Powered by Deep Web Technologies
Note: This page contains sample records for the topic "validation flaw permits" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

U-252: Barracuda Web Filter Input Validation Flaws Permit Cross...  

Broader source: Energy.gov (indexed) [DOE]

2: Barracuda Web Filter Input Validation Flaws Permit Cross-Site Scripting Attacks U-252: Barracuda Web Filter Input Validation Flaws Permit Cross-Site Scripting Attacks September...

2

V-192: Symantec Security Information Manager Input Validation Flaws Permit  

Broader source: Energy.gov (indexed) [DOE]

92: Symantec Security Information Manager Input Validation Flaws 92: Symantec Security Information Manager Input Validation Flaws Permit Cross-Site Scripting, SQL Injection, and Information Disclosure Attacks V-192: Symantec Security Information Manager Input Validation Flaws Permit Cross-Site Scripting, SQL Injection, and Information Disclosure Attacks July 4, 2013 - 6:00am Addthis PROBLEM: Several vulnerabilities were reported in Symantec Security Information Manager PLATFORM: Symantec Security Information Manager Appliance Version 4.7.x and 4.8.0 ABSTRACT: Symantec was notified of multiple security issues impacting the SSIM management console REFERENCE LINKS: SecurityTracker Alert ID: 1028727 Symantec Security Advisory SYM13-006 CVE-2013-1613 CVE-2013-1614 CVE-2013-1615 IMPACT ASSESSMENT: Medium DISCUSSION: The console does not properly filter HTML code from user-supplied input

3

U-050: Adobe Flex SDK Input Validation Flaw Permits Cross-Site...  

Broader source: Energy.gov (indexed) [DOE]

Attacks U-050: Adobe Flex SDK Input Validation Flaw Permits Cross-Site Scripting Attacks December 2, 2011 - 5:24am Addthis PROBLEM: Adobe Flex SDK Input Validation Flaw Permits...

4

V-168: Splunk Web Input Validation Flaw Permits Cross-Site Scripting...  

Broader source: Energy.gov (indexed) [DOE]

8: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks V-168: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks May 31, 2013 - 6:00am Addthis...

5

V-124: Splunk Web Input Validation Flaw Permits Cross-Site Scripting...  

Broader source: Energy.gov (indexed) [DOE]

4: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks V-124: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks April 2, 2013 - 1:13am Addthis...

6

V-124: Splunk Web Input Validation Flaw Permits Cross-Site Scripting  

Broader source: Energy.gov (indexed) [DOE]

4: Splunk Web Input Validation Flaw Permits Cross-Site 4: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks V-124: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks April 2, 2013 - 1:13am Addthis PROBLEM: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks PLATFORM: Version(s): 4.3.0 through 4.3.5 ABSTRACT: A vulnerability was reported in Splunk Web. REFERENCE LINKS: SecurityTracker Alert ID: 1028371 Splunk IMPACT ASSESSMENT: High DISCUSSION: Splunk Web does not properly filter HTML code from user-supplied input before displaying the input. A remote user can cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the site running the Splunk Web software and will run in the security context of that site. As a result, the code will be able to access the

7

U-252: Barracuda Web Filter Input Validation Flaws Permit Cross-Site  

Broader source: Energy.gov (indexed) [DOE]

2: Barracuda Web Filter Input Validation Flaws Permit 2: Barracuda Web Filter Input Validation Flaws Permit Cross-Site Scripting Attacks U-252: Barracuda Web Filter Input Validation Flaws Permit Cross-Site Scripting Attacks September 6, 2012 - 6:00am Addthis PROBLEM: Barracuda Web Filter Input Validation Flaws Permit Cross-Site Scripting Attacks PLATFORM: Barracuda Web Filter 5.0.015 is vulnerable; other versions may also be affected. ABSTRACT: Barracuda Web Filter Authentication Module Multiple HTML Injection Vulnerabilities reference LINKS: Barracuda Networks Barracuda Networks Security ID: BNSEC-279/BNYF-5533 SecurityTracker Alert ID: 1027500 Bugtraq ID: 55394 seclists.org IMPACT ASSESSMENT: Medium Discussion: Two scripts not properly filter HTML code from user-supplied input before displaying the input. A remote user can cause arbitrary scripting code to

8

U-238: HP Service Manager Input Validation Flaw Permits Cross-Site  

Broader source: Energy.gov (indexed) [DOE]

8: HP Service Manager Input Validation Flaw Permits Cross-Site 8: HP Service Manager Input Validation Flaw Permits Cross-Site Scripting Attacks U-238: HP Service Manager Input Validation Flaw Permits Cross-Site Scripting Attacks August 17, 2012 - 7:00am Addthis PROBLEM: HP Service Manager Input Validation Flaw Permits Cross-Site Scripting Attacks PLATFORM: Version(s): 7.11, 9.21, 9.30 ABSTRACT: Cross-site scripting (XSS) vulnerability in HP Service Manager Web Tier 7.11, 9.21, and 9.30, and HP Service Center Web Tier 6.28, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. REFERENCE LINKS: www2.hp.com http://www.securitytracker.com/id/1027399 CVE-2012-3251 IMPACT ASSESSMENT: Moderate Discussion: A vulnerability was reported in HP Service Manager. A remote user can conduct cross-site scripting attacks. The software does not properly filter

9

U-229: HP Network Node Manager i Input Validation Flaw Permits Cross-Site  

Broader source: Energy.gov (indexed) [DOE]

