: Hydrogen Fueling Infrastructure Permitting and Safety on Google Bookmark Alternative Fuels Data Center: Hydrogen Fueling Infrastructure Permitting and Safety on Delicious Rank Alternative Fuels Data Center: Hydrogen Fueling Infrastructure Permitting and Safety on Digg Find More places to share Alternative Fuels Data Center: Hydrogen Fueling Infrastructure Permitting and Safety on AddThis.com... More in this section... Federal State Advanced Search

305

Water pollution Control Permit Fee Schedules (West Virginia) | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

pollution Control Permit Fee Schedules (West Virginia) pollution Control Permit Fee Schedules (West Virginia) Water pollution Control Permit Fee Schedules (West Virginia) < Back Eligibility Utility Fed. Government Commercial Agricultural Investor-Owned Utility State/Provincial Govt Industrial Construction Municipal/Public Utility Local Government Residential Installer/Contractor Rural Electric Cooperative Tribal Government Low-Income Residential Schools Retail Supplier Institutional Multi-Family Residential Systems Integrator Fuel Distributor Nonprofit General Public/Consumer Transportation Program Info State West Virginia Program Type Fees Siting and Permitting Provider Department of Environmental Protection This rule establishes schedules of permit application fees and annual permit fees for state water pollution control permits and national

306

Alaska Oil and Gas Exploration, Development, and Permitting Project  

SciTech Connect

This is the final technical report for Project 15446, covering the grant period of October 2002 through March 2006. This project connects three parts of the oil exploration, development, and permitting process to form the foundation for an advanced information technology infrastructure to better support resource development and resource conservation. Alaska has nearly one-quarter of the nation's supply of crude oil, at least five billion barrels of proven reserves. The American Association of Petroleum Geologists report that the 1995 National Assessment identified the North Slope as having 7.4 billion barrels of technically recoverable oil and over 63 trillion cubic feet of natural gas. From these reserves, Alaska produces roughly one-fifth of the nation's daily crude oil production, or approximately one million barrels per day from over 1,800 active wells. The broad goal of this grant is to increase domestic production from Alaska's known producing fields through the implementation of preferred upstream management practices. (PUMP). Internet publication of extensive and detailed geotechnical data is the first task, improving the permitting process is the second task, and building an advanced geographical information system to offer continuing support and public access of the first two goals is the third task. Excellent progress has been made on all three tasks; the technical objectives as defined by the approved grant sub-tasks have been met. The end date for the grant was March 31, 2006.

Richard McMahon; Robert Crandall

2006-03-31T23:59:59.000Z

307

Hanford Site air operating permit application  

SciTech Connect

The Clean Air Act Amendments of 1990, which amended the Federal Clean Air Act of 1977, required that the US Environmental Protection Agency develop a national Air Operating Permit Program, which in turn would require each state to develop an Air Operating Permit Program to identify all sources of ``regulated`` pollutants. Regulated pollutants include ``criteria`` pollutants (oxides of nitrogen, sulfur oxides, total suspended particulates, carbon monoxide, particulate matter greater than 10 micron, lead) plus 189 other ``Hazardous`` Air Pollutants. The Hanford Site, owned by the US Government and operated by the US Department of Energy, Richland Operations Office, is located in southcentral Washington State and covers 560 square miles of semi-arid shrub and grasslands located just north of the confluence of the Snake and Yakima Rivers with the Columbia River. This land, with restricted public access, provides a buffer for the smaller areas historically used for the production of nuclear materials, waste storage, and waste disposal. About 6 percent of the land area has been disturbed and is actively used. The Hanford Site Air Operating Permit Application consists of more than 1,100 sources and in excess of 300 emission points. Before January 1995, the maintenance and operations contractor and the environmental restoration contractor for the US Department of Energy completed an air emission inventory on the Hanford Site. The inventory has been entered into a database so that the sources and emission points can be tracked and updated information readily can be retrieved. The Hanford Site Air Operating Permit Application contains information current as of April 19, 1995.

NONE

1995-05-01T23:59:59.000Z

308

Upgrades to meet LANL SF, 121-2011, hazardous waste facility permit requirements  

Science Conference Proceedings (OSTI)

Members of San IIdefonso have requested information from LANL regarding implementation of the revision to LANL's Hazardous Waste Facility Permit (the RCRA Permit). On January 26, 2011, LANL staff from the Waste Disposition Project and the Environmental Protection Division will provide a status update to Pueblo members at the offices of the San IIdefonso Department of Environmental and Cultural Preservation. The Waste Disposition Project presentation will focus on upgrades and improvements to LANL waste management facilities at TA-50 and TA-54. The New Mexico Environment Department issued LANL's revised Hazardous Waste Facility permit on November 30, 2010 with a 30-day implementation period. The Waste Disposition Project manages and operates four of LANL's permitted facilities; the Waste Characterization, Reduction and Repackaging Facility (WCRRF) at TA-SO, and Area G, Area L and the Radioassay and Nondestructive Testing facility (RANT) at TA-54. By implementing a combination of permanent corrective action activities and shorter-term compensatory measures, WDP was able to achieve functional compliance on December 30, 2010 with new Permit requirements at each of our facilities. One component of WOP's mission at LANL is centralized management and disposition of the Laboratory's hazardous and mixed waste. To support this mission objective, WOP has undertaken a project to upgrade our facilities and equipment to achieve fully compliant and efficient waste management operations. Upgrades to processes, equipment and facilities are being designed to provide defense-in-depth beyond the minimum, regulatory requirements where worker safety and protection of the public and the environment are concerned. Upgrades and improvements to enduring waste management facilities and operations are being designed so as not to conflict with future closure activities at Material Disposal Area G and Material Disposal Area L.

French, Sean B [Los Alamos National Laboratory; Johns - Hughes, Kathryn W [Los Alamos National Laboratory

2011-01-21T23:59:59.000Z

309

WIPP Hazardous Waste Facility Permit - 2008 Update  

Science Conference Proceedings (OSTI)

Important new changes to the Hazardous Waste Facility Permit (HWFP) were implemented during 2007. The challenge was to implement these changes without impacting shipping schedules. Many of the changes required advanced preparation and coordination in order to transition to the new waste analysis paradigm, both at the generator sites and at the WIPP without interrupting the flow of waste to the disposal facility. Not only did aspects of waste characterization change, but also a new Permittees' confirmation program was created. Implementing the latter change required that new equipment and facilities be obtained, personnel hired, trained and qualified, and operating procedures written and approved without interruption to the contact-handled (CH) transuranic (TRU) waste shipping schedule. This was all accomplished successfully with no delayed or cancelled shipments. Looking forward to 2008 and beyond, proposed changes that will deal with waste in the DOE TRU waste complex is larger than the TRUPACT-IIs can handle. Size reduction of the waste would lead to unnecessary exposure risk and ultimately create more waste. The WIPP is working to have the Nuclear Regulatory Commission (NRC) certify the TRUPACT-III. The TRUPACT-III will be able to accommodate larger sized TRU mixed waste. Along with this new NRC-certified shipping cask, a new disposal container, the Standard Large Box, must be proposed in a permit modification. Containers for disposal of TRU mixed waste at the WIPP must meet the DOT 7A standards and be filtered. Additionally, as the TRUPACT-III/Standard Large Box loads and unloads from the end of the shipping cask, the proposed modification will add horizontal waste handling techniques to WIPP's vertical CH TRU waste handling operations. Another major focus will be the Hazardous Waste Facility Permit reapplication. The WIPP received its HWFP in October of 1999 for a term of ten years. The regulations and the HWFP require that a new permit application be submitted 180-days before the expiration date of the HWFP. At that time, the WIPP will request only one significant change, the permitting of Panel 8 to receive TRU mixed waste. (author)

Kehrman, R.F.; Most, W.A. [Washington Regulatory and Environmental Services, Carlsbad, New Mexico (United States)

2008-07-01T23:59:59.000Z

310

PERMIT ATTACHMENT DD Contingency Plan Section 10 of the Permit Application; and Hanford Test and Demonstration Facility Contingency Plan Appendix C of the Permit Application  

E-Print Network (OSTI)

The following listed documents are hereby incorporated, in their entirety, by reference into this Permit. Some of the documents are excerpts from the Permittees DBVS Facility Research, Development, and Demonstration Dangerous Waste Permit Application dated May 10, 2004 (document #04-TED-036); hereafter called the Permit Application. Ecology has, as deemed necessary, modified specific language in the attachments. These modifications are described in the permit conditions (Parts I through V), and thereby supersede the language of the attachment. These incorporated attachments are enforceable conditions of this Permit, as modified by the

unknown authors

2004-01-01T23:59:59.000Z

311

Broward County Online Solar Permitting (Florida) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Broward County Online Solar Permitting (Florida) Broward County Online Solar Permitting (Florida) Broward County Online Solar Permitting (Florida) < Back Eligibility Commercial Residential Savings Category Solar Buying & Making Electricity Program Info State Florida Program Type Solar/Wind Permitting Standards Provider Unincorporated Broward County Broward County now offers Go SOLAR Online Permitting*, for rooftop solar photovoltaic system permitting. This online permitting system may be used for residential or low commercial properties that are governed by a participating municipality. The online permitting system is designed to provide a one-stop solar permitting process with a single application form, electronic review and approval, and flat fee. Applicants can use this system to choose from pre-approved and pre-engineered solar panel mounting installation designs,

312

Alternative Fuels Data Center: Compressed Natural Gas (CNG) Permit  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Compressed Natural Gas Compressed Natural Gas (CNG) Permit to someone by E-mail Share Alternative Fuels Data Center: Compressed Natural Gas (CNG) Permit on Facebook Tweet about Alternative Fuels Data Center: Compressed Natural Gas (CNG) Permit on Twitter Bookmark Alternative Fuels Data Center: Compressed Natural Gas (CNG) Permit on Google Bookmark Alternative Fuels Data Center: Compressed Natural Gas (CNG) Permit on Delicious Rank Alternative Fuels Data Center: Compressed Natural Gas (CNG) Permit on Digg Find More places to share Alternative Fuels Data Center: Compressed Natural Gas (CNG) Permit on AddThis.com... More in this section... Federal State Advanced Search All Laws & Incentives Sorted by Type Compressed Natural Gas (CNG) Permit Anyone dispensing CNG for use in vehicles must obtain a permit from the

313

Buying a better environment: cost-effective regulation through permit trading. Technical report  

SciTech Connect

This conference on transferable discharge permits marked another important milestone in an exciting and, I hope, environmentally and economically beneficial program. The authors TDP work at Wisconsin has become a model of university-industry-government cooperation. It involves research and outreach on an important common problem. What started out as a rather esoteric University of Wisconsin Sea Grant research project has moved quite rapidly to the stage where it could become a part of national resource management policy. The State of Wisconsin has now accepted the idea of transferable discharge permits for water and has begun to use it as a technique for dealing with the Fox River industrial complex.

Joeres, E.F.; David, M.H.

1982-01-01T23:59:59.000Z

314

Hydropower : A Regulatory Guide to Permitting and Licensing in Idaho, Montana, Oregon, and Washington.  

DOE Green Energy (OSTI)

The design, construction and operation of a hydropower project can result in many potential impacts. These potential impacts are of concern to a host of federal, state, and local authorities. Early consultation with land and water management, fish and wildlife resource protection, and health and human safety-oriented agencies should occur to determine specific concerns and study requirements for each proposed project. This Guide to Permitting and Licensing outlines the characteristic features of attractive hydropower sites; summarizes an array of developmental constraints; illustrates potential environmental impacts and concerns; and summarizes all federal, state, and local permitting and licensing requirements.

McCoy, Gilbert A.

1992-12-01T23:59:59.000Z

315

Hydropower: A Regulatory Guide to Permitting and Licensing in Idaho, Montana, Oregon, and Washington.  

DOE Green Energy (OSTI)

The design, construction and operation of a hydropower project can result in many potential impacts. These potential impacts are of concern to a host of federal, state, and local authorities. Early consultation with land and water management, fish and wildlife resource protection, and health and human safety-oriented agencies should occur to determine specific concerns and study requirements for each proposed project. This Guide to Permitting and Licensing outlines the characteristic features of attractive hydropower sites; summarizes an array of developmental constraints; illustrates potential environmental impacts and concerns; and summarizes all federal, state, and local permitting and licensing requirements.

McCoy, Gilbert A.

1992-12-01T23:59:59.000Z

316

Chapter 52 Permits, Registrations, and Prohibitory Rules (Kentucky) |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Chapter 52 Permits, Registrations, and Prohibitory Rules (Kentucky) Chapter 52 Permits, Registrations, and Prohibitory Rules (Kentucky) Chapter 52 Permits, Registrations, and Prohibitory Rules (Kentucky) < Back Eligibility Agricultural Commercial Construction Developer Industrial Installer/Contractor Investor-Owned Utility Municipal/Public Utility Rural Electric Cooperative Utility Program Info State Kentucky Program Type Environmental Regulations Siting and Permitting Provider Kentucky Department for Environmental Protection Kentucky Administrative Regulation Chapter 52, entitled Air Quality: Permits, Registrations, and Prohibitory Rules, is promulgated under the authority of the Division of Air Quality within the Energy and Environment Cabinet's Department for Environmental Protection. Chapter 52 outlines the permitting requirements for all air pollution sources within the state;

317

Petroleum Pipeline Eminent Domain Permit Procedures (Georgia) | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Petroleum Pipeline Eminent Domain Permit Procedures (Georgia) Petroleum Pipeline Eminent Domain Permit Procedures (Georgia) Petroleum Pipeline Eminent Domain Permit Procedures (Georgia) < Back Eligibility Commercial Construction Developer Fuel Distributor General Public/Consumer Industrial Investor-Owned Utility Municipal/Public Utility Utility Program Info State Georgia Program Type Environmental Regulations Siting and Permitting Provider Georgia Department of Natural Resources The Petroleum Pipeline Eminent Domain Permit Procedures serve to protect Georgia's natural and environmental resources by requiring permits be issued by the Director of the Environmental Protection Division prior to any petroleum or petroleum product pipe company acquiring property or interests by eminent domain. Monitoring conditions will be issued with

318

General Conditions Applicable to Water Discharge Permits and Procedures and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

General Conditions Applicable to Water Discharge Permits and General Conditions Applicable to Water Discharge Permits and Procedures and Criteria for Issuing Water Discharge Permits (Connecticut) General Conditions Applicable to Water Discharge Permits and Procedures and Criteria for Issuing Water Discharge Permits (Connecticut) < Back Eligibility Agricultural Commercial Construction Fed. Government Fuel Distributor General Public/Consumer Industrial Installer/Contractor Institutional Investor-Owned Utility Local Government Low-Income Residential Multi-Family Residential Municipal/Public Utility Nonprofit Residential Retail Supplier Rural Electric Cooperative Schools State/Provincial Govt Systems Integrator Transportation Tribal Government Utility Program Info State Connecticut Program Type Siting and Permitting Provider Department of Energy and Environmental Protection

319

Permitting Guidance for Biomass Power Plants  

Science Conference Proceedings (OSTI)

Biomass power plants could contribute significantly to reaching U.S. targets for renewable energy and greenhouse gas emissions reduction. Achieving these goals will require the construction of many new biomass-fired units, as well as the conversion of existing coal-fired units to biomass combustion or co-fired units. New biomass units will require air, water use, wastewater, and, in some cases, solid waste permits. Existing fossil fuel-fired units that will be converted to dedicated biomass-fired units o...