9: HP Network Node Manager i Input Validation Flaw Permits 9: HP Network Node Manager i Input Validation Flaw Permits Cross-Site Scripting Attacks U-229: HP Network Node Manager i Input Validation Flaw Permits Cross-Site Scripting Attacks August 7, 2012 - 7:00am Addthis PROBLEM: HP Network Node Manager i Input Validation Flaw Permits Cross-Site Scripting Attacks PLATFORM: HP Network Node Manager I (NNMi) v8.x, v9.0x, v9.1x, v9.20 for HP-UX, Linux, Solaris, and Windows ABSTRACT: Potential security vulnerabilities have been identified with HP Network Node Manager i (NNMi) for HP-UX, Linux, Solaris, and Windows. The vulnerabilities could be remotely exploited resulting in cross site scripting (XSS). Reference LINKS: HP Document ID: c03405705 SecurityTracker Alert ID: 1027345 Bugtraq ID: 54815 CVE-2012-2022 IMPACT ASSESSMENT:

10

U-050: Adobe Flex SDK Input Validation Flaw Permits Cross-Site Scripting  

Broader source: Energy.gov (indexed) [DOE]

0: Adobe Flex SDK Input Validation Flaw Permits Cross-Site 0: Adobe Flex SDK Input Validation Flaw Permits Cross-Site Scripting Attacks U-050: Adobe Flex SDK Input Validation Flaw Permits Cross-Site Scripting Attacks December 2, 2011 - 5:24am Addthis PROBLEM: Adobe Flex SDK Input Validation Flaw Permits Cross-Site Scripting Attacks. PLATFORM: Adobe Flex SDK 4.5.1 and earlier 4.x versions for Windows, Macintosh and Linux Adobe Flex SDK 3.6 and earlier 3.x versions for Windows, Macintosh and Linux ABSTRACT: Flex applications created using the Flex SDK may not properly filter HTML code from user-supplied input before displaying the input. reference LINKS: Adobe Security Bulletin CVE-2011-2461 SecurityTracker Alert ID: 1026361 IMPACT ASSESSMENT: High Discussion: A remote user may be able to cause arbitrary scripting code to be executed

11

U-238: HP Service Manager Input Validation Flaw Permits Cross-Site  

Broader source: Energy.gov (indexed) [DOE]

38: HP Service Manager Input Validation Flaw Permits Cross-Site 38: HP Service Manager Input Validation Flaw Permits Cross-Site Scripting Attacks U-238: HP Service Manager Input Validation Flaw Permits Cross-Site Scripting Attacks August 17, 2012 - 7:00am Addthis PROBLEM: HP Service Manager Input Validation Flaw Permits Cross-Site Scripting Attacks PLATFORM: Version(s): 7.11, 9.21, 9.30 ABSTRACT: Cross-site scripting (XSS) vulnerability in HP Service Manager Web Tier 7.11, 9.21, and 9.30, and HP Service Center Web Tier 6.28, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. REFERENCE LINKS: www2.hp.com http://www.securitytracker.com/id/1027399 CVE-2012-3251 IMPACT ASSESSMENT: Moderate Discussion: A vulnerability was reported in HP Service Manager. A remote user can conduct cross-site scripting attacks. The software does not properly filter

12

U-255: Apache Wicket Input Validation Flaw Permits Cross-Site Scripting  

Broader source: Energy.gov (indexed) [DOE]

5: Apache Wicket Input Validation Flaw Permits Cross-Site 5: Apache Wicket Input Validation Flaw Permits Cross-Site Scripting Attacks U-255: Apache Wicket Input Validation Flaw Permits Cross-Site Scripting Attacks September 11, 2012 - 6:00am Addthis PROBLEM: Apache Wicket Input Validation Flaw Permits Cross-Site Scripting Attacks PLATFORM: Apache Software Foundation Apache Wicket 1.5.5 Apache Software Foundation Apache Wicket 1.5-RC5.1 Apache Software Foundation Apache Wicket 1.4.20 Apache Software Foundation Apache Wicket 1.4.18 Apache Software Foundation Apache Wicket 1.4.17 Apache Software Foundation Apache Wicket 1.4.16 ABSTRACT: A vulnerability was reported in Apache Wicket reference LINKS: Apache Wicket SecurityTracker Alert ID: 1027508 Bugtraq ID: 55445 CVE-2012-3373 IMPACT ASSESSMENT: Medium Discussion: The software does not properly filter HTML code from user-supplied input in

13

U-255: Apache Wicket Input Validation Flaw Permits Cross-Site...  

Broader source: Energy.gov (indexed) [DOE]

Input Validation Flaw Permits Cross-Site Scripting Attacks PLATFORM: Apache Software Foundation Apache Wicket 1.5.5 Apache Software Foundation Apache Wicket 1.5-RC5.1 Apache...

14

T-698: Adobe ColdFusion Input Validation Flaw in 'probe.cfm' Permits  

Broader source: Energy.gov (indexed) [DOE]

8: Adobe ColdFusion Input Validation Flaw in 'probe.cfm' 8: Adobe ColdFusion Input Validation Flaw in 'probe.cfm' Permits Cross-Site Scripting Attacks T-698: Adobe ColdFusion Input Validation Flaw in 'probe.cfm' Permits Cross-Site Scripting Attacks August 22, 2011 - 3:54pm Addthis PROBLEM: A vulnerability was reported in Adobe ColdFusion. A remote user can conduct cross-site scripting attacks. PLATFORM: Adobe ColdFusion 9.x ABSTRACT: Adobe ColdFusion Input Validation Flaw in 'probe.cfm' Permits Cross-Site Scripting Attacks. reference LINKS: Adobe Vulnerability Report Adobe Security Bulletin ColdFusion Support SecurityTracker Alert ID: 1025957 IMPACT ASSESSMENT: Medium Discussion: The 'probe.cfm' script does not properly filter HTML code from user-supplied input in the 'name' parameter before displaying the input. A remote user can create a specially crafted URL that, when loaded by a

15

T-698: Adobe ColdFusion Input Validation Flaw in 'probe.cfm' Permits  

Broader source: Energy.gov (indexed) [DOE]

8: Adobe ColdFusion Input Validation Flaw in 'probe.cfm' 8: Adobe ColdFusion Input Validation Flaw in 'probe.cfm' Permits Cross-Site Scripting Attacks T-698: Adobe ColdFusion Input Validation Flaw in 'probe.cfm' Permits Cross-Site Scripting Attacks August 22, 2011 - 3:54pm Addthis PROBLEM: A vulnerability was reported in Adobe ColdFusion. A remote user can conduct cross-site scripting attacks. PLATFORM: Adobe ColdFusion 9.x ABSTRACT: Adobe ColdFusion Input Validation Flaw in 'probe.cfm' Permits Cross-Site Scripting Attacks. reference LINKS: Adobe Vulnerability Report Adobe Security Bulletin ColdFusion Support SecurityTracker Alert ID: 1025957 IMPACT ASSESSMENT: Medium Discussion: The 'probe.cfm' script does not properly filter HTML code from user-supplied input in the 'name' parameter before displaying the input. A remote user can create a specially crafted URL that, when loaded by a

16

U-195: PHPlist Input Validation Flaws Permit Cross-Site Scripting and SQL  

Broader source: Energy.gov (indexed) [DOE]

5: PHPlist Input Validation Flaws Permit Cross-Site Scripting 5: PHPlist Input Validation Flaws Permit Cross-Site Scripting and SQL Injection Attacks U-195: PHPlist Input Validation Flaws Permit Cross-Site Scripting and SQL Injection Attacks June 20, 2012 - 7:00am Addthis PROBLEM: Two vulnerabilities were reported in PHPlist. A remote user can conduct cross-site scripting attacks. A remote authenticated user can inject SQL commands. PLATFORM: Version(s): prior to 2.10.18 ABSTRACT: The 'public_html/lists/admin' pages do not properly validate user-supplied input in the 'sortby' parameter [CVE-2012-2740]. A remote authenticated administrative user can supply a specially crafted parameter value to execute SQL commands on the underlying database. REFERENCE LINKS: Vendor Advisory Security Tracker ID 1027181 CVE-2012-2740, CVE-2012-2741

17

V-112: Microsoft SharePoint Input Validation Flaws Permit Cross-Site  

Broader source: Energy.gov (indexed) [DOE]

2: Microsoft SharePoint Input Validation Flaws Permit 2: Microsoft SharePoint Input Validation Flaws Permit Cross-Site Scripting and Denial of Service Attacks V-112: Microsoft SharePoint Input Validation Flaws Permit Cross-Site Scripting and Denial of Service Attacks March 15, 2013 - 6:00am Addthis PROBLEM: Several vulnerabilities were reported in Microsoft SharePoint PLATFORM: Microsoft SharePoint 2010 SP1 ABSTRACT: This security update resolves four reported vulnerabilities in Microsoft SharePoint and Microsoft SharePoint Foundation. REFERENCE LINKS: Security Tracker Alert ID 1028278 MS Security Bulletin MS13-024 CVE-2013-0080 CVE-2013-0083 CVE-2013-0084 CVE-2013-0085 IMPACT ASSESSMENT: High DISCUSSION: The security update addresses the vulnerabilities correcting the way that Microsoft SharePoint Server validates URLs and user input.

18

V-112: Microsoft SharePoint Input Validation Flaws Permit Cross-Site  

Broader source: Energy.gov (indexed) [DOE]

2: Microsoft SharePoint Input Validation Flaws Permit 2: Microsoft SharePoint Input Validation Flaws Permit Cross-Site Scripting and Denial of Service Attacks V-112: Microsoft SharePoint Input Validation Flaws Permit Cross-Site Scripting and Denial of Service Attacks March 15, 2013 - 6:00am Addthis PROBLEM: Several vulnerabilities were reported in Microsoft SharePoint PLATFORM: Microsoft SharePoint 2010 SP1 ABSTRACT: This security update resolves four reported vulnerabilities in Microsoft SharePoint and Microsoft SharePoint Foundation. REFERENCE LINKS: Security Tracker Alert ID 1028278 MS Security Bulletin MS13-024 CVE-2013-0080 CVE-2013-0083 CVE-2013-0084 CVE-2013-0085 IMPACT ASSESSMENT: High DISCUSSION: The security update addresses the vulnerabilities correcting the way that Microsoft SharePoint Server validates URLs and user input.

19

V-168: Splunk Web Input Validation Flaw Permits Cross-Site Scripting  

Broader source: Energy.gov (indexed) [DOE]

8: Splunk Web Input Validation Flaw Permits Cross-Site 8: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks V-168: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks May 31, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Splunk Web PLATFORM: Version(s) prior to 5.0.3 ABSTRACT: A reflected cross-site scripting vulnerability was identified in Splunk Web REFERENCE LINKS: SecurityTracker Alert ID: 1028605 Splunk Security Advisory SPL-59895 CVE-2012-6447 IMPACT ASSESSMENT: Medium DISCUSSION: The web interface does not properly filter HTML code from user-supplied input before displaying the input. A remote user can create a specially crafted URL that, when loaded by a target user, will cause arbitrary scripting code to be executed by the target user's browser. The code will

20

U-144:Juniper Secure Access Input Validation Flaw Permits Cross-Site  

Broader source: Energy.gov (indexed) [DOE]