2011-05-12T23:59:59.000Z

320

Alternative Fuels Data Center: Compressed Natural Gas (CNG) Dealer Permit  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Compressed Natural Gas Compressed Natural Gas (CNG) Dealer Permit to someone by E-mail Share Alternative Fuels Data Center: Compressed Natural Gas (CNG) Dealer Permit on Facebook Tweet about Alternative Fuels Data Center: Compressed Natural Gas (CNG) Dealer Permit on Twitter Bookmark Alternative Fuels Data Center: Compressed Natural Gas (CNG) Dealer Permit on Google Bookmark Alternative Fuels Data Center: Compressed Natural Gas (CNG) Dealer Permit on Delicious Rank Alternative Fuels Data Center: Compressed Natural Gas (CNG) Dealer Permit on Digg Find More places to share Alternative Fuels Data Center: Compressed Natural Gas (CNG) Dealer Permit on AddThis.com... More in this section... Federal State Advanced Search All Laws & Incentives Sorted by Type Compressed Natural Gas (CNG) Dealer Permit

Note: This page contains sample records for the topic "manager bugs permit" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Solar and Wind Permitting Standards | Open Energy Information  

Open Energy Info (EERE)

Permitting Standards Permitting Standards Jump to: navigation, search Permitting standards can facilitate the installation of wind and solar energy systems by specifying the conditions and fees involved in project development. Some local governments have adopted simplified or expedited permitting standards for wind and/or solar. “Top-of-the-stack” or fast-track permitting saves system owners and project developers time and money. Some states have established maximum fees that local governments may charge for a permit for a solar or wind energy system. In addition, some states have developed (or have supported the development of) model wind ordinances for use by local governments. [1] Contents 1 Solar/Wind Permitting Standards Incentives 2 References Solar/Wind Permitting Standards Incentives

322

SunShot Initiative: Permitting, Interconnection, and Inspection  

NLE Websites -- All DOE Office Websites (Extended Search)

paper with PERMIT in the center. 2011 SunRun report estimated that permitting fees for a rooftop solar energy system cost an average of 2,500, though prices vary widely between...

323

Application for Presidential Permit OE Docket No. PP-387 Soule...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

for Presidential Permit OE Docket No. PP-387 Soule Hydro: Comments from Karen Brand Application for Presidential Permit OE Docket No. PP-387 Soule Hydro: Comments from Karen Brand...

324

Application for Presidential Permit OE Docket No. PP-235 Sempra...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Sempra Energy Resources Application for presidential permit OE Docket No. PP-235-1 Sempra Energy Resources and Termoelectrica U.S LLC Application for Presidential Permit OE Docket...

325

Application for presidential permit OE Docket No. PP-334 Baja...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

presidential permit OE Docket No. PP-334 Baja Wind U.S Transmission LLC: Federal Register Notice Volume 73, No. 36 - Feb. 22, 2008 Application for presidential permit OE Docket No....

326

Testing the efficiency of a tradeable permits market  

E-Print Network (OSTI)

A tradeable permits market is said to be efficient when all affected firms trade permits until their marginal costs equal the market price. Detailed firm-level data are generally required to perform such an efficiency test, ...

Montero, Juan-Pablo

2002-01-01T23:59:59.000Z

327

Exclusionary manipulation of carbon permit markets: a laboratory test  

E-Print Network (OSTI)

The experiment reported here tests the case of so-called exclusionary manipulation of emission permit markets, i.e., when a dominant firm -- here a monopolist -- increases its holding of permits in order to raise its rivals' ...

Carln, Bjrn.

328

Alternative Fuels Data Center: Fueling Station Air Quality Permit Exemption  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Fueling Station Air Fueling Station Air Quality Permit Exemption to someone by E-mail Share Alternative Fuels Data Center: Fueling Station Air Quality Permit Exemption on Facebook Tweet about Alternative Fuels Data Center: Fueling Station Air Quality Permit Exemption on Twitter Bookmark Alternative Fuels Data Center: Fueling Station Air Quality Permit Exemption on Google Bookmark Alternative Fuels Data Center: Fueling Station Air Quality Permit Exemption on Delicious Rank Alternative Fuels Data Center: Fueling Station Air Quality Permit Exemption on Digg Find More places to share Alternative Fuels Data Center: Fueling Station Air Quality Permit Exemption on AddThis.com... More in this section... Federal State Advanced Search All Laws & Incentives Sorted by Type Fueling Station Air Quality Permit Exemption

329

Closed BLM Public Lands: Geothermal Leases Not Permitted | OpenEI  

Open Energy Info (EERE)

Closed BLM Public Lands: Geothermal Leases Not Permitted Closed BLM Public Lands: Geothermal Leases Not Permitted Dataset Summary Description The U.S. Bureau of Land Management (BLM) released a series of GIS layers of public lands closed to geothermal leases (obtaining leases is not permitted in these regions). The various types of closed areas included here are: National Monuments, National Recreation Areas, National Conservation Areas, National Wildlife Refuges, National Historic Trails, Wilderness Areas, Wilderness Study Areas, and the Island Park Geothermal Area. The GIS layers were made available upon publication of the BLM's Nationwide Geothermal Resources Leasing Programmatic Environmental Impact Statement (PEIS). Each GIS layer contains: .SBX, .XML, .SHX, .DBF (.XLS), .PRJ, .SBN, and .SHP data.

330

U-144:Juniper Secure Access Input Validation Flaw Permits Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4:Juniper Secure Access Input Validation Flaw Permits 4:Juniper Secure Access Input Validation Flaw Permits Cross-Site Scripting Attacks U-144:Juniper Secure Access Input Validation Flaw Permits Cross-Site Scripting Attacks April 10, 2012 - 7:30am Addthis PROBLEM: A vulnerability was reported in Juniper Secure Access/Instant Virtual Extranet (IVE). A remote user can conduct cross-site scripting attacks. PLATFORM: Version(s): prior to 7.0R9 and 7.1R ABSTRACT: The VPN management interface does not properly filter HTML code from user-supplied input before displaying the input. A remote user can cause arbitrary scripting code to be executed by the target user's browser. reference LINKS: Vendor URL SecurityTracker Alert ID: 1026893 IMPACT ASSESSMENT: High Discussion: The code will originate from the interface and will run in the security

331

V-153: Symantec Brightmail Gateway Input Validation Flaw Permits Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Symantec Brightmail Gateway Input Validation Flaw Permits 3: Symantec Brightmail Gateway Input Validation Flaw Permits Cross-Site Scripting Attacks V-153: Symantec Brightmail Gateway Input Validation Flaw Permits Cross-Site Scripting Attacks May 10, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Symantec Brightmail Gateway PLATFORM: The vulnerabilities are reported in versions prior to 9.5.x ABSTRACT: Symantec's Brightmail Gateway management console is susceptible to stored cross-site scripting (XSS) issues found in some of the administrative interface pages. REFERENCE LINKS: Security Tracker Alert ID: 1028530 Symantec Security Advisory CVE-2013-1611 IMPACT ASSESSMENT: Medium DISCUSSION: The administrative interface does not properly filter HTML code from user-supplied input before displaying the input. A remote user can cause

332

Microsoft Word - Final Class 2 Permit Modification Request TRUPACT III.doc  

NLE Websites -- All DOE Office Websites (Extended Search)

January 10, 2011 January 10, 2011 Mr. James Bearzi. Chief Hazardous Waste Bureau New Mexico Environment Department 2905 Rodeo Park Drive East, Building 1 Santa Fe, New Mexico 87505-6303 Subject: Notification of a Class 2 Permit Modification to Permit Number: NM4890139088-TSDF Dear Mr. Bearzi: Enclosed is a Class 2 Permit Modification Request to: * Add TRUPACT-II I and Standard Large Box 2 * Revise Area of Contact-Handled Bay We certify under penalty of law that this document and the enclosure were prepared under our direction or supervision in accordance with a system designed to assure that qualified personnel properly gather and evaluate the information sUbmitted. Based on our inquiry of the person or persons who manage the system, or those persons directly responsible for

333

CoalFleet Advanced Combustion IGCC Permits Database  

Science Conference Proceedings (OSTI)

The CoalFleet Advanced Combustion IGCC Permits Database presents comprehensive information on permitting requirements and permit conditions for Integrated Gasification Combined Cycle (IGCC) power plants in an online database format. This Technical Update is a compilation of the Database contents as of March 31, 2008.

2008-04-11T23:59:59.000Z

334

WIPP Documents - Hazardous Waste Facility Permit (RCRA)  

NLE Websites -- All DOE Office Websites (Extended Search)

of Energy to manage, store, and dispose of contact-handled and remote-handled transuranic mixed waste at the Waste Isolation Pilot Plant. Mixed waste contains radioactive and...

335

Resource Conservation and Recovery Act: Part B, Permit application [for the Waste Isolation Pilot Plant (WIPP)]. Volume 1, Revison 1.0  

Science Conference Proceedings (OSTI)

This report contains information related to the permit application for the WIPP facility. Information is presented on solid waste management; personnel safety; emergency plans; site characterization; applicable regulations; decommissioning; and ground water monitoring requirements.

Not Available

1992-03-01T23:59:59.000Z

336

Regulatory Review of Early Site Permit Applications  

Science Conference Proceedings (OSTI)

The U.S. Nuclear Regulatory Commission (NRC) has received and is reviewing three applications for early site permits (ESPs). The ESP process allows early resolution of site-related issues affecting possible construction and operation of a new nuclear power plant. The nuclear industry views a successful and predictable ESP process as an important step in assessing whether to seek authorization to construct and operate a new generation of nuclear power reactors in the United States. Because consideration of ESP applications is a first-of-a-kind activity, a number of issues have emerged prior to and during the reviews of the first three applications. Issues have included the need for design information at the ESP stage, accident analyses, quality assurance, and seismic analyses. The NRC has been working to resolve identified issues to support a Commission decision on whether to issue an ESP approximately 33-37 months after receipt of each ESP application. (authors)

Scott, Michael L. [Senior Project Manager, Office of Nuclear Reactor Regulation, U.S. Nuclear Regulatory Commission, Washington, DC 20555 (United States)

2004-07-01T23:59:59.000Z

337

Biotechnology Regulatory Services public data file (permits, notifications,  

NLE Websites -- All DOE Office Websites (Extended Search)

Biotechnology Regulatory Services public data file (permits, notifications, Biotechnology Regulatory Services public data file (permits, notifications, and petitions) Agriculture Community Menu DATA APPS EVENTS DEVELOPER STATISTICS COLLABORATE ABOUT Agriculture You are here Data.gov » Communities » Agriculture » Data Biotechnology Regulatory Services public data file (permits, notifications, and petitions) Dataset Summary Description Public information on BRS applications for genetically engineered permits, notifications, and petitions. Tags {BRS,Permits,Notifications,Petitions,GE,"Agronomic Properties","Bacterial Resistance","Fungal Resistance","Herbicide Tolerance","Insect Resistance","Marker Gene","Nematode Resistance","Product Quality","Virus Resistance",Institution,Article,Phenotypes,"Genotypes "}

338

City of Portland - Streamlined Building Permits for Residential Solar  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Commercial Commercial Residential Savings Category Solar Buying & Making Electricity Heating & Cooling Water Heating Program Info State Oregon Program Type Solar/Wind Permitting Standards Provider City of Portland The City of Portland's Bureau of Development Services (BDS) developed an electronic permitting process for residential solar energy system installations. With this streamlined, expedited process, solar contractors can submit the project plans and permit application online for residential installations. In order to file the online application, the contractor must first be trained. The City of Portland has staff at the permitting desk trained as solar experts to assist solar contractors who need help filing their permits in person. This process has a turnaround time of

339

Storm Water Discharge Permits (Wisconsin) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Storm Water Discharge Permits (Wisconsin) Storm Water Discharge Permits (Wisconsin) Storm Water Discharge Permits (Wisconsin) < Back Eligibility Agricultural Commercial Construction Developer Fed. Government Fuel Distributor General Public/Consumer Industrial Installer/Contractor Institutional Investor-Owned Utility Local Government Low-Income Residential Multi-Family Residential Municipal/Public Utility Nonprofit Residential Retail Supplier Rural Electric Cooperative Schools State/Provincial Govt Systems Integrator Transportation Tribal Government Utility Program Info Start Date 08/2004 State Wisconsin Program Type Siting and Permitting Provider Department of Natural Resources Wisconsin's storm water runoff regulations include permitting requirements for construction sites and industrial facilities, including those

340

Hazardous Waste Transporter Permits (Connecticut) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Hazardous Waste Transporter Permits (Connecticut) Hazardous Waste Transporter Permits (Connecticut) Hazardous Waste Transporter Permits (Connecticut) < Back Eligibility Agricultural Commercial Construction Fed. Government Fuel Distributor General Public/Consumer Industrial Installer/Contractor Institutional Investor-Owned Utility Local Government Low-Income Residential Multi-Family Residential Municipal/Public Utility Nonprofit Residential Retail Supplier Rural Electric Cooperative Schools State/Provincial Govt Systems Integrator Transportation Tribal Government Utility Program Info State Connecticut Program Type Siting and Permitting Provider Department of Energy and Environmental Protection Transportation of hazardous wastes into or through the State of Connecticut requires a permit. Some exceptions apply. The regulations provide

Note: This page contains sample records for the topic "manager bugs permit" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

City and County of Denver - Solar Panel Permitting (Colorado) | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Solar Panel Permitting (Colorado) Solar Panel Permitting (Colorado) City and County of Denver - Solar Panel Permitting (Colorado) < Back Eligibility Commercial Construction General Public/Consumer Industrial Low-Income Residential Multi-Family Residential Residential Savings Category Solar Buying & Making Electricity Heating & Cooling Water Heating Program Info State Colorado Program Type Solar/Wind Permitting Standards Provider Department of Development Services Construction, Electrical, Plumbing and Zoning Permits* are required for Photovoltaic (PV) systems installed in the city of Denver. Denver provides same day permit review for most solar panel projects. More complex engineering projects may still be required to go through the Plan Review process. To obtain Zoning Permits for flush mounted solar panels, applicants must

342

Solar/Wind Permitting Standards | Open Energy Information  

Open Energy Info (EERE)

Permitting Standards Permitting Standards < Solar Jump to: navigation, search Permitting standards can facilitate the installation of wind and solar energy systems by specifying the conditions and fees involved in project development. Some local governments have adopted simplified or expedited permitting standards for wind and/or solar. “Top-of-the-stack” or fast-track permitting saves system owners and project developers time and money. Some states have established maximum fees that local governments may charge for a permit for a solar or wind energy system. In addition, some states have developed (or have supported the development of) model wind ordinances for use by local governments. [1] Solar/Wind Permitting Standards Incentives CSV (rows 1 - 55) Incentive Incentive Type Place Applicable Sector Eligible Technologies Active

343

GRR/Section 6 - Construction Permits Overview | Open Energy Information  

Open Energy Info (EERE)

6 - Construction Permits Overview 6 - Construction Permits Overview < GRR Jump to: navigation, search GRR-logo.png GEOTHERMAL REGULATORY ROADMAP Roadmap Home Roadmap Help List of Sections Section 6 - Construction Permits Overview 06 - ConstructionPermitsOverview.pdf Click to View Fullscreen Triggers None specified Click "Edit With Form" above to add content 06 - ConstructionPermitsOverview.pdf 06 - ConstructionPermitsOverview.pdf Error creating thumbnail: Page number not in range. Error creating thumbnail: Page number not in range. Flowchart Narrative Constructing a geothermal power plant requires numerous permits from Federal, state, and local governments, related to transporting construction materials, encroaching upon Federal and state right-of-ways, demolishing existing structures and building new structures.