4:Juniper Secure Access Input Validation Flaw Permits 4:Juniper Secure Access Input Validation Flaw Permits Cross-Site Scripting Attacks U-144:Juniper Secure Access Input Validation Flaw Permits Cross-Site Scripting Attacks April 10, 2012 - 7:30am Addthis PROBLEM: A vulnerability was reported in Juniper Secure Access/Instant Virtual Extranet (IVE). A remote user can conduct cross-site scripting attacks. PLATFORM: Version(s): prior to 7.0R9 and 7.1R ABSTRACT: The VPN management interface does not properly filter HTML code from user-supplied input before displaying the input. A remote user can cause arbitrary scripting code to be executed by the target user's browser. reference LINKS: Vendor URL SecurityTracker Alert ID: 1026893 IMPACT ASSESSMENT: High Discussion: The code will originate from the interface and will run in the security

Note: This page contains sample records for the topic "validation flaw permits" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

V-153: Symantec Brightmail Gateway Input Validation Flaw Permits Cross-Site  

Broader source: Energy.gov (indexed) [DOE]

3: Symantec Brightmail Gateway Input Validation Flaw Permits 3: Symantec Brightmail Gateway Input Validation Flaw Permits Cross-Site Scripting Attacks V-153: Symantec Brightmail Gateway Input Validation Flaw Permits Cross-Site Scripting Attacks May 10, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Symantec Brightmail Gateway PLATFORM: The vulnerabilities are reported in versions prior to 9.5.x ABSTRACT: Symantec's Brightmail Gateway management console is susceptible to stored cross-site scripting (XSS) issues found in some of the administrative interface pages. REFERENCE LINKS: Security Tracker Alert ID: 1028530 Symantec Security Advisory CVE-2013-1611 IMPACT ASSESSMENT: Medium DISCUSSION: The administrative interface does not properly filter HTML code from user-supplied input before displaying the input. A remote user can cause

22

V-229: IBM Lotus iNotes Input Validation Flaws Permit Cross-Site Scripting  

Broader source: Energy.gov (indexed) [DOE]

V-229: IBM Lotus iNotes Input Validation Flaws Permit Cross-Site V-229: IBM Lotus iNotes Input Validation Flaws Permit Cross-Site Scripting Attacks V-229: IBM Lotus iNotes Input Validation Flaws Permit Cross-Site Scripting Attacks August 28, 2013 - 6:00am Addthis PROBLEM: Several vulnerabilities were reported in IBM Lotus iNotes PLATFORM: IBM Lotus iNotes 8.5.x ABSTRACT: IBM Lotus iNotes 8.5.x contains four cross-site scripting vulnerabilities REFERENCE LINKS: Security Tracker Alert ID 1028954 IBM Security Bulletin 1647740 Seclist.org CVE-2013-0590 CVE-2013-0591 CVE-2013-0595 IMPACT ASSESSMENT: Medium DISCUSSION: The software does not properly filter HTML code from user-supplied input before displaying the input. A remote user can cause arbitrary scripting code to be executed by the target user's browser. The code will originate

23

V-168: Splunk Web Input Validation Flaw Permits Cross-Site Scripting  

Broader source: Energy.gov (indexed) [DOE]

68: Splunk Web Input Validation Flaw Permits Cross-Site 68: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks V-168: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks May 31, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Splunk Web PLATFORM: Version(s) prior to 5.0.3 ABSTRACT: A reflected cross-site scripting vulnerability was identified in Splunk Web REFERENCE LINKS: SecurityTracker Alert ID: 1028605 Splunk Security Advisory SPL-59895 CVE-2012-6447 IMPACT ASSESSMENT: Medium DISCUSSION: The web interface does not properly filter HTML code from user-supplied input before displaying the input. A remote user can create a specially crafted URL that, when loaded by a target user, will cause arbitrary scripting code to be executed by the target user's browser. The code will

24

T-670: Skype Input Validation Flaw in 'mobile phone' Profile Entry Permits  

Broader source: Energy.gov (indexed) [DOE]

70: Skype Input Validation Flaw in 'mobile phone' Profile Entry 70: Skype Input Validation Flaw in 'mobile phone' Profile Entry Permits Cross-Site Scripting Attacks T-670: Skype Input Validation Flaw in 'mobile phone' Profile Entry Permits Cross-Site Scripting Attacks July 18, 2011 - 7:09am Addthis PROBLEM: A vulnerability was reported in Skype. A remote user can conduct cross-site scripting attacks. PLATFORM: 5.3.0.120 and prior versions ABSTRACT: The software does not properly filter HTML code from user-supplied input in the The "mobile phone" profile entry before displaying the input. reference LINKS: SecurityTracker Alert ID: 1025789 Skype Security Advisory KoreSecure News H Security ID: 1279864 IMPACT ASSESSMENT: High Discussion: Skype suffers from a persistent Cross-Site Scripting vulnerability due to a lack of input validation and output sanitization of the "mobile phone"

25

T-649: Red Hat Network Satellite Server Request Validation Flaw Permits  

Broader source: Energy.gov (indexed) [DOE]

9: Red Hat Network Satellite Server Request Validation Flaw 9: Red Hat Network Satellite Server Request Validation Flaw Permits Cross-Site Request Forgery Attacks T-649: Red Hat Network Satellite Server Request Validation Flaw Permits Cross-Site Request Forgery Attacks June 17, 2011 - 3:43pm Addthis PROBLEM: A vulnerability was reported in Red Hat Network Satellite Server. A remote user can conduct cross-site request forgery attacks. PLATFORM: Versions 5.4.x ABSTRACT: The Red Hat Network (RHN) Satellite and Spacewalk services do not properly validate user-supplied. A remote user can create specially crafted HTML that, when loaded by a target authenticated user, will take actions on the target site acting as the target user. reference LINKS: SecurityTracker Alert ID: 1025674 RHSA-2011:0879-1 RHN Support CVE-2009-4139 IMPACT ASSESSMENT:

26

T-670: Skype Input Validation Flaw in 'mobile phone' Profile Entry Permits  

Broader source: Energy.gov (indexed) [DOE]

0: Skype Input Validation Flaw in 'mobile phone' Profile Entry 0: Skype Input Validation Flaw in 'mobile phone' Profile Entry Permits Cross-Site Scripting Attacks T-670: Skype Input Validation Flaw in 'mobile phone' Profile Entry Permits Cross-Site Scripting Attacks July 18, 2011 - 7:09am Addthis PROBLEM: A vulnerability was reported in Skype. A remote user can conduct cross-site scripting attacks. PLATFORM: 5.3.0.120 and prior versions ABSTRACT: The software does not properly filter HTML code from user-supplied input in the The "mobile phone" profile entry before displaying the input. reference LINKS: SecurityTracker Alert ID: 1025789 Skype Security Advisory KoreSecure News H Security ID: 1279864 IMPACT ASSESSMENT: High Discussion: Skype suffers from a persistent Cross-Site Scripting vulnerability due to a lack of input validation and output sanitization of the "mobile phone"

27

U-102: Cisco IronPort Encryption Appliance Input Validation Flaw Permits  

Broader source: Energy.gov (indexed) [DOE]

2: Cisco IronPort Encryption Appliance Input Validation Flaw 2: Cisco IronPort Encryption Appliance Input Validation Flaw Permits Cross-Site Scripting Attacks U-102: Cisco IronPort Encryption Appliance Input Validation Flaw Permits Cross-Site Scripting Attacks February 14, 2012 - 8:00am Addthis PROBLEM: A vulnerability was reported in Cisco IronPort Encryption Appliance. PLATFORM: Version(s): prior to 6.5.3 ABSTRACT: A remote user can conduct cross-site scripting reference LINKS: Vendor URL CVE-2012-0340 Security Tracker ID:1026669 IMPACT ASSESSMENT: Medium Discussion: The interface does not properly filter HTML code from user-supplied input before displaying the input. A remote user can create a specially crafted URL that, when loaded by a target user, will cause arbitrary scripting code to be executed by the target user's browser. The code will originate from

28

U-067:WebSVN Input Validation Flaw in getLog() Permits Cross-Site Scripting  

Broader source: Energy.gov (indexed) [DOE]

7:WebSVN Input Validation Flaw in getLog() Permits Cross-Site 7:WebSVN Input Validation Flaw in getLog() Permits Cross-Site Scripting Attacks U-067:WebSVN Input Validation Flaw in getLog() Permits Cross-Site Scripting Attacks December 22, 2011 - 8:15am Addthis PROBLEM: WebSVN Input Validation Flaw in getLog() Permits Cross-Site Scripting Attacks PLATFORM: WebSVN 2.3.0 and prior versions ABSTRACT: A remote user can access the target user's cookies (including authentication cookies), if any, associated with the site running the WebSVN software, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user. reference LINKS: SecurityTracker Alert ID: 1026438 WebSVN version update WebSVN News IMPACT ASSESSMENT: Medium Discussion: The getLog() function does not properly filter HTML code from user-supplied

29

T-698: Adobe ColdFusion Input Validation Flaw in 'probe.cfm'...  

Broader source: Energy.gov (indexed) [DOE]

ColdFusion Input Validation Flaw in 'probe.cfm' Permits Cross-Site Scripting Attacks T-698: Adobe ColdFusion Input Validation Flaw in 'probe.cfm' Permits Cross-Site Scripting...

30

T-720: Blue Coat Director HTTP Trace Processing Flaw Permits...  

Broader source: Energy.gov (indexed) [DOE]

0: Blue Coat Director HTTP Trace Processing Flaw Permits Cross-Site Scripting Attacks T-720: Blue Coat Director HTTP Trace Processing Flaw Permits Cross-Site Scripting Attacks...

31

U-093: Mozilla Firefox Multiple Flaws Permit Remote Code Execution,  

Broader source: Energy.gov (indexed) [DOE]

3: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, 3: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting Attacks U-093: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting Attacks February 1, 2012 - 5:51am Addthis PROBLEM: Multiple vulnerabilities were reported in Mozilla Firefox. PLATFORM: Linux (Any), UNIX (Any), Windows (Any) Version(s): prior to 3.2.26; prior to 10.0 ABSTRACT: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting. reference LINKS: SecurityTracker Alert ID: 1026605 CVE-2011-3659, CVE-2012-0442 CVE-2012-0443, CVE-2012-0444 CVE-2012-0445, CVE-2012-0446 CVE-2012-0447, CVE-2012-0449 CVE-2012-0450 Vendor Site IMPACT ASSESSMENT:

32

T-602: BlackBerry Enterprise Server Input Validation Flaw in...  

Broader source: Energy.gov (indexed) [DOE]

02: BlackBerry Enterprise Server Input Validation Flaw in BlackBerry Web Desktop Manager Permits Cross-Site Scripting Attacks T-602: BlackBerry Enterprise Server Input Validation...