344

Transmission/Permitting Atlas/State Data | Open Energy Information  

Open Energy Info (EERE)

Transmission/Permitting Atlas/State Data Transmission/Permitting Atlas/State Data < Transmission‎ | Permitting Atlas Jump to: navigation, search PermittingAtlasHeader.png Roadmap Compare States General Transmission Dashboard Permitting Atlas Compare States Arizona California Colorado Idaho Montana Nevada New Mexico Oregon Utah Washington Wyoming Resource Library NEPA Database State State Siting Act State Preemptive Authority Siting/Permitting Entities Permit Processing Timeframe Arizona None If TLSC finds compliance with local land use unreasonable or unfeasible, then the TLSC may grant a certificate Arizona Corporation Commission (ACC); Transmission Line Siting Committee (TLSC) 210-240 Days California Public Utilities Code Section 1001 Local jurisdictions are preempted from regulating electric power line projects California Public Utilities Commission (CPUC) 18 months

345

Solar and Wind Permitting Laws | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Permitting Laws Permitting Laws Solar and Wind Permitting Laws < Back Eligibility Commercial Industrial Nonprofit Residential Schools Savings Category Solar Buying & Making Electricity Wind Program Info State New Jersey Program Type Solar/Wind Permitting Standards Provider New Jersey Department of Community Affairs New Jersey has enacted three separate laws addressing local permitting practices for solar and wind energy facilities. The first deals with solar and wind facilities located in industrial-zoned districts; the second with wind energy devices sited on piers; and the third addresses permitting standards small wind energy devices in general. All three are described below. '''Solar and Wind as Permitted Uses in Industrial Zones''' In March 2009 the state enacted legislation (A.B. 2550) defining facilities

346

Revision D to 2006 AOP Renewal Statement of Basis For Hanford Site Air Operating Permit No. 00-05-006  

E-Print Network (OSTI)

The Statement of Basis (Statement) is issued by the permitting agencies as a separate supporting reference document to the Hanford Air Operating Permit (AOP). The Statement sets forth the legal and factual basis for the AOP conditions, and is not intended for enforcement purposes. The Statement includes references to the applicable statutory or regulatory provisions, technical supporting information on specific emission units, and clarifications of specific requirements. [Washington Administrative Code (WAC) 173-401-700(8)] In 1990, U.S. Congress amended the federal Clean Air Act (CAA). One change was to create air operating permits for industrial sources of air pollution (codified in Title 5 of the CAA). Prior to the creation of these permits, facility managers, regulators and the public had to look through many separate requirements to find those that applied to a certain facility. An air operating permit brings all applicable requirements into one place and requires the manager of the source to certify that it complies with all the applicable requirements. Further, the burden of proof for compliance changed from the regulating agencies to the sources. In 1991, the Washington State Legislature updated the Washington Clean Air Act [Chapter 70.94 of the Revised Code of Washington (RCW)] to make it consistent with the new federal program. In 1993, Ecology developed Washingtons operating permits regulation to comply with federal

unknown authors

2008-01-01T23:59:59.000Z

347

Report for the HWMA/RCRA Post Closure Permit for the INTEC Waste Calcining Facility at the INL Site  

Science Conference Proceedings (OSTI)

The Waste Calcining Facility (WCF) is located at the Idaho Nuclear Technology and Engineering Center. In 1998, the WCF was closed under an approved Hazardous Waste Management Act/Resource Conservation and Recovery Act (HWMA/RCRA) Closure Plan. Vessels and spaces were grouted and then covered with a concrete cap. The Idaho Department of Environmental Quality issued a final HWMA/RCRA post-closure permit on September 15, 2003, with an effective date of October 16, 2003. This permit sets forth procedural requirements for groundwater characterization and monitoring, maintenance, and inspections of the WCF to ensure continued protection of human health and the environment. The post-closure permit also includes semiannual reporting requirements under Permit Conditions III.H. and I.U. These reporting requirements have been combined into this single semiannual report.

Idaho Cleanup Project

2006-06-01T23:59:59.000Z

348

Complete genome sequence of Coriobacterium glomerans type strain (PW2T) from the midgut of Pyrrhocoris apterus L. (red soldier bug)  

SciTech Connect

Coriobacterium glomerans Haas and Ko nig 1988, is the only species of the genus Coriobacterium, family Coriobacteriaceae, order Coriobacteriales, phylum Actinobacteria. The bacterium thrives as an endosymbiont of pyrrhocorid bugs, i.e. the red fire bug Pyrrhocoris apterus L. The rationale for sequencing the genome of strain PW2T is its endosymbiotic life style which is rare among members of Actinobacteria. Here we describe the features of this symbiont, together with the complete genome sequence and its annotation. This is the first complete genome sequence of a member of the genus Coriobacterium and the sixth member of the order Coriobacteriales for which complete genome sequences are now available. The 2,115,681 bp long single replicon genome with its 1,804 protein-coding and 54 RNA genes is part of the Genomic Encyclopedia of Bacteria and Archaea project.

Stackebrandt, Erko [DSMZ - German Collection of Microorganisms and Cell Cultures GmbH, Braunschweig, Germany; Zeytun, Ahmet [Los Alamos National Laboratory (LANL); Lapidus, Alla L. [U.S. Department of Energy, Joint Genome Institute; Nolan, Matt [U.S. Department of Energy, Joint Genome Institute; Lucas, Susan [U.S. Department of Energy, Joint Genome Institute; Hammon, Nancy [U.S. Department of Energy, Joint Genome Institute; Deshpande, Shweta [U.S. Department of Energy, Joint Genome Institute; Cheng, Jan-Fang [U.S. Department of Energy, Joint Genome Institute; Tapia, Roxanne [Los Alamos National Laboratory (LANL); Goodwin, Lynne A. [Los Alamos National Laboratory (LANL); Pitluck, Sam [U.S. Department of Energy, Joint Genome Institute; Liolios, Konstantinos [U.S. Department of Energy, Joint Genome Institute; Pagani, Ioanna [U.S. Department of Energy, Joint Genome Institute; Ivanova, N [U.S. Department of Energy, Joint Genome Institute; Mavromatis, K [U.S. Department of Energy, Joint Genome Institute; Mikhailova, Natalia [U.S. Department of Energy, Joint Genome Institute; Huntemann, Marcel [U.S. Department of Energy, Joint Genome Institute; Pati, Amrita [U.S. Department of Energy, Joint Genome Institute; Chen, Amy [U.S. Department of Energy, Joint Genome Institute; Palaniappan, Krishna [U.S. Department of Energy, Joint Genome Institute; Chang, Yun-Juan [ORNL; Land, Miriam L [ORNL; Hauser, Loren John [ORNL; Rohde, Manfred [HZI - Helmholtz Centre for Infection Research, Braunschweig, Germany; Pukall, Rudiger [DSMZ - German Collection of Microorganisms and Cell Cultures GmbH, Braunschweig, Germany; Goker, Markus [DSMZ - German Collection of Microorganisms and Cell Cultures GmbH, Braunschweig, Germany; Detter, J. Chris [U.S. Department of Energy, Joint Genome Institute; Woyke, Tanja [U.S. Department of Energy, Joint Genome Institute; Bristow, James [U.S. Department of Energy, Joint Genome Institute; Eisen, Jonathan [U.S. Department of Energy, Joint Genome Institute; Markowitz, Victor [U.S. Department of Energy, Joint Genome Institute; Hugenholtz, Philip [U.S. Department of Energy, Joint Genome Institute; Kyrpides, Nikos C [U.S. Department of Energy, Joint Genome Institute; Klenk, Hans-Peter [DSMZ - German Collection of Microorganisms and Cell Cultures GmbH, Braunschweig, Germany

2013-01-01T23:59:59.000Z

349

Presidential Permits and Export Authorizations - Frequently Asked Questions  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Permits and Export Permits and Export Authorizations - Frequently Asked Questions Presidential Permits and Export Authorizations - Frequently Asked Questions Presidential Permits Export Authorizations Self Certifications Annual Reports Presidential Permits What are they? Permits for the construction, connection, operation and/or maintenance of electric transmission lines that cross the U.S. international border. What are the criteria? Two primary criteria are used to determine if a proposed project is consistent with the public interest. 1. DOE considers the impact the proposed project would have on the operating reliability of the U.S. electric power supply. 2. DOE must comply with the National Environmental Policy Act of 1969 (NEPA), which requires DOE to consider the environmental consequences

350

Request for Information on Permitting of Transmission Lines: Federal  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Request for Information on Permitting of Transmission Lines: Request for Information on Permitting of Transmission Lines: Federal Register Notice Volume 77, No. 38 - Feb. 27, 2012 Request for Information on Permitting of Transmission Lines: Federal Register Notice Volume 77, No. 38 - Feb. 27, 2012 The Department of Energy's Office of Electricity Delivery and Energy Reliability requested information on questions related to permitting of transmission lines. Infrastructure projects - such as high voltage, long distance, electric transmission facilities - often involve multiple Federal, State, local and Tribal authorizations and are subject to a wide array of processes and procedural requirements in order to obtain all necessary permits and other authorizations. Delays in securing required statutory reviews, permits, and consultations can threaten the completion

351

Presidential Permit Holders - Annual Reports | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Permit Holders - Permit Holders - Annual Reports Presidential Permit Holders - Annual Reports Presidential permit holders are responsible for reporting the gross amount electric energy which flows into and out of the United States over the permitted international transmission facility regardless if the energy is wheeled to or for another entity. For example, utility A receives a Presidential permit for a single international transmission line across the U.S.-Canadian border. During the calendar year just completed, 300,000,000 kilowatt-hours (kwh) are imported from Canada across this line. Utility A arranged for the purchase of 200,000,000 kwh for its own use and wheeled 100,000,000 kwh to neighboring utility B. Utility A must report 300,000,000 kwh of imports over the international

352

Environmental assessment for presidential permit applications for Baja  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Environmental assessment for presidential permit applications for Environmental assessment for presidential permit applications for Baja California Power Inc and Sempra Energy Resources PP-234 and PP-235 Environmental assessment for presidential permit applications for Baja California Power Inc and Sempra Energy Resources PP-234 and PP-235 Environmental assessment for presidential permit applications for Baja California Power Inc and Sempra Energy Resources. December 2001 PP-234 and PP-235 Enviornmental assessment for presidential permit applications for Baja California Power Inc and Sempra Energy Resources PP-234 and PP-235 More Documents & Publications DOE Environmental Assessment EA-1391 for Presidential Permit Applications for Baja California Power Inc and Sempra Energy Resources PP-234 and PP-235: Finding of No Significant Impact

353

Orange County - Wind Permitting Standards | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Orange County - Wind Permitting Standards Orange County - Wind Permitting Standards Orange County - Wind Permitting Standards < Back Eligibility Agricultural Commercial Residential Savings Category Wind Buying & Making Electricity Program Info State California Program Type Solar/Wind Permitting Standards Provider OC Planning In December 2010, the County of Orange Board of Supervisors adopted small wind performance and development standards (Ord. No. 10-020) in order to promote distributed generation systems in non-urbanized areas (as defined in Government Code Section 65944(d)(2)) within the unincorporated territory. Permitting standards are for systems of 50 kW or less per customer site, for which the energy is primarily for on-site consumption. Height: For systems 45 feet tall or less, a use permit must be approved by

354

Expedited Permitting of Grid-Scale Wind Energy Development (Maine) |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Expedited Permitting of Grid-Scale Wind Energy Development (Maine) Expedited Permitting of Grid-Scale Wind Energy Development (Maine) Expedited Permitting of Grid-Scale Wind Energy Development (Maine) < Back Eligibility Utility Fed. Government Commercial Agricultural Investor-Owned Utility State/Provincial Govt Industrial Construction Municipal/Public Utility Local Government Residential Installer/Contractor Rural Electric Cooperative Tribal Government Low-Income Residential Schools Retail Supplier Institutional Multi-Family Residential Systems Integrator Fuel Distributor Nonprofit General Public/Consumer Transportation Savings Category Wind Buying & Making Electricity Program Info State Maine Program Type Siting and Permitting Maine's Expedited Permitting of Grid-Scale Wind Energy Development statue provides an expedited permitting pathway for proposed wind developments in

355

Geothermal policy development program: expediting the local geothermal permitting process  

DOE Green Energy (OSTI)

For a number of years, concerns have been raised about the length of time and the complexity involved in obtaining required permits in order to develop the geothermal resource at the Geysers. Perhaps the most important factor is jurisdiction. At the Geysers, all three levels of government - local, state, and federal - exercise significant authority over various aspects of geothermal development. In addition, several agencies within each governmental level play an active role in the permitting process. The present study is concerned primarily with the local permitting process, and the ways in which this process could be expedited. This report begins by looking at the local role in the overall permitting process, and then reviews the findings and conclusions that have been reached in other studies of the problem. This is followed by a case study evaluation of recent permitting experience in the four Geysers-Calistoga KGRA counties, and the report concludes by outlining several approaches to expediting the local permitting process.

Not Available

1981-07-01T23:59:59.000Z

356

Coastal Permit Program Rules (New Jersey) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Coastal Permit Program Rules (New Jersey) Coastal Permit Program Rules (New Jersey) Coastal Permit Program Rules (New Jersey) < Back Eligibility Utility Fed. Government Commercial Agricultural Investor-Owned Utility State/Provincial Govt Industrial Construction Municipal/Public Utility Local Government Residential Installer/Contractor Rural Electric Cooperative Tribal Government Low-Income Residential Schools Retail Supplier Institutional Multi-Family Residential Systems Integrator Fuel Distributor Nonprofit General Public/Consumer Transportation Savings Category Alternative Fuel Vehicles Hydrogen & Fuel Cells Buying & Making Electricity Water Home Weatherization Solar Wind Program Info State New Jersey Program Type Siting and Permitting Provider Department of Environmental Protection The Coastal Permit Program Rules provide the processes for permit reviews.

357

DOE Seeking Information on Transmission Line Permitting | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Seeking Information on Transmission Line Permitting Seeking Information on Transmission Line Permitting DOE Seeking Information on Transmission Line Permitting February 27, 2012 - 3:25pm Addthis The Department of Energy's Office of Electricity Delivery and Energy Reliability is seeking information on the questions related to permitting of transmission lines. Infrastructure projects - such as high voltage, long distance, electric transmission facilities - often involve multiple Federal, State, local, and Tribal authorizations and are subject to a wide array of processes and procedural requirements in order to obtain all necessary permits and other authorizations. Delays in securing required statutory reviews, permits, and consultations can threaten the completion projects of national and regional significance. This Request for

358

Request for Information on Permitting of Transmission Lines: Federal  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Request for Information on Permitting of Transmission Lines: Request for Information on Permitting of Transmission Lines: Federal Register Notice Volume 77, No. 38 - Feb. 27, 2012 Request for Information on Permitting of Transmission Lines: Federal Register Notice Volume 77, No. 38 - Feb. 27, 2012 The Department of Energy's Office of Electricity Delivery and Energy Reliability requested information on questions related to permitting of transmission lines. Infrastructure projects - such as high voltage, long distance, electric transmission facilities - often involve multiple Federal, State, local and Tribal authorizations and are subject to a wide array of processes and procedural requirements in order to obtain all necessary permits and other authorizations. Delays in securing required statutory reviews, permits, and consultations can threaten the completion

359

Microsoft Word - FINAL Class 1 Revise TRUPACT-III Management...  

NLE Websites -- All DOE Office Websites (Extended Search)

Dear Mr. Kieling: Enclosed is a Class 1 Permit Modification Notification to: * Revise TRUPACT-III Management Language * Revise Procedure Reference for the Bolting Station in Table...

360

Coal Fleet Integrated Gasification Combined Cycle (IGCC Permitting) Guidelines  

Science Conference Proceedings (OSTI)

This report provides guidance to owners of planned Integrated Gasification Combined Cycle (IGCC) power plants in order to assist them in permitting these advanced coal power generation facilities. The CoalFleet IGCC Permitting Guidelines summarize U.S. federal requirements for obtaining air, water, and solid waste permits for a generic IGCC facility, as described in the CoalFleet User Design Basis Specification (UDBS). The report presents characteristics of IGCC emissions that must be considered in the p...

2006-03-14T23:59:59.000Z

Note: This page contains sample records for the topic "manager bugs permit" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Chapter 38 Hazardous Waste Permitting Process (Kentucky) | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8 Hazardous Waste Permitting Process (Kentucky) 8 Hazardous Waste Permitting Process (Kentucky) Chapter 38 Hazardous Waste Permitting Process (Kentucky) < Back Eligibility Agricultural Commercial Construction Developer Fed. Government Industrial Institutional Investor-Owned Utility Local Government Municipal/Public Utility Rural Electric Cooperative Schools State/Provincial Govt Transportation Tribal Government Utility Savings Category Alternative Fuel Vehicles Hydrogen & Fuel Cells Program Info State Kentucky Program Type Environmental Regulations Provider Department for Environmental Protection This administrative regulation establishes the general provisions for storage, treatment, recycling, or disposal of hazardous waste. It provides information about permits and specific requirements for containers, tanks,

362

Local Option - Building Permit Fee Waivers for Renewable Energy Projects  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Local Option - Building Permit Fee Waivers for Renewable Energy Local Option - Building Permit Fee Waivers for Renewable Energy Projects (Connecticut) Local Option - Building Permit Fee Waivers for Renewable Energy Projects (Connecticut) < Back Eligibility Agricultural Commercial Construction Fed. Government General Public/Consumer Industrial Installer/Contractor Institutional Local Government Low-Income Residential Multi-Family Residential Nonprofit Residential Schools State Government Tribal Government Savings Category Bioenergy Alternative Fuel Vehicles Hydrogen & Fuel Cells Water Buying & Making Electricity Solar Home Weatherization Wind Program Info State Connecticut Program Type Solar/Wind Permitting Standards Provider Department of Energy and Environmental Protection As of July 2011, Connecticut authorizes municipalities to pass a local

363

Phase III - Permitting and Initial Development | Open Energy Information  

Open Energy Info (EERE)

III - Permitting and Initial Development III - Permitting and Initial Development Jump to: navigation, search GEOTHERMAL ENERGYGeothermal Home GEA Development Phase III: Permitting and Initial Development GEA Development Phases The Geothermal Energy Association's (GEA) Geothermal Reporting Terms and Definitions are a guideline for geothermal developers to use when submitting geothermal resource development information to GEA for public dissemination in its annual US Geothermal Power Production and Development Update. GEA's Geothermal Reporting Terms and Definitions serve to increase the consistency, accuracy, and reliability of industry information presented in the development updates. Phase I - Resource Procurement and Identification Phase II - Resource Exploration and Confirmation Phase III - Permitting and Initial Development

364

Alteration of Terrain Permits (New Hampshire) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Alteration of Terrain Permits (New Hampshire) Alteration of Terrain Permits (New Hampshire) Alteration of Terrain Permits (New Hampshire) < Back Eligibility Agricultural Commercial Construction Fed. Government Fuel Distributor General Public/Consumer Industrial Installer/Contractor Institutional Investor-Owned Utility Local Government Low-Income Residential Multi-Family Residential Municipal/Public Utility Nonprofit Residential Retail Supplier Rural Electric Cooperative Schools State/Provincial Govt Systems Integrator Transportation Tribal Government Utility Savings Category Alternative Fuel Vehicles Hydrogen & Fuel Cells Buying & Making Electricity Water Home Weatherization Solar Wind Program Info State New Hampshire Program Type Siting and Permitting Provider NH Department of Environmental Services Alteration of Terrain Bureau

365

Application for Presidential Permit OE Docket No. PP-371 Northern...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Pamela Martin Application for Presidential Permit OE Docket No. PP-371 Northern Pass Transmission: Comments from Pamela Martin Application from Northern Pass Transmission to...

366

Application for Presidential Permit OE Docket No. PP-371 Northern...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Robert Martin Application for Presidential Permit OE Docket No. PP-371 Northern Pass Transmission: Comments from Robert Martin Application from Northern Pass Transmission to...

367

Air Quality Permits (Prince Edward Island, Canada) | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

that operate any of the following: - fuel burning equipment (utilities and non-utility boilers), - incinerators, and - industrial sources (e.g., asphalt plants) must get a permit...

368

Application for Presidential Permit OE Docket No. PP-229 Tucson...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Company Application for Presidential Permit OE Docket No. PP-229 Tucson Electric Power Company Application from Tucson Electric Power Company to construct, operate and maintain...

369

Application for Presidential Permit OE Docket No. PP-229 Tucson...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

No. 183 - Sep. 20, 2000 Application for Presidential Permit OE Docket No. PP-229 Tucson Electric Power Company: Federal Register Notice Volume 65, No. 183 - Sep. 20, 2000...

370

Application to Amend Presidential Permit OE Docket No. PP-022...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

& Publications PP-369 British Columbia Transmission Corporation and British Columbia Hydro and Power Authority Application for Presidential Permit OE Docket No. PP-022-4...

371

Operating Permits and Emission Fees (New Mexico) | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Information New Mexico Program Type Environmental Regulations Fees The New Mexico Environment Department's Air Quality Bureau processes permit applications for industries that...

372

Application for presidential permit OE Docket No. PP-299 Sea...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Application for presidential permit OE Docket No. PP-299 Sea Breeze Pacific Regional Transmission System Inc More Documents & Publications SEA-04: DOE Notice of Availability...

373

City of Asheville - Building Permit Fee Waiver | Department of...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

City of Asheville waives fees for building permits and plan reviews for certain renewable energy technologies and green building certifications for homes and mixed-use commercial...

374

Application for presidential permit OE Docket No. PP-334 Energia...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Application for presidential permit OE Docket No. PP-334 Energia Sierra Juarex U.S Transmission LLC: Notice of Intent To Prepare an Environmental Impact Statement....

375

Application for presidential permit OE Docket No. PP-334 Energia...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

25, 2009 Application for presidential permit OE Docket No. PP-334 Energia Sierra Juarex U.S Transmission LLC - Notice of Intent To Prepare an Environmental Impact Statement:...

376

City of Portland - Streamlined Building Permits for Residential...  

Open Energy Info (EERE)

Share this page on Facebook icon Twitter icon City of Portland - Streamlined Building Permits for Residential Solar Systems (Oregon) This is the approved revision of...

377

City of Tucson - Permit Fee Credit for Solar Energy Systems ...  

Open Energy Info (EERE)

Incentive Program Place Arizona Name City of Tucson - Permit Fee Credit for Solar Energy Systems Incentive Type Green Building Incentive Applicable Sector Commercial,...

378

Application for Presidential Permit OE Docket No. PP-257 Emera...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Paper Company, Inc. Application for presidential permit OE Docket No. PP-362 Champlain Hudson Power Express Inc Energy.gov Careers & Internships Funding Opportunities...

379

Application for presidential permit OE Docket No. PP-305 Montana...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Statement and Conduct Scoping Application for presidential permit OE Docket No. PP-305 Montana Alberta Tie Ltd: Notice to Intent to Prepare an Environmental Impact Statement and...

380

Application for presidential permit OE Docket No. PP-305 Montana...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Scope Change 1 Application for presidential permit OE Docket No. PP-305 Montana Alberta Tie Ltd: Scope Change 1 Application from Montana Alberta Tie Ltd to construct, operate,...

Note: This page contains sample records for the topic "manager bugs permit" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Application for presidential permit OE Docket No. PP-305 Montana...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Update Application for presidential permit OE Docket No. PP-305 Montana Alberta Tie Ltd: Update Application from Montana Alberta Tie Ltd to construct, operate, and maintain...

382

Application for presidential permit OE Docket No. PP-305 Montana...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Ltd Application for presidential permit OE Docket No. PP-305 Montana Alberta Tie Ltd Application from Montana Alberta Tie Ltd to construct, operate, and maintain electric...

383

Application for presidential permit OE Docket No. PP-371 Northern...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

LLC submitted an application for a Presidential Permit to construct a 1,200 MW high voltage direct current ("HVDC") transmission line (the "Application") from the Des...

384

Coordinating Permit Offices and the Development of Utility-Scale...  

NLE Websites -- All DOE Office Websites (Extended Search)

Permit Offices and the Development of Utility-Scale Geothermal Energy 2013 Geothermal Resources Council Annual Meeting Aaron Levine Katherine R. Young Kermit Witherbee October 1,...

385

EA-0587: Proposed Amendment to Presidential Permit PP-63 and...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

87: Proposed Amendment to Presidential Permit PP-63 and Associated Modification to 500 kV International Transmission Line: Forbes, Minnesota to Manitoba, Canada EA-0587: Proposed...

386

The Impact of City-level Permitting Processes on Residential...  

NLE Websites -- All DOE Office Websites (Extended Search)

The Impact of City-level Permitting Processes on Residential Photovoltaic Installation Prices and Development Times: An Empirical Analysis of Solar Systems in California Cities...

387

Clark County- Solar and Wind Building Permit Guides  

Energy.gov (U.S. Department of Energy (DOE))

Clark County, Nevada has established guides for obtaining building permits for wind and solar photovoltaic (PV) systems for both residential and commercial purposes. The guides outline applicable...

388

Improving Performance of Federal Permitting and Review of Infrastructu...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2012 Section 1222 of the Energy Policy Act 2005 International Electricity Regulation Presidential Permits Export Authorizations Pending Applications NEPA Other Regulatory...

389

Colorado Construction Air Permit Application | Open Energy Information  

Open Energy Info (EERE)

Jump to: navigation, search GEOTHERMAL ENERGYGeothermal Home Reference Material: Colorado Construction Air Permit Application Details Activities (0) Areas (0) Regions (0)...

390

City of Lakewood - Solar Permit Fee Rebate (Colorado) | Open...  

Open Energy Info (EERE)

Summary The City of Lakewood is providing rebates on permit fees paid by Lakewood homeowners and business owners who install solar water heating systems and photovoltaic (PV)...

391

Application for Presidential Permit OE Docket No. PP-059 Central...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

059 Central Power and Light Company (CPL) Application for Presidential Permit OE Docket No. PP-059 Central Power and Light Company (CPL) Application from Central Power and Light...

392

Amended Application for Presidential Permit OE Docket No: PP...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

LLC: Federal Register Notice, Volume 78, No. 160 - August 19, 2013 Amended Application for Presidential Permit OE Docket No: PP-371 Northern Pass Transmission LLC: Federal Register...

393

Request for Information on Improving Performance of Federal Permitting...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

and Review of Infrastructure Projects: Federal Register Notice Volume 78, No. 168 - August 29, 2013 Request for Information on Improving Performance of Federal Permitting and...

394

water + monitoring + Nevada + permitting | OpenEI Community  

Open Energy Info (EERE)

water + monitoring + Nevada + permitting Home Kyoung's picture Submitted by Kyoung(155) Contributor 2 August, 2012 - 18:43 Nevada Meeting 2 - Regulatory Issues water + monitoring...

395

City of Portland - Streamlined Building Permits for Residential...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Commercial Residential Savings For Solar Buying & Making Electricity Heating & Cooling Water Heating Program Information Oregon Program Type SolarWind Permitting Standards The...