33

U-001:Symantec IM Manager Input Validation Flaws | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

U-001:Symantec IM Manager Input Validation Flaws U-001:Symantec IM Manager Input Validation Flaws U-001:Symantec IM Manager Input Validation Flaws October 3, 2011 - 12:45pm Addthis PROBLEM: Symantec IM Manager Input Validation Flaws Permit Cross-Site Scripting, SQL Injection, and Code Execution Attacks. PLATFORM: Version(s): prior to 8.4.18 ABSTRACT: Symantec IM Manager Input Validation Flaws Permit Cross-Site Scripting, SQL Injection, and Code Execution Attacks. reference LINKS: Security Advisory: SYM11-012 SecurityTracker Alert ID: 1026130 IMPACT ASSESSMENT: Medium Discussion: Several vulnerabilities were reported in Symantec IM Manager. A remote user can conduct cross-site scripting attacks. A remote user can inject SQL commands. Several scripts do not properly filter HTML code from user-supplied input before displaying the input [CVE-2011-0552]. A remote user can create a

34

U-132: Apache Wicket Input Validation Flaw in 'wicket:pageMapName'  

Broader source: Energy.gov (indexed) [DOE]

2: Apache Wicket Input Validation Flaw in 'wicket:pageMapName' 2: Apache Wicket Input Validation Flaw in 'wicket:pageMapName' Parameter Permits Cross-Site Scripting Attacks U-132: Apache Wicket Input Validation Flaw in 'wicket:pageMapName' Parameter Permits Cross-Site Scripting Attacks March 23, 2012 - 7:42am Addthis PROBLEM: Apache Wicket Input Validation Flaw in 'wicket:pageMapName' Parameter Permits Cross-Site Scripting Attacks PLATFORM: Apache Wicket 1.4.x ABSTRACT: A remote user can conduct cross-site scripting attacks. reference LINKS: Apache Wicket CVE-2012-0047 SecurityTracker Alert ID: 1026839 IMPACT ASSESSMENT: High Discussion: The software does not properly filter HTML code from user-supplied input in the 'wicket:pageMapName' request parameter before displaying the input. A remote user can cause arbitrary scripting code to be executed by the target

35

V-139: Cisco Network Admission Control Input Validation Flaw...  

Broader source: Energy.gov (indexed) [DOE]

Sensitive Information U-270:Trend Micro Control Manager Input Validation Flaw in Ad Hoc Query Module Lets Remote Users Inject SQL Commands U-015: CiscoWorks Common...

36

U-219: Symantec Web Gateway Input Validation Flaws Lets Remote...  

Broader source: Energy.gov (indexed) [DOE]

9: Symantec Web Gateway Input Validation Flaws Lets Remote Users Inject SQL Commands, Execute Arbitrary Commands, and Change User Passwords U-219: Symantec Web Gateway Input...

37

T-701: Citrix Access Gateway Enterprise Edition Input Validation Flaw in  

Broader source: Energy.gov (indexed) [DOE]

1: Citrix Access Gateway Enterprise Edition Input Validation 1: Citrix Access Gateway Enterprise Edition Input Validation Flaw in Logon Portal Permits Cross-Site Scripting Attacks T-701: Citrix Access Gateway Enterprise Edition Input Validation Flaw in Logon Portal Permits Cross-Site Scripting Attacks August 25, 2011 - 3:33pm Addthis PROBLEM: A vulnerability was reported in Citrix Access Gateway Enterprise Edition. A remote user can conduct cross-site scripting attacks. PLATFORM: Citrix Access Gateway Enterprise Edition 9.2-49.8 and prior. Citrix Access Gateway Enterprise Edition version 9.3 is not affected by this vulnerability. ABSTRACT: Citrix Access Gateway Enterprise Edition Input Validation Flaw in Logon Portal Permits Cross-Site Scripting Attacks. reference LINKS: SecurityTracker Alert ID: 1025973 Citrix Document ID: CTX129971

38

V-034: RSA Adaptive Authentication (On-Premise) Input Validation Flaws  

Broader source: Energy.gov (indexed) [DOE]

4: RSA Adaptive Authentication (On-Premise) Input Validation 4: RSA Adaptive Authentication (On-Premise) Input Validation Flaws Permit Cross-Site Scripting Attacks V-034: RSA Adaptive Authentication (On-Premise) Input Validation Flaws Permit Cross-Site Scripting Attacks November 27, 2012 - 2:00am Addthis PROBLEM: RSA Adaptive Authentication (On-Premise) Input Validation Flaws Permit Cross-Site Scripting Attacks PLATFORM: RSA Adaptive Authentication (On-Premise) 6.x ABSTRACT: A vulnerability was reported in RSA Adaptive Authentication (On-Premise). REFERENCE LINKS: SecurityTracker Alert ID: 1027811 SecurityFocus Security Alert RSA Customer Support CVE-2012-4611 IMPACT ASSESSMENT: Medium DISCUSSION: A vulnerability was reported in RSA Adaptive Authentication (On-Premise). A remote user can conduct cross-site scripting attacks. The software does not

39

T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain...  

Energy Savers [EERE]

Chain Validation Flaw Lets Certain Remote Users Access or Modify SSLTLS Sessions T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or...