396

Water Rights Permit Package Application | Open Energy Information  

Open Energy Info (EERE)

Login | Sign Up Search Page Edit with form History Facebook icon Twitter icon Water Rights Permit Package Application Jump to: navigation, search GEOTHERMAL...

397

Frederick County (Maryland) Department of Permits and Inspections (FCDPI)  

Energy.gov (U.S. Department of Energy (DOE))

The Frederick County (Maryland) Department of Permits and Inspections (FCDPI) is currently reviewing two proposed amendments to the 2012 International Energy Conservation Code (IECC), copies of...

398

Application for presidential permit OE Docket No. PP-371 Northern...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

LLC: Federal Register Notice Volume 75, No. 220 - Nov. 16, 2010 Application for presidential permit OE Docket No. PP-371 Northern Pass Transmission LLC: Federal Register Notice...

399

Application for presidential permit OE Docket No. PP-362 Champlain...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Hudson: Federal Register Notice Volume 75, No. 43 - Mar. 5, 2010 Application for presidential permit OE Docket No. PP-362 Champlain Hudson: Federal Register Notice Volume 75, No....

400

Application for presidential permit OE Docket No. PP-362 Champlain...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

of Intent To Prepare an Environmental Impact Statement: Federal Register Notice Volume 75, No. 117 - Jun. 18, 2010 Application for presidential permit OE Docket No. PP-362...

Note: This page contains sample records for the topic "manager bugs permit" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Local Option - Building Permit Fee Waivers for Renewable Energy...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

permit fees. Class I renewable energy projects include energy derived from solar power, wind power, fuel cells (using renewable or non-renewable fuels), methane gas from...

402

Application for Presidential Permit OE Docket No. PP-044 Northern...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

44 Northern Electric Cooperative Association Application for Presidential Permit OE Docket No. PP-044 Northern Electric Cooperative Association Application from Northern Electric...

403

Application for Presidential Permit OE Docket No. PP-387 Soule...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

City of Saxman, Alaska Application for Presidential Permit OE Docket No. PP-387 Soule Hydro: Comments from City of Saxman, Alaska Application from Soule Hydro to construct, operate...

404

Application for Presidential Permit OE Docket No. PP-387 Soule...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Peggy Wilson Application for Presidential Permit OE Docket No. PP-387 Soule Hydro: Comments from Alaska State Legislature, Peggy Wilson Application from Soule Hydro to...

405

Application for Presidential Permit OE Docket No. PP-387 Soule...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

of Agriculture Application for Presidential Permit OE Docket No. PP-387 Soule Hydro: Notice of Intervention by Department of Agriculture Application from Soule Hydro to...

406

Application for Presidential Permit OE Docket No. PP-369 British...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

69 British Columbia Transmission Corporation and British Columbia Hydro and Power Authority Application for Presidential Permit OE Docket No. PP-369 British Columbia Transmission...

407

Application for Presidential Permit OE Docket No. PP-387 Soule...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

from Karen Brand Application for Presidential Permit OE Docket No. PP-387 Soule Hydro: Comments from Karen Brand Application from Soule Hydro to construct, operate and...

408

Application for Presidential Permit OE Docket No. PP-387 Soule...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Hydro, LLC Application for Presidential Permit OE Docket No. PP-387 Soule Hydro, LLC Application from Soule Hydro to construct, operate and maintain electric transmission...

409

Texas Construction General Permit (TXR1500000) | Open Energy...  

Open Energy Info (EERE)

Jump to: navigation, search GEOTHERMAL ENERGYGeothermal Home Reference Material: Texas Construction General Permit (TXR1500000) edit Details Activities (0) Areas (0)...

410

Wind Energy Permitting Standards (North Carolina) | Open Energy...  

Open Energy Info (EERE)

Login | Sign Up Search Page Edit with form History Facebook icon Twitter icon Wind Energy Permitting Standards (North Carolina) No revision has been approved for this...

411

Resource Conservation and Recovery Act, Part B permit application [for the Waste Isolation Pilot Plant (WIPP)]. Volume 1, Revision 3  

Science Conference Proceedings (OSTI)

This volume includes the following chapters: Waste Isolation Pilot Plant RCRA A permit application; facility description; waste analysis plan; groundwater monitoring; procedures to prevent hazards; RCRA contingency plan; personnel training; corrective action for solid waste management units; and other Federal laws.

Not Available

1993-03-01T23:59:59.000Z

412

Joint Implementation, Clean Develop-ment Mechanism and Tradable Permits  

E-Print Network (OSTI)

Joint Implementation, Clean Develop- ment Mechanism and Tradable Permits International Regulation) funded project `C02 permits in Danish and European energy policy'. .. Rise-R- 1197(EN) #12;WORKING PAPER the institutionalji-amework forJI it is important to know the incentives and motivations of the dlj$erent groups

413

Waste Feed Delivery Environmental Permits and Approvals Plan  

Science Conference Proceedings (OSTI)

This plan describes the environmental permits approvals, and other requirements that may affect establishment of a waste feed delivery system for the Hanford Site's River Protection Project. This plan identifies and screens environmental standards for potential applicability, outlines alternatives for satisfying applicable standards, and describes preferred permitting and approval approaches.

TOLLEFSON, K.S.

2000-01-18T23:59:59.000Z

414

DOE Environmental Assessment EA-1391 for Presidential Permit Applications  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

DOE Environmental Assessment EA-1391 for Presidential Permit DOE Environmental Assessment EA-1391 for Presidential Permit Applications for Baja California Power Inc and Sempra Energy Resources PP-234 and PP-235: Finding of No Significant Impact DOE Environmental Assessment EA-1391 for Presidential Permit Applications for Baja California Power Inc and Sempra Energy Resources PP-234 and PP-235: Finding of No Significant Impact The Department of Energy has determined in its Environmental Assessment EA-1391 for Presidential Permit Applications for Baja California Power Inc and Sempra Energy Resources PP-234 and PP-235 a finding of no significant impact Finding of No Significant Impact: DOE Enviornmental Assessment EA-1391 More Documents & Publications Environmental assessment for presidential permit applications for Baja

415

Air Permits, Licenses, Certifications (Maine) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Air Permits, Licenses, Certifications (Maine) Air Permits, Licenses, Certifications (Maine) Air Permits, Licenses, Certifications (Maine) < Back Eligibility Agricultural Commercial Construction Fed. Government Fuel Distributor General Public/Consumer Industrial Installer/Contractor Institutional Investor-Owned Utility Local Government Low-Income Residential Multi-Family Residential Municipal/Public Utility Nonprofit Residential Retail Supplier Rural Electric Cooperative Schools State/Provincial Govt Systems Integrator Transportation Tribal Government Utility Program Info State Maine Program Type Siting and Permitting Provider Department of Environmental Protection This program regulates and limits air emissions from a variety of sources within Maine through a statewide permitting program. Separate regulations exist for limiting emissions of nitrogen oxides (NOx), sulfur dioxide

416

City of Asheville - Building Permit Fee Waiver | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

City of Asheville - Building Permit Fee Waiver City of Asheville - Building Permit Fee Waiver City of Asheville - Building Permit Fee Waiver < Back Eligibility Commercial Residential Savings Category Solar Buying & Making Electricity Heating & Cooling Water Heating Wind Program Info Start Date 7/01/2009 State North Carolina Program Type Green Building Incentive Provider Building Safety Department The City of Asheville waives fees for building permits and plan reviews for certain renewable energy technologies and green building certifications for homes and mixed-use commercial buildings. Waivers for building permit fees may apply to residences with the following designations (the regular fee is in parentheses): * HealthyBuilt Home Certification* ($100) * Energy Star Rating ($100) * Geothermal heat pumps ($50)

417

City of Portland - Streamlined Building Permits for Residential Solar  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Residential Residential Savings Category Solar Buying & Making Electricity Heating & Cooling Water Heating Program Info State Oregon Program Type Green Building Incentive Provider City of Portland The City of Portland's Bureau of Development Services (BDS) developed an electronic permitting process for residential solar energy system installations. With this streamlined, expedited process, solar contractors can submit the project plans and permit application online for residential installations. In order to file the online application, the contractor must first be trained. The City of Portland has staff at the permitting desk trained as solar experts to assist solar contractors who need help filing their permits in person. This process has a turnaround time of approximately 2-3 business days for building permits.

418

Presidential Permits and Export Authorizations - About the Program |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Presidential Permits and Export Presidential Permits and Export Authorizations - About the Program Presidential Permits and Export Authorizations - About the Program The Federal international electricity program consists of two elements: 1.Granting Presidential permits for the construction, connection, operation and/or maintenance of electric transmission lines which cross the U.S. international border; and 2.Authorizing exports of electric energy to foreign countries. The authority to grant Presidential permits is derived from the constitutional power of the President to protect the territorial integrity of the United States. The authority to regulate the export of electric energy is based on the statutory authority contained in section 202(e) of the Federal Power Act (FPA). Executive Order 8202, issued by President Roosevelt in 1939, prohibited

419

State Water Permit Regulation (Arkansas) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Permit Regulation (Arkansas) Permit Regulation (Arkansas) State Water Permit Regulation (Arkansas) < Back Eligibility Fuel Distributor Industrial Utility Program Info State Arkansas Program Type Environmental Regulations Siting and Permitting Provider Department of Environmental Quality It is the purpose of this regulation to adopt standards applicable to the storage, discharge, or disposal of any waste which, if unregulated, will cause pollution of waters of the state or result in wastes being placed in a location where it is likely to cause pollution of the waters of the state. These standards are intended to protect public health and the environment, and prevent, control, or abate pollution. The State Water Permit Regulation is implemented to adopt standards applicable to the storage, discharge, or disposal of any waste that, if

420

Exclusionary Manipulation of Carbon Permit Markets: A Laboratory Test  

E-Print Network (OSTI)

The experiment reported here tests the case of so-called exclusionary manipulation of emission permit markets, i.e., when a dominant firm here a monopolist increases its holding of permits in order to raise its rivals costs and thereby gain more on a product market. Earlier studies have claimed that this type of market manipulation is likely to substantially reduce the social gains of permit trading and even result in negative gains. The experiment designed here parallels institutional and informational conditions likely to hold in real trade with carbon permits among electricity producers. Although the dominant firm withheld supply from the electricity market, the outcome seems to reject the theory of exclusionary manipulation. In later trading periods, closing prices on both markets, permit holdings and total electricity production are near competitive levels. Social gains of emissions trading are higher than in earlier studies. Key words: emissions trading; market power; experiments

Bjrn Carln

2002-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "manager bugs permit" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Final AOP Renewal 2 Statement of Basis For Hanford Site Air Operating Permit No. 00-05-006  

E-Print Network (OSTI)

referred to as the permitting agencies, as a separate supporting reference document to the Hanford Air Operating Permit (AOP). The Statement sets forth the legal and factual basis for the AOP conditions, and is not intended for enforcement purposes. The Statement includes references to the applicable statutory or regulatory provisions, technical supporting information on specific emission units, and clarifications of specific requirements. [Washington Administrative Code (WAC) 173-401-700(8)] In 1990, U.S. Congress amended the federal Clean Air Act (CAA). One of those amendments created air operating permits for industrial sources of air pollution (codified in Title 5 of the CAA). Prior to the creation of these permits, facility managers, regulators and the public had to look through many separate requirements to find those that applied to a certain facility. An air operating permit brings all applicable requirements into one place and requires the manager of the source to certify that it complies with all the applicable requirements. Further, the burden of proof for compliance changed from the regulating agencies to the sources.

unknown authors

2013-01-01T23:59:59.000Z

422

Inspection of Forrestal parking permit allocation and assignments  

Science Conference Proceedings (OSTI)

The purpose of this inspection was to review the process cr allocating and assigning parking permits at the Forrestal building. Specifically, we sought to determine the roles and responsibilities of Department of Energy (DOE) officials involved in the administration of the Forrestal parking permit process during the period June 1, 1991 to February 1, 1992. We also sought to determine if the allocation and assignment of Forrestal building parking spaces was implemented in accordance with Federal and DOE requirements. For our review, we interviewed the Headquarters officials involved in the administration of the parking permit allocation and assignment process. We also reviewed parking permit files and associated documentation for the period June 1, 1991 through February 1, 1992. In addition, we conducted a limited sampling of parking permits that were revoked during July and August 1991 to assess if they were processed in compliance with applicable regulations. We found no evidence that the actions by the Special Assistant to the Secretary (White House Liaison) and the other members of the parking committee regarding the issuance and revocation of parking permits were for any reason other than a desire to ensure that only individuals having a legitimate basis for a parking permit were issued a permit. However, we found that decisions by the parking committee regarding revocation of permits and appeals of revocation decisions were not always documented, nor were there written guidelines or procedures to govern the activities of the committee. In our view, the lack of written guidelines and procedures resulted in the use of invalidated personal knowledge by the parking committee in making decisions involving the revocation of parking permits and led to inconsistencies in the notification of individuals about the associated appeal process.

Not Available

1992-12-16T23:59:59.000Z

423

Livestock Waste Management Act (Nebraska) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Livestock Waste Management Act (Nebraska) Livestock Waste Management Act (Nebraska) Livestock Waste Management Act (Nebraska) < Back Eligibility Agricultural Commercial Construction Fed. Government Fuel Distributor General Public/Consumer Industrial Installer/Contractor Institutional Investor-Owned Utility Local Government Low-Income Residential Multi-Family Residential Municipal/Public Utility Nonprofit Residential Retail Supplier Rural Electric Cooperative Schools State/Provincial Govt Systems Integrator Transportation Tribal Government Utility Program Info State Nebraska Program Type Siting and Permitting Provider Environmental Quality This statute establishes the animal feeding operation permitting program and gives the Department of Environmental Quality the authority to administer the state permitting program. Permits are required for the

424

Wetlands Standard Dredge and Fill Permit (New Hampshire) | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Standard Dredge and Fill Permit (New Hampshire) Standard Dredge and Fill Permit (New Hampshire) Wetlands Standard Dredge and Fill Permit (New Hampshire) < Back Eligibility Agricultural Commercial Construction Fed. Government Fuel Distributor General Public/Consumer Industrial Installer/Contractor Institutional Investor-Owned Utility Local Government Low-Income Residential Multi-Family Residential Municipal/Public Utility Nonprofit Residential Retail Supplier Rural Electric Cooperative Schools State/Provincial Govt Systems Integrator Transportation Tribal Government Utility Savings Category Alternative Fuel Vehicles Hydrogen & Fuel Cells Buying & Making Electricity Water Home Weatherization Solar Wind Program Info State New Hampshire Program Type Environmental Regulations Provider Department of Environmental Services

425

City of Santa Monica - Expedited Permitting for Green Buildings |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Expedited Permitting for Green Buildings Expedited Permitting for Green Buildings City of Santa Monica - Expedited Permitting for Green Buildings < Back Eligibility Commercial Residential Savings Category Heating & Cooling Home Weatherization Construction Commercial Weatherization Commercial Heating & Cooling Design & Remodeling Bioenergy Solar Lighting Windows, Doors, & Skylights Heating Buying & Making Electricity Water Water Heating Wind Program Info State California Program Type Green Building Incentive Provider City of Santa Monica The City of Santa Monica allows for priority plan check processing for building projects that are registered with the United States Green Building Council for certification under the Leadership in Energy and Environmental Design (LEED) Green Building Rating System. The priority status applies to

426

EIS-0414: Presidential Permit Application, Energia Sierra Juarez  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

14: Presidential Permit Application, Energia Sierra Juarez 14: Presidential Permit Application, Energia Sierra Juarez Transmission Line, California EIS-0414: Presidential Permit Application, Energia Sierra Juarez Transmission Line, California Summary This EIS evaluates the potential environmental impacts from DOE's proposed Federal action of granting a Presidential permit to Energia Sierra Juarez U.S. Tranmssion, LLC (ESJ-U.S.), a subsidiary of Sempra Generation, to construct, operate, maintain, and connect a 1.7-mile transmission line (0.65 miles in the U.S.) across the international border between the U.S. and Mexico, near the town of Jacumba, California. The County of San Diego is a cooperating agency in the preparation of this EIS. Public Comment Opportunities No public comment opportunities available at this time.

427

Solar Construction Permitting Standards (California) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Standards (California) Standards (California) Solar Construction Permitting Standards (California) < Back Eligibility Commercial Industrial Local Government Residential Savings Category Solar Buying & Making Electricity Heating & Cooling Commercial Heating & Cooling Heating Water Heating Program Info State California Program Type Solar/Wind Permitting Standards Two bills signed in 2012 place limits on the fees that cities, counties, cities and counties, and charter cities can charge for a solar permit. AB 1801 specifies that a local government cannot base the fee for a solar permit on the value of the solar system or the value of the property on which the system will be installed. It also requires the local government to separately identify every fee charged on the invoice provided to the

428

File:03CACEncroachmentPermit.pdf | Open Energy Information  

Open Energy Info (EERE)

CACEncroachmentPermit.pdf CACEncroachmentPermit.pdf Jump to: navigation, search File File history File usage File:03CACEncroachmentPermit.pdf Size of this preview: 463 × 599 pixels. Other resolution: 464 × 600 pixels. Full resolution ‎(1,275 × 1,650 pixels, file size: 34 KB, MIME type: application/pdf) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 12:45, 19 November 2012 Thumbnail for version as of 12:45, 19 November 2012 1,275 × 1,650 (34 KB) Alevine (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage The following 2 pages link to this file: GRR/Flowcharts GRR/Section 3-CA-c - Encroachment Permit

429

File:03UTFEncroachmentPermit.pdf | Open Energy Information  

Open Energy Info (EERE)

UTFEncroachmentPermit.pdf UTFEncroachmentPermit.pdf Jump to: navigation, search File File history File usage File:03UTFEncroachmentPermit.pdf Size of this preview: 463 × 599 pixels. Other resolution: 464 × 600 pixels. Full resolution ‎(1,275 × 1,650 pixels, file size: 40 KB, MIME type: application/pdf) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 12:15, 30 August 2012 Thumbnail for version as of 12:15, 30 August 2012 1,275 × 1,650 (40 KB) Jnorris (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage The following 2 pages link to this file: GRR/Flowcharts GRR/Section 3-UT-f - Encroachment Permit

430

File:04AKBGeophysicalExplorationPermit.pdf | Open Energy Information  

Open Energy Info (EERE)

AKBGeophysicalExplorationPermit.pdf AKBGeophysicalExplorationPermit.pdf Jump to: navigation, search File File history File usage File:04AKBGeophysicalExplorationPermit.pdf Size of this preview: 463 × 599 pixels. Other resolution: 464 × 600 pixels. Full resolution ‎(1,275 × 1,650 pixels, file size: 62 KB, MIME type: application/pdf) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 11:38, 6 August 2012 Thumbnail for version as of 11:38, 6 August 2012 1,275 × 1,650 (62 KB) Jnorris (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage The following 2 pages link to this file: GRR/Flowcharts GRR/Section 4-AK-b - Geophysical Exploration Permit

431

Property:Permit/License Buildout (MW) | Open Energy Information  

Open Energy Info (EERE)

Permit/License Buildout (MW) Permit/License Buildout (MW) Jump to: navigation, search Property Name Permit/License Buildout (MW) Property Type String Pages using the property "Permit/License Buildout (MW)" Showing 25 pages using this property. (previous 25) (next 25) M MHK Projects/40MW Lewis project + 40 + MHK Projects/Algiers Light Project + 20 + MHK Projects/Anconia Point Project + 15 + MHK Projects/Ashley Point Project + 148 + MHK Projects/Avalon Tidal + 30 + MHK Projects/Avondale Bend Project + 18 + MHK Projects/BW2 Tidal + 3 + MHK Projects/Bar Field Bend + 94 + MHK Projects/Barfield Point + 114 + MHK Projects/Bayou Latenache + 50 + MHK Projects/Bondurant Chute + 152 + MHK Projects/Breeze Point + 198 + MHK Projects/Brilliant Point Project + 56 + MHK Projects/Brough Head Wave Farm + 200 +

432

City of Riverhead - Energy Conservation Device Permitting Fees | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

City of Riverhead - Energy Conservation Device Permitting Fees City of Riverhead - Energy Conservation Device Permitting Fees City of Riverhead - Energy Conservation Device Permitting Fees < Back Eligibility Commercial Residential Savings Category Solar Buying & Making Electricity Heating & Cooling Water Heating Wind Program Info Start Date 07/01/2005 (retroactive) State New York Program Type Green Building Incentive Provider Building Department In 2006 the Town of Riverhead on Long Island enacted a special allowance in its building permit fee structure to provide a discount to people wishing to install energy conservation devices on residential or commercial buildings. The provision in the town code applies to any energy conservation device "installed in or on a structure which qualifies for any federal, state or local tax exemption, tax credit or tax rebate", but

433

Taxes, Permits, and the Adoption of Abatement Technology under Imperfect  

Open Energy Info (EERE)

Taxes, Permits, and the Adoption of Abatement Technology under Imperfect Taxes, Permits, and the Adoption of Abatement Technology under Imperfect Compliance Jump to: navigation, search Name Taxes, Permits, and the Adoption of Abatement Technology under Imperfect Compliance Agency/Company /Organization Resources for the Future Sector Energy Topics Market analysis, Technology characterizations Resource Type Publications Website http://www.rff.org/RFF/Documen References Taxes, Permits, and the Adoption of Abatement Technology under Imperfect Compliance[1] Abstract "This paper analyzes the effects of the choice between price-based and quantity-based emissions regulations on compliance incentives and social welfare in the presence of incomplete enforcement and technology adoption. We show that if the regulator does not adjust the level of the policies in

434

Policy for Permitting Low-Emitting Sources (West Virginia) | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Policy for Permitting Low-Emitting Sources (West Virginia) Policy for Permitting Low-Emitting Sources (West Virginia) Policy for Permitting Low-Emitting Sources (West Virginia) < Back Eligibility Utility Fed. Government Commercial Agricultural Investor-Owned Utility State/Provincial Govt Industrial Construction Municipal/Public Utility Local Government Residential Installer/Contractor Rural Electric Cooperative Tribal Government Low-Income Residential Schools Retail Supplier Institutional Multi-Family Residential Systems Integrator Fuel Distributor Nonprofit General Public/Consumer Transportation Program Info State West Virginia Program Type Siting and Permitting While this policy alleviates some requirements on low-emitting emission sources, it does not change the policy of requiring applicants to submit reasonable information concerning all potential emission sources.

435

File:06IDCDrinkingWaterPermit.pdf | Open Energy Information  

Open Energy Info (EERE)

IDCDrinkingWaterPermit.pdf IDCDrinkingWaterPermit.pdf Jump to: navigation, search File File history File usage File:06IDCDrinkingWaterPermit.pdf Size of this preview: 463 × 599 pixels. Other resolution: 464 × 600 pixels. Full resolution ‎(1,275 × 1,650 pixels, file size: 24 KB, MIME type: application/pdf) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 08:14, 29 October 2012 Thumbnail for version as of 08:14, 29 October 2012 1,275 × 1,650 (24 KB) Dklein2012 (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage The following page links to this file: GRR/Section 6-ID-c - Drinking Water Permit Retrieved from

436

Disclosure of Permitted Communication Concerning Fossil Fuel Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

Disclosure of Permitted Communication Concerning Fossil Fuel Energy Disclosure of Permitted Communication Concerning Fossil Fuel Energy Consumption Reduction for New Construction and Major Renovations of Federal Buildings -- Docket No. EERE-2010-BT-STD-0031; RIN 1904-AB96 Disclosure of Permitted Communication Concerning Fossil Fuel Energy Consumption Reduction for New Construction and Major Renovations of Federal Buildings -- Docket No. EERE-2010-BT-STD-0031; RIN 1904-AB96 This memo provides an overview of communications made to DOE staff on the subject of the rulemaking referenced above. The communications occurred at a meeting held on February 13, 2013. DOE 433 ex parte memo.pdf More Documents & Publications Disclosure of Permitted Communication Concerning Regional Standards Enforcement Framework Document -- Docket No. EERE-2011-BT-CE-0077

437

File:06MTCDrinkingWaterPermit.pdf | Open Energy Information  

Open Energy Info (EERE)

MTCDrinkingWaterPermit.pdf MTCDrinkingWaterPermit.pdf Jump to: navigation, search File File history File usage File:06MTCDrinkingWaterPermit.pdf Size of this preview: 463 × 599 pixels. Other resolution: 464 × 600 pixels. Full resolution ‎(1,275 × 1,650 pixels, file size: 11 KB, MIME type: application/pdf) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 11:11, 1 October 2012 Thumbnail for version as of 11:11, 1 October 2012 1,275 × 1,650 (11 KB) Dklein2012 (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage The following page links to this file: GRR/Section 6-MT-c - Drinking Water Permit Retrieved from

438

DOE to Hold Public Information Meetings on Requested Permit Modifications  

NLE Websites -- All DOE Office Websites (Extended Search)

Requested Permit Modifications Requested Permit Modifications CARLSBAD, N.M., March 15, 2001 -- The public is invited to comment on requested modifications to the Hazardous Waste Facility Permit for the Waste Isolation Pilot Plant (WIPP). Submittal of the proposed modification request to the New Mexico Environment Department (NMED) by the U.S. Department of Energy (DOE) begins a formal review process that includes a 60-day public comment period and public information meetings. In its submittal, DOE requests five permit changes to modify conditions at the facility. The proposed modifications conform to industry standards for the handling of hazardous materials and would continue to protect the safety of the facility, its employees, and the public. The first two requested changes would eliminate redundant and obsolete training

439

Comments on RFI on Permitting of Transmission Lines Available | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Comments on RFI on Permitting of Transmission Lines Available Comments on RFI on Permitting of Transmission Lines Available Comments on RFI on Permitting of Transmission Lines Available April 3, 2012 - 2:12pm Addthis On October 5, 2011, the White House announced the creation of a Rapid Response Team for Transmission (RRTT). In support of the RRTT the Department of Energy's Office of Electricity Delivery and Energy Reliability released a Federal Register Notice seeking information on questions related to permitting of transmission lines. The Request for Information focused on making the development times for generation and transmission more commensurate with one another. Public comments received from the following organizations are now available for review and downloading. - Allegheny Highlands Alliance - American Electric Power

440

File:06NVCDrinkingWaterPermit.pdf | Open Energy Information  

Open Energy Info (EERE)

6NVCDrinkingWaterPermit.pdf 6NVCDrinkingWaterPermit.pdf Jump to: navigation, search File File history File usage File:06NVCDrinkingWaterPermit.pdf Size of this preview: 463 × 599 pixels. Other resolution: 464 × 600 pixels. Full resolution ‎(1,275 × 1,650 pixels, file size: 45 KB, MIME type: application/pdf) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 15:59, 15 October 2012 Thumbnail for version as of 15:59, 15 October 2012 1,275 × 1,650 (45 KB) Dklein2012 (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage The following page links to this file: GRR/Section 6-NV-c - Drinking Water Permit Retrieved from

Note: This page contains sample records for the topic "manager bugs permit" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

File:06ORCDrinkingWaterPermit.pdf | Open Energy Information  

Open Energy Info (EERE)

6ORCDrinkingWaterPermit.pdf 6ORCDrinkingWaterPermit.pdf Jump to: navigation, search File File history File usage File:06ORCDrinkingWaterPermit.pdf Size of this preview: 463 × 599 pixels. Other resolution: 464 × 600 pixels. Full resolution ‎(1,275 × 1,650 pixels, file size: 11 KB, MIME type: application/pdf) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 12:09, 28 September 2012 Thumbnail for version as of 12:09, 28 September 2012 1,275 × 1,650 (11 KB) Dklein2012 (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage The following page links to this file: GRR/Section 6-OR-c - Drinking Water Permit Retrieved from

442

EIS-0463: Presidential Permit Application for Northern Pass Transmission,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Presidential Permit Application for Northern Pass 3: Presidential Permit Application for Northern Pass Transmission, New Hampshire EIS-0463: Presidential Permit Application for Northern Pass Transmission, New Hampshire Summary This EIS will evaluate the potential environmental impacts from DOE's proposed Federal action of granting a Presidential permit to Northern Pass Transmission, LLC, to construct, operate, maintain, and connect a new electric transmission line across the U.S.-Canada border in northern New Hampshire. The U.S. Forest Service, White Mountain National Forest, and the U.S. Army Corps of Engineers, New England District, are cooperating agencies in the preparation of this EIS. Public Comment Opportunities None available at this time. Documents Available for Download September 18, 2013 EIS-0463: Notice of Public Meeting Location Change

443

Coordination of Federal Transmission Permitting on Federal Lands (216(h)) |  

NLE Websites -- All DOE Office Websites (Extended Search)