40

T-602: BlackBerry Enterprise Server Input Validation Flaw in BlackBerry Web  

Broader source: Energy.gov (indexed) [DOE]

02: BlackBerry Enterprise Server Input Validation Flaw in 02: BlackBerry Enterprise Server Input Validation Flaw in BlackBerry Web Desktop Manager Permits Cross-Site Scripting Attacks T-602: BlackBerry Enterprise Server Input Validation Flaw in BlackBerry Web Desktop Manager Permits Cross-Site Scripting Attacks April 14, 2011 - 5:07am Addthis PROBLEM: BlackBerry Enterprise Server Input Validation Flaw in BlackBerry Web Desktop Manager Permits Cross-Site Scripting Attacks PLATFORM: BlackBerry Enterprise Server Express versions 5.0.1 and 5.0.2 for Microsoft Exchange, 5.0.2 for IBM Lotus Domino, 5.0.0 through 5.0.3 for Microsoft Exchange and IBM Lotus Domino, and version 5.0.1 for Novell GroupWise. OS Platform(s): Windows (2000), Windows (2003), Windows (2008) ABSTRACT: The BlackBerry Web Desktop Manager not properly filter HTML code from

Note: This page contains sample records for the topic "validation flaw permits" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

T-720: Blue Coat Director HTTP Trace Processing Flaw Permits Cross-Site  

Broader source: Energy.gov (indexed) [DOE]

0: Blue Coat Director HTTP Trace Processing Flaw Permits 0: Blue Coat Director HTTP Trace Processing Flaw Permits Cross-Site Scripting Attacks T-720: Blue Coat Director HTTP Trace Processing Flaw Permits Cross-Site Scripting Attacks September 19, 2011 - 8:45am Addthis PROBLEM Blue Coat Director HTTP Trace Processing Flaw Permits Cross-Site Scripting Attacks. PLATFORM: All versions of Director prior to 5.5.2.3 are vulnerable. ABSTRACT: A vulnerability was reported in Blue Coat Director. A remote user can conduct cross-site scripting attacks. reference LINKS: Blue Coat Advisories ID: SA62 SecurityTracker Alert ID: 1026061 Blue Coat Director 510 Blue Coat SGME 5 IMPACT ASSESSMENT: Medium Discussion: An attacker can use the HTTP TRACE method to echo malicious script back to the client as part of a Cross Site Scripting (XSS) attack. No

42

U-212: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame  

Broader source: Energy.gov (indexed) [DOE]

2: RSA Authentication Manager Flaws Permit Cross-Site and 2: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks U-212: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks July 13, 2012 - 7:00am Addthis PROBLEM: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks PLATFORM: RSA Authentication Manager 7.1 is vulnerable; other versions may also be affected. ABSTRACT: RSA Authentication Manager is prone to multiple security vulnerabilities because it fails to properly sanitize user-supplied input. Attackers can exploit these issues to execute arbitrary script or HTML code, steal cookie-based authentication credentials, and conduct phishing attacks. Other attacks may also be possible.

43

U-263: Trend Micro InterScan Messaging Security Flaws Permit Cross-Site  

Broader source: Energy.gov (indexed) [DOE]

3: Trend Micro InterScan Messaging Security Flaws Permit 3: Trend Micro InterScan Messaging Security Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks U-263: Trend Micro InterScan Messaging Security Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks September 19, 2012 - 6:00am Addthis PROBLEM: Trend Micro InterScan Messaging Security Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks PLATFORM: 7.1-Build_Win32_1394; possibly other versions ABSTRACT: A vulnerability was reported in Trend Micro InterScan Messaging Security. reference LINKS: US CERT Vulnerability Note VU#471364 SecurityTracker Alert ID: 1027544 CVE-2012-2995 CVE-2012-2996 Micro Trend IMPACT ASSESSMENT: Medium Discussion: Several scripts do not properly filter HTML code from user-supplied input

44

U-206: WordPress Flaws Permit Cross-Site Scripting, Cross-Site Request  

Broader source: Energy.gov (indexed) [DOE]

6: WordPress Flaws Permit Cross-Site Scripting, Cross-Site 6: WordPress Flaws Permit Cross-Site Scripting, Cross-Site Request Forgery, and Information Disclosure Attacks U-206: WordPress Flaws Permit Cross-Site Scripting, Cross-Site Request Forgery, and Information Disclosure Attacks July 6, 2012 - 7:00am Addthis PROBLEM: WordPress Flaws Permit Cross-Site Scripting, Cross-Site Request Forgery, and Information Disclosure Attacks PLATFORM: Version(s): prior to 3.4.1 ABSTRACT: Several vulnerabilities were reported in WordPress. A remote authenticated user can conduct cross-site scripting attacks. A remote user can conduct cross-site request forgery attacks. A remote authenticated user can obtain potentially sensitive information. reference LINKS: The Vendor's Advisory WordPress 3.4.1 Maintenance and Security Release SecurityTracker Alert ID: 1027219

45

T-715: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting  

Broader source: Energy.gov (indexed) [DOE]

15: Microsoft SharePoint Multiple Flaws Permit Cross-Site 15: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting Attacks T-715: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting Attacks September 13, 2011 - 12:35pm Addthis PROBLEM: Multiple vulnerabilities were reported in Microsoft SharePoint. A remote user can conduct cross-site scripting attacks. PLATFORM: Version(s): SharePoint software ABSTRACT: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting Attacks. reference LINKS: MS11-074: Article ID: 2552998 SecurityTracker Alert ID: 1026040 CVE-2011-1893 CVE-2011-1892 CVE-2011-1891 CVE-2011-1890 CVE-2011-0653 IMPACT ASSESSMENT: High Discussion: A remote user can create a specially crafted URL or web site that, when loaded by a target user, will cause arbitrary scripting code to be executed

46

T-715: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting  

Broader source: Energy.gov (indexed) [DOE]