Coordination of Federal Transmission Permitting on Federal Lands (216(h)) Coordination of Federal Transmission Permitting on Federal Lands (216(h)) Coordination of Federal Transmission Permitting on Federal Lands (216(h)) On October 23, 2009, the Department of Energy and eight other Federal agencies entered into a Memorandum of Understanding (MOU) to improve coordination among project applicants, federal agencies, states and tribes involved in the siting and permitting process for electric transmission facilities on Federal land. The MOU will improve uniformity, consistency, and transparency by describing each entity's role and responsibilities when project applicants wish to build electric transmission facilities. Additionally, the MOU designates a "Lead Agency" serving as the single point-of-contact for coordinating all federal environmental reviews

444

Clean Air Interstate Rule (CAIR) Budget Permits (Michigan) | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Clean Air Interstate Rule (CAIR) Budget Permits (Michigan) Clean Air Interstate Rule (CAIR) Budget Permits (Michigan) Clean Air Interstate Rule (CAIR) Budget Permits (Michigan) < Back Eligibility Utility Fed. Government Commercial Agricultural Investor-Owned Utility State/Provincial Govt Industrial Construction Municipal/Public Utility Local Government Residential Installer/Contractor Rural Electric Cooperative Tribal Government Low-Income Residential Schools Retail Supplier Institutional Multi-Family Residential Systems Integrator Fuel Distributor Nonprofit General Public/Consumer Transportation Program Info State Michigan Program Type Siting and Permitting Michigan implements the federal requirements of the Clean Air Interstate Rule (CAIR) through state regulations. Michigan's Rule 821 requires subject sources to obtain and operate in compliance with a CAIR Annual NOx Budget

445

Microsoft Word - Permit Change 10-23-08  

NLE Websites -- All DOE Office Websites (Extended Search)

New Mexico Environment Department Approves Permit Change for WIPP CARLSBAD, N.M., October 23, 2008 - The New Mexico Environment Department (NMED) today approved a permit change to the U. S. Department of Energy's (DOE) Waste Isolation Pilot Plant (WIPP), which demonstrates that 15 WIPP site locations have been compliant with environmental protection requirements. The permit change eliminates continued sampling and analysis at these locations. Sampling data, collected by DOE over a 10-year period from the 15 locations, indicated that the areas posed no risk to human health or the environment. Last year, DOE submitted a Class 3 permit modification request to NMED to discontinue sampling of the areas, which included a number of mud pits constructed for exploratory boreholes, an evaporation pond and

446

U-093: Mozilla Firefox Multiple Flaws Permit Remote Code Execution,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, 3: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting Attacks U-093: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting Attacks February 1, 2012 - 5:51am Addthis PROBLEM: Multiple vulnerabilities were reported in Mozilla Firefox. PLATFORM: Linux (Any), UNIX (Any), Windows (Any) Version(s): prior to 3.2.26; prior to 10.0 ABSTRACT: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting. reference LINKS: SecurityTracker Alert ID: 1026605 CVE-2011-3659, CVE-2012-0442 CVE-2012-0443, CVE-2012-0444 CVE-2012-0445, CVE-2012-0446 CVE-2012-0447, CVE-2012-0449 CVE-2012-0450 Vendor Site IMPACT ASSESSMENT:

447

Regulations of the Arkansas Operating Air Permit Program (Arkansas) |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Regulations of the Arkansas Operating Air Permit Program (Arkansas) Regulations of the Arkansas Operating Air Permit Program (Arkansas) Regulations of the Arkansas Operating Air Permit Program (Arkansas) < Back Eligibility Commercial Construction Fuel Distributor Industrial Investor-Owned Utility Retail Supplier Utility Program Info State Arkansas Program Type Environmental Regulations Siting and Permitting Provider Department of Environmental Quality The Regulations of the Arkansas Air Operating Program are adopted in accordance with the provisions of Part UU of the Arkansas Water and Air Pollution Control Act, Arkansas Code Annotated 8-4-101, and will be referred to in this description as "program", "regulations" and "regulation No. 26". The regulations are intended to meet the requirements of title of

448

City of San Diego - Sustainable Building Expedited Permit Program |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

San Diego - Sustainable Building Expedited Permit Program San Diego - Sustainable Building Expedited Permit Program City of San Diego - Sustainable Building Expedited Permit Program < Back Eligibility Commercial Industrial Residential Savings Category Heating & Cooling Home Weatherization Construction Commercial Weatherization Commercial Heating & Cooling Design & Remodeling Solar Buying & Making Electricity Program Info Start Date 05/20/2003 State California Program Type Green Building Incentive Provider City of San Diego In 2002, the City of San Diego passed a Resolution R-298001, which amended the [http://dsireusa.org/incentives/incentive.cfm?Incentive_Code=CA42R&re=1&ee=1 Sustainable Building Policy] to allow for expedited permitting for sustainable buildings. Sustainable buildings are defined in Policy Number

449

File:03MTEEncroachmentPermit.pdf | Open Energy Information  

Open Energy Info (EERE)

MTEEncroachmentPermit.pdf MTEEncroachmentPermit.pdf Jump to: navigation, search File File history File usage File:03MTEEncroachmentPermit.pdf Size of this preview: 463 × 599 pixels. Other resolution: 464 × 600 pixels. Full resolution ‎(1,275 × 1,650 pixels, file size: 19 KB, MIME type: application/pdf) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 12:06, 1 October 2012 Thumbnail for version as of 12:06, 1 October 2012 1,275 × 1,650 (19 KB) Dklein2012 (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage The following 2 pages link to this file: GRR/Flowcharts GRR/Section 3-MT-e - Encroachment Permit

450

An Eddy-Permitting Southern Ocean State Estimate  

Science Conference Proceedings (OSTI)

An eddy-permitting general circulation model of the Southern Ocean is fit by constrained least squares to a large observational dataset during 200506. Data used include Argo float profiles, CTD synoptic sections, Southern Elephant Seals as ...

Matthew R. Mazloff; Patrick Heimbach; Carl Wunsch

2010-05-01T23:59:59.000Z

451

Impact of Stochastic Physics in a Convection-Permitting Ensemble  

Science Conference Proceedings (OSTI)

A stochastic physics scheme is tested in the Application of Research to Operations at Mesoscale (AROME) short-range convection-permitting ensemble prediction system. It is an adaptation of ECMWFs stochastic perturbation of physics tendencies (...

Franois Bouttier; Benot Vi; Olivier Nuissier; Laure Raynaud

2012-11-01T23:59:59.000Z

452

City of Riverhead- Energy Conservation Device Permitting Fees  

Energy.gov (U.S. Department of Energy (DOE))

In 2006 the Town of Riverhead on Long Island enacted a special allowance in its building permit fee structure to provide a discount to people wishing to install energy conservation devices on...

453

City of Philadelphia- Streamlined Solar Permitting and Fee Reduction  

Energy.gov (U.S. Department of Energy (DOE))

Photovoltaic systems of 10 kW or less installed on 1- or 2-family residential units are eligible for streamlined permitting and a fee reduction. PV projects can use a [http://www.phila.gov/green...

454

Application for presidential permit OE Docket No. PP-334 Baja...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

34 Baja Wind U.S Transmission LLC: Update Application for presidential permit OE Docket No. PP-334 Baja Wind U.S Transmission LLC: Update Application from Baja Wind U.S...

455

Broward County Online Solar Permitting (Florida) | Open Energy...  

Open Energy Info (EERE)

flat fee. Applicants can use this system to choose from pre-approved and pre-engineered solar panel mounting installation designs, and then apply for permits using those designs....

456

City of Riverhead - Energy Conservation Device Permitting Fees...  

Open Energy Info (EERE)

not eligible for the Fast-Track process. Prior to the code revision permitting fees for solar panel installations often approached 1,000. Incentive Contact Contact Name Sharon...

457

City of Aurora - Solar Permit Offset and Energy Audit Rebate...  

Open Energy Info (EERE)

added to DSIRE 2010-05-03 Last DSIRE Review 04172012 References DSIRE1 Summary All solar electric system installations in the city of Aurora require a building permit. With...

458

Application for presidential permit OE Docket No. PP-305 Montana...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

70, No. 210 - Nov. 1, 2005 Application for presidential permit OE Docket No. PP-305 Montana Alberta Tie Ltd: Federal Register Notice Volume 70, No. 210 - Nov. 1, 2005...

459

State Waste Discharge Permit application: 400 Area Septic System  

Science Conference Proceedings (OSTI)

As part of the Hanford Federal Facility Agreement and Consent Order negotiations, the US Department of Energy, Richland Operations Office, the US Environmental Protection Agency, and the Washington State Department of Ecology agreed that liquid effluent discharges to the ground on the Hanford Site which affects groundwater or has the potential to affect groundwater would be subject to permitting under the structure of Chapter 173-216 (or 173-218 where applicable) of the Washington Administrative Code, the State Waste Discharge Permit Program. This document constitutes the State Waste Discharge Permit application for the 400 Area Septic System. The influent to the system is domestic waste water. Although the 400 Area Septic System is not a Public Owned Treatment Works, the Public Owned Treatment Works application is more applicable than the application for industrial waste water. Therefore, the State Waste Discharge Permit application for Public Owned Treatment Works Discharges to Land was used.

Not Available

1994-06-01T23:59:59.000Z

460

APPLICATION FOR NUCLEAR SUBSTANCE USER PERMIT 1. a) Principal Investigator: ________________________  

E-Print Network (OSTI)

APPLICATION FOR NUCLEAR SUBSTANCE USER PERMIT 1. a) Principal Investigator-Mail: ____________________________________ 2. Previous experience in nuclear substance work by applicant: ________________________________________________________________________ 3. List all rooms where nuclear substances will be used or stored

Beaumont, Christopher

Note: This page contains sample records for the topic "manager bugs permit" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

West Coast Aerial Sardine Survey Application for Exempted Fishing Permit  

E-Print Network (OSTI)

West Coast Aerial Sardine Survey 2010 Application for Exempted Fishing Permit Applicants ........................................................................................5 A. Coastwide Summer Aerial Sardine Survey (July-August, 2010) ....................6 I. Survey Design ­ Coastwide Summer Aerial Sardine Survey ...............................6 Stage 1: Aerial Transect

462

Permit by Rule for Small Renewable Energy Projects (Virginia) | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Permit by Rule for Small Renewable Energy Projects (Virginia) Permit by Rule for Small Renewable Energy Projects (Virginia) Permit by Rule for Small Renewable Energy Projects (Virginia) < Back Eligibility Commercial Construction Developer Industrial Investor-Owned Utility Local Government Municipal/Public Utility Rural Electric Cooperative State/Provincial Govt Systems Integrator Tribal Government Utility Savings Category Alternative Fuel Vehicles Hydrogen & Fuel Cells Buying & Making Electricity Water Home Weatherization Solar Wind Program Info State Virginia Program Type Siting and Permitting Provider Virginia Department of Environmental Quality In 2009, the Virginia General Assembly enacted legislation directing the Virginia Department of Environmental Quality to develop regulations for the construction and operation of renewable energy projects of 100 megawatts

463

South Dakota alcohol fuel production handbook: permits, regulations, and assistance  

SciTech Connect

This handbook contains information on South Dakota alcohol legislation, and information on the various types of additional government program assistance available to the alcohol producer. It was prepared to assist potential alcohol producers with federal and state permit prerequisites. (DMC)

1980-01-01T23:59:59.000Z

464

Application for Presidential Permit OE Docket No. PP-387 Soule...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

OE Docket No. PP-387 Soule Hydro: Comments from City of Saxman, Alaska Application for Presidential Permit OE Docket No. PP-387 Soule Hydro: Comments from Alaska Energy Authority...

465

Hanford facility dangerous waste permit application, PUREX storage tunnels  

SciTech Connect

The Hanford Facility Dangerous Waste Permit Application is considered to be a single application organized into a General Information Portion (document number DOE/RL-91-28) and a Unit-Specific Portion. The scope of the Unit-Specific Portion is limited to Part B permit application documentation submitted for individual, operating treatment, storage, and/or disposal units, such as the PUREX Storage Tunnels (this document, DOE/RL-90-24). Both the General Information and Unit-Specific portions of the Hanford Facility Dangerous Waste Permit Application address the content of the Part B permit application guidance prepared by the Washington State Department of Ecology (Ecology 1996) and the US Environmental Protection Agency (40 Code of Federal Regulations 270), with additional information needs defined by the Hazardous and Solid Waste Amendments and revisions of Washington Administrative Code 173-303. For ease of reference, the Washington State Department of Ecology alpha-numeric section identifiers from the permit application guidance documentation (Ecology 1996) follow, in brackets, the chapter headings and subheadings. A checklist indicating where information is contained in the PUREX Storage Tunnels permit application documentation, in relation to the Washington State Department of Ecology guidance, is located in the Contents Section. Documentation contained in the General Information Portion is broader in nature and could be used by multiple treatment, storage, and/or disposal units (e.g., the glossary provided in the General Information Portion). Wherever appropriate, the PUREX Storage Tunnels permit application documentation makes cross-reference to the General Information Portion, rather than duplicating text. Information provided in this PUREX Storage Tunnels permit application documentation is current as of April 1997.

Price, S.M.

1997-09-08T23:59:59.000Z

466

Emissions Trading with Profit-Neutral Permit Allocations  

E-Print Network (OSTI)

Emissions Trading with Profit-Neutral Permit Allocations Cameron J. Hepburn, John K.-H. Quah, and Robert A. Ritz August 2012 CWPE 1235 EMISSIONS TRADING WITH PROFIT-NEUTRAL PERMIT ALLOCATIONS Cameron J... or technologies. However, there is a significant disadvantage to the use of taxes or trading: inframarginal wealth 1 The authors are affiliated to, respectively, the Grantham Research Institute, London School of Economics and Political Science (c.j...

Hepburn, Cameron J.; Quah, John K.-H.; Ritz, Robert A.

2012-08-17T23:59:59.000Z

467

Management and Storage of Surface Waters (Florida)  

Energy.gov (U.S. Department of Energy (DOE))

The Department of Environmental Protection regulates the use and storage of surface waters in the state. A permit from either the Department or the local Water Management District is required for...

468

Facilities Management Facilities Management  

E-Print Network (OSTI)

) with the fire prevention office and the permit issued by a fire inspector. Unless advanced notice is given Services - Fire Prevention Office. The requestor must understand that all permit requests for scheduled in requests so the Fire Inspector can make contact with the requester. In situations where an EMERGENCY ONLY

Noakes, David R.

469

AQUIS: A PC-based air quality and permit information system  

SciTech Connect

The Air Quality Utility Information System (AQUIS) was developed to calculate and track emissions, permits, and related information. The system runs on IBM-compatible personal computers using dBASE IV. AQUIS tracks more than 900 data items distributed among various source categories and allows the user to enter specific information on permit control devices, stacks, and related regulatory requirements. The system is currently operating at seven US Air Force Materiel Command facilities, large industrial operations involved in the repair and maintenance of aircraft. Environmental management personnel are responsible for the compliance status of as many as l,000 sources at each facility. The usefulness of the system has been enhanced by providing a flexible reporting capability that permits users who are unfamiliar with database structure to design and prepare reports containing specified information. In addition to the standard six pollutants, AQUIS calculates compound-specific emissions and allows users to enter their own emission estimates. This capability will be useful in developing air toxics inventories and control plans.

Smith, A.E.; Huber, C.C.; Tschanz, J. [Argonne National Lab., IL (United States); Ryckman, J.S. Jr. [Air Force Air Materiel Command, Wright-Patterson AFB, OH (United States)

1992-09-01T23:59:59.000Z

470

Solid Waste Management (Indiana) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Solid Waste Management (Indiana) Solid Waste Management (Indiana) Solid Waste Management (Indiana) < Back Eligibility Agricultural Commercial Industrial Investor-Owned Utility Local Government Municipal/Public Utility Rural Electric Cooperative State/Provincial Govt Utility Program Info State Indiana Program Type Environmental Regulations Provider Association of Indiana Solid Wastes Districts Inc. The state supports the implementation of source reduction, recycling, and other alternative solid waste management practices over incineration and land disposal. The Indiana Department of Environmental Management and the Indiana Solid Waste Management Board are tasked with planning and adopting rules and regulations governing solid waste management practices. Provisions pertaining to landfill management and expansion, permitting,

471

File:06UTBStormWaterPermit.pdf | Open Energy Information  

Open Energy Info (EERE)

UTBStormWaterPermit.pdf UTBStormWaterPermit.pdf Jump to: navigation, search File File history File usage File:06UTBStormWaterPermit.pdf Size of this preview: 463 × 599 pixels. Other resolution: 464 × 600 pixels. Full resolution ‎(1,275 × 1,650 pixels, file size: 41 KB, MIME type: application/pdf) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 12:16, 30 August 2012 Thumbnail for version as of 12:16, 30 August 2012 1,275 × 1,650 (41 KB) Jnorris (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage The following page links to this file: GRR/Section 6-UT-b - Storm Water Permit Retrieved from "http://en.openei.org/w/index.php?title=File:06UTBStormWaterPermit.pdf&oldid=509118

472

Portsmouth DUF6 Conversion Final EIS - Chapter 6: Environmental and Occupational Safety and Health Permits and Compliance Requirements  

NLE Websites -- All DOE Office Websites (Extended Search)

Portsmouth DUF Portsmouth DUF 6 Conversion Final EIS 6 ENVIRONMENTAL AND OCCUPATIONAL SAFETY AND HEALTH PERMITS AND COMPLIANCE REQUIREMENTS 6.1 DUF 6 CYLINDER MANAGEMENT AND CONSTRUCTION AND OPERATION OF A DUF 6 CONVERSION FACILITY DUF 6 cylinder management as well as construction and operation of the proposed DUF 6 conversion facility would be subject to many federal, state, and local requirements. In accordance with such legal requirements, a variety of permits, licenses, and other consents must be obtained. Table 6.1 at the end of this chapter lists those that may be needed. The status of each is indicated on the basis of currently available information. However, because the DUF 6 project is still at an early stage, the information in Table 6.1 should not be considered comprehensive or

473

Westinghouse and Fuzhou Permitted to Restart Distribution of Light Bulb  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Westinghouse and Fuzhou Permitted to Restart Distribution of Light Westinghouse and Fuzhou Permitted to Restart Distribution of Light Bulb Products Westinghouse and Fuzhou Permitted to Restart Distribution of Light Bulb Products August 6, 2010 - 4:26pm Addthis The Department has issued Notices of Allowance to Westinghouse Lighting Corporation and Fuzhou Sunlight Lighting Electrical Appliance Company determining, based on corrected test data provided by Westinghouse, that the incandescent reflector lamps listed below are compliant with the federal energy conservation standard and may be sold in the United States. These 11 Westinghouse brand lamps, usually used in recessed light fixtures, correspond to 7 basic models, which are manufactured in China by Fuzhou. DOE had previously issued Notices requiring Fuzhou and Westinghouse to

474

OpenEI Community - water + monitoring + Nevada + permitting  

Open Energy Info (EERE)

Meeting #2 - Meeting #2 - Regulatory Issues http://en.openei.org/community/blog/nevada-meeting-2-regulatory-issues The second Nevada permitting meeting was held Tuesday, July 24th in Reno, and was attended by approximately 15 people from industry and agencies.  Participants reviewed the Nevada Geothermal Regulatory roadmaps that had been reviewed and revised in the first Nevada meeting.  During this meeting, identified potential issues they've encountered in permitting in Nevada. read more http://en.openei.org/community/blog/nevada-meeting-2-regulatory-issues#comments water + monitoring + Nevada + permitting Geothermal Regulatory Roadmap Fri,

475

File:03CODAccessPermit (1).pdf | Open Energy Information  

Open Energy Info (EERE)

CODAccessPermit (1).pdf CODAccessPermit (1).pdf Jump to: navigation, search File File history File usage File:03CODAccessPermit (1).pdf Size of this preview: 463 × 599 pixels. Other resolution: 464 × 600 pixels. Full resolution ‎(1,275 × 1,650 pixels, file size: 47 KB, MIME type: application/pdf) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 16:13, 12 February 2013 Thumbnail for version as of 16:13, 12 February 2013 1,275 × 1,650 (47 KB) Dfitzger (Talk | contribs) 16:12, 7 February 2013 Thumbnail for version as of 16:12, 7 February 2013 1,275 × 1,650 (47 KB) Dfitzger (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information)

476

File:Archaeology excavation permit.pdf | Open Energy Information  

Open Energy Info (EERE)

Archaeology excavation permit.pdf Archaeology excavation permit.pdf Jump to: navigation, search File File history File usage File:Archaeology excavation permit.pdf Size of this preview: 463 × 599 pixels. Other resolution: 464 × 600 pixels. Go to page 1 2 3 4 5 6 7 Go! next page → next page → Full resolution ‎(1,275 × 1,650 pixels, file size: 201 KB, MIME type: application/pdf, 7 pages) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 13:58, 20 November 2012 Thumbnail for version as of 13:58, 20 November 2012 1,275 × 1,650, 7 pages (201 KB) Dklein2012 (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage

477

Improving Performance of Federal Permitting and Review of Infrastructure  

NLE Websites -- All DOE Office Websites (Extended Search)

Improving Performance of Federal Permitting and Review of Infrastructure Improving Performance of Federal Permitting and Review of Infrastructure Projects Improving Performance of Federal Permitting and Review of Infrastructure Projects The Department of Energy's (DOE) Office of Electricity Delivery and Energy Reliability, in collaboration with the Member Agencies of the Steering Committee (Member Agencies) created under Executive Order 13604 of March 22, 2012, and pursuant to the June 7, 2013 Transmission Presidential Memorandum, is seeking public input on a draft Integrated, Interagency Pre-Application (IIP) Process. The proposed IIP Process is intended to improve interagency and intergovernmental coordination focused on ensuring that project proponents develop and submit accurate and complete information early in the project planning process to facilitate efficient

478

DOE Hydrogen and Fuel Cells Program: Permitting Hydrogen Facilities Home  

NLE Websites -- All DOE Office Websites (Extended Search)

Hydrogen Fueling Stations Telecommunication Fuel Cell Use Hazard and Risk Analysis U.S. Department of Energy Hydrogen Fueling Stations Telecommunication Fuel Cell Use Hazard and Risk Analysis U.S. Department of Energy The objective of this U.S. Department of Energy Hydrogen Permitting Web site is to help local permitting officials deal with proposed hydrogen fueling stations, fuel cell installations for telecommunications backup power, and other hydrogen projects. Resources for local permitting officials who are looking to address project proposals include current citations for hydrogen fueling stations and a listing of setback requirements on the Alternative Fuels & Advanced Vehicle Data Center Web site. In addition, this overview of telecommunications fuel cell use and an animation that demonstrates telecommunications site layout using hydrogen fuel cells for backup power should provide helpful

479

File:03HICEncroachmentPermit.pdf | Open Energy Information  

Open Energy Info (EERE)

3HICEncroachmentPermit.pdf 3HICEncroachmentPermit.pdf Jump to: navigation, search File File history File usage File:03HICEncroachmentPermit.pdf Size of this preview: 463 × 599 pixels. Other resolution: 464 × 600 pixels. Full resolution ‎(1,275 × 1,650 pixels, file size: 45 KB, MIME type: application/pdf) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 11:43, 12 November 2012 Thumbnail for version as of 11:43, 12 November 2012 1,275 × 1,650 (45 KB) Alevine (Talk | contribs) 12:20, 23 October 2012 Thumbnail for version as of 12:20, 23 October 2012 1,275 × 1,650 (50 KB) Dklein2012 (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information)

480

File:Permit factsheet.pdf | Open Energy Information  

Open Energy Info (EERE)

Permit factsheet.pdf Permit factsheet.pdf Jump to: navigation, search File File history File usage Metadata File:Permit factsheet.pdf Size of this preview: 463 × 599 pixels. Other resolution: 464 × 600 pixels. Go to page 1 2 3 Go! next page → next page → Full resolution ‎(1,275 × 1,650 pixels, file size: 31 KB, MIME type: application/pdf, 3 pages) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 10:50, 12 June 2013 Thumbnail for version as of 10:50, 12 June 2013 1,275 × 1,650, 3 pages (31 KB) Apalazzo (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage There are no pages that link to this file.

Note: This page contains sample records for the topic "manager bugs permit" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

File:03AKELandUsePermit.pdf | Open Energy Information  

Open Energy Info (EERE)

AKELandUsePermit.pdf AKELandUsePermit.pdf Jump to: navigation, search File File history File usage File:03AKELandUsePermit.pdf Size of this preview: 463 × 599 pixels. Other resolution: 464 × 600 pixels. Full resolution ‎(1,275 × 1,650 pixels, file size: 71 KB, MIME type: application/pdf) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 11:00, 18 October 2012 Thumbnail for version as of 11:00, 18 October 2012 1,275 × 1,650 (71 KB) Jnorris (Talk | contribs) 11:35, 6 August 2012 Thumbnail for version as of 11:35, 6 August 2012 1,275 × 1,650 (56 KB) Jnorris (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information)

482

Energy Generation Project Permitting (Vermont) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Generation Project Permitting (Vermont) Generation Project Permitting (Vermont) Energy Generation Project Permitting (Vermont) < Back Eligibility Construction Industrial Installer/Contractor Investor-Owned Utility Municipal/Public Utility Rural Electric Cooperative Utility Savings Category Alternative Fuel Vehicles Hydrogen & Fuel Cells Buying & Making Electricity Water Home Weatherization Solar Wind Program Info State Vermont Program Type Environmental Regulations Provider Agency of Natural Resources The Vermont Energy Generation Siting Policy Commission is mandated to survey best practices for siting approval of electric generation projects (all facilities except for net- and group-net-metered facilities) and for public participation and representation in the siting process, and to report to the Governor and to the Vermont Legislature on their findings by

483

Extension of Comment Period on Improving Performance of Federal Permitting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Extension of Comment Period on Improving Performance of Federal Extension of Comment Period on Improving Performance of Federal Permitting and Review of Infrastructure Projects: Federal Register Notice Volume 78, No. 186 - September 25, 2013 Extension of Comment Period on Improving Performance of Federal Permitting and Review of Infrastructure Projects: Federal Register Notice Volume 78, No. 186 - September 25, 2013 On August 29, 2013, the U.S. Department of Energy (DOE) published a Request for Information seeking information on a draft Integrated, Interagency Pre-Application (IIP) Process for significant onshore electric transmission projects requiring Federal authorizations. This notice announces an extension of the public comment period for submitting comments regarding the IIP Process to October 31, 2013. Extension of Comment Period on Improving Performance of Federal Permitting

484

Extension of Comment Period on Improving Performance of Federal Permitting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Extension of Comment Period on Improving Performance of Federal Extension of Comment Period on Improving Performance of Federal Permitting and Review of Infrastructure Projects: Federal Register Notice Volume 78, No. 186 - September 25, 2013 Extension of Comment Period on Improving Performance of Federal Permitting and Review of Infrastructure Projects: Federal Register Notice Volume 78, No. 186 - September 25, 2013 On August 29, 2013, the U.S. Department of Energy (DOE) published a Request for Information seeking information on a draft Integrated, Interagency Pre-Application (IIP) Process for significant onshore electric transmission projects requiring Federal authorizations. This notice announces an extension of the public comment period for submitting comments regarding the IIP Process to October 31, 2013. Extension of Comment Period on Improving Performance of Federal Permitting

485

Permit for Charging Equipment Installation: Electric Vehicle Supply Equipment (EVSE)  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Compliance with the following permit will allow the installation and operation of electric vehicle charging equipment at a Compliance with the following permit will allow the installation and operation of electric vehicle charging equipment at a residence in the City, State jurisdiction. This permit addresses one of the following situations: Only an additional branch circuit would be added at the residence A hard-wired charging station would be installed at the residence. The attached requirements for wiring the charging station are taken directly out of the 2011 edition of the National Electrical Code (NEC) NFPA 70, Article 625 Electric Vehicle Charging System. This article does not provide all of the information necessary for the installation of electric vehicle charging equipment. Please refer to the current edition of the electrical code adopted by the local jurisdiction for additional installation requirements. Reference to the 2011 NEC may be

486

Hanford facility dangerous waste permit application, general information portion  

SciTech Connect

The Hanford Facility Dangerous Waste Permit Application is considered to be a single application organized into a General Information Portion (document number DOE/RL-91-28) and a Unit-Specific Portion. Both the General Information and Unit-Specific portions of the Hanford Facility Dangerous Waste Permit Application address the content of the Part B permit application guidance prepared by the Washington State Department of Ecology (Ecology 1996) and the U.S. Environmental Protection Agency (40 Code of Federal Regulations 270), with additional information needed by the Hazardous and Solid Waste Amendments and revisions of Washington Administrative Code 173-303. Documentation contained in the General Information Portion is broader in nature and could be used by multiple treatment, storage, and/or disposal units (e.g., the glossary provided in this report).

Hays, C.B.

1998-05-19T23:59:59.000Z

487

State Waste Discharge Permit application: 200-W Powerhouse Ash Pit  

Science Conference Proceedings (OSTI)

As part of the Hanford Federal Facility Agreement and Consent Order negotiations; the US Department of Energy, Richland Operations Office, the US Environmental Protection Agency, and the Washington State Department of Ecology agreed that liquid efflue