5: Microsoft SharePoint Multiple Flaws Permit Cross-Site 5: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting Attacks T-715: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting Attacks September 13, 2011 - 12:35pm Addthis PROBLEM: Multiple vulnerabilities were reported in Microsoft SharePoint. A remote user can conduct cross-site scripting attacks. PLATFORM: Version(s): SharePoint software ABSTRACT: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting Attacks. reference LINKS: MS11-074: Article ID: 2552998 SecurityTracker Alert ID: 1026040 CVE-2011-1893 CVE-2011-1892 CVE-2011-1891 CVE-2011-1890 CVE-2011-0653 IMPACT ASSESSMENT: High Discussion: A remote user can create a specially crafted URL or web site that, when loaded by a target user, will cause arbitrary scripting code to be executed

47

U-073: Bugzilla Flaws Permit Cross-Site Scripting and Cross-Site Request  

Broader source: Energy.gov (indexed) [DOE]

73: Bugzilla Flaws Permit Cross-Site Scripting and Cross-Site 73: Bugzilla Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks U-073: Bugzilla Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks January 3, 2012 - 10:30am Addthis PROBLEM: Bugzilla Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks PLATFORM: Version(s): prior to 3.4.13, 3.6.7, 4.0.3, 4.2rc1 ABSTRACT: Several vulnerabilities were reported in Bugzilla. A remote user can conduct cross-site scripting attacks. reverence LINKS: SecurityTracker Alert ID: 1026480 3.4.12 Security Advisory Bug 697699 Bug 703975 Bug 703983 IMPACT ASSESSMENT: Medium Discussion: Tabular and graphical reports, as well as new charts have a debug mode which displays raw data as plain text. This text is not correctly escaped and a crafted URL could use this vulnerability to inject code leading to

48

V-139: Cisco Network Admission Control Input Validation Flaw Lets Remote  

Broader source: Energy.gov (indexed) [DOE]

9: Cisco Network Admission Control Input Validation Flaw Lets 9: Cisco Network Admission Control Input Validation Flaw Lets Remote Users Inject SQL Commands V-139: Cisco Network Admission Control Input Validation Flaw Lets Remote Users Inject SQL Commands April 21, 2013 - 11:50pm Addthis PROBLEM: Cisco Network Admission Control Input Validation Flaw Lets Remote Users Inject SQL Commands PLATFORM: Cisco NAC Manager versions prior to 4.8.3.1 and 4.9.2 ABSTRACT: A vulnerability was reported in Cisco Network Admission Control. REFERENCE LINKS: SecurityTracker Alert ID: 1028451 Cisco Advisory ID: cisco-sa-20130417-nac CVE-2013-1177 IMPACT ASSESSMENT: High DISCUSSION: The Cisco Network Admission Control (NAC) Manager does not properly validate user-supplied input. A remote user can supply a specially crafted parameter value to execute SQL commands on the underlying database.

49

U-219: Symantec Web Gateway Input Validation Flaws Lets Remote Users Inject  

Broader source: Energy.gov (indexed) [DOE]

19: Symantec Web Gateway Input Validation Flaws Lets Remote 19: Symantec Web Gateway Input Validation Flaws Lets Remote Users Inject SQL Commands, Execute Arbitrary Commands, and Change User Passwords U-219: Symantec Web Gateway Input Validation Flaws Lets Remote Users Inject SQL Commands, Execute Arbitrary Commands, and Change User Passwords July 24, 2012 - 7:00am Addthis PROBLEM: Symantec Web Gateway Input Validation Flaws Lets Remote Users Inject SQL Commands, Execute Arbitrary Commands, and Change User Passwords PLATFORM: Symantec Web Gateway 5.0.x.x ABSTRACT: Several vulnerabilities were reported in Symantec Web Gateway. REFERENCE LINKS: Security Advisories Relating to Symantec Products SecurityTracker Alert ID: 1027289 Bugtraq ID: 54424 Bugtraq ID: 54425 Bugtraq ID: 54426 Bugtraq ID: 54427 Bugtraq ID: 54429 Bugtraq ID: 54430

50

V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated Users  

Broader source: Energy.gov (indexed) [DOE]

0: Apache VCL Input Validation Flaw Lets Remote Authenticated 0: Apache VCL Input Validation Flaw Lets Remote Authenticated Users Gain Elevated Privileges V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated Users Gain Elevated Privileges May 7, 2013 - 12:01am Addthis PROBLEM: Apache VCL Input Validation Flaw Lets Remote Authenticated Users Gain Elevated Privileges PLATFORM: Apache VCL Versions: 2.1, 2.2, 2.2.1, 2.3, 2.3.1 ABSTRACT: A vulnerability was reported in Apache VCL. REFERENCE LINKS: Apache Securelist SecurityTracker Alert ID: 1028515 CVE-2013-0267 IMPACT ASSESSMENT: Medium DISCUSSION: A remote authenticated administrative user with minimal administrative privileges (i.e., nodeAdmin, manageGroup, resourceGrant, or userGrant) can send specially crafted data via the web interface or XMLRPC API to gain additional administrative privileges.

51

U-219: Symantec Web Gateway Input Validation Flaws Lets Remote Users Inject  

Broader source: Energy.gov (indexed) [DOE]

19: Symantec Web Gateway Input Validation Flaws Lets Remote 19: Symantec Web Gateway Input Validation Flaws Lets Remote Users Inject SQL Commands, Execute Arbitrary Commands, and Change User Passwords U-219: Symantec Web Gateway Input Validation Flaws Lets Remote Users Inject SQL Commands, Execute Arbitrary Commands, and Change User Passwords July 24, 2012 - 7:00am Addthis PROBLEM: Symantec Web Gateway Input Validation Flaws Lets Remote Users Inject SQL Commands, Execute Arbitrary Commands, and Change User Passwords PLATFORM: Symantec Web Gateway 5.0.x.x ABSTRACT: Several vulnerabilities were reported in Symantec Web Gateway. REFERENCE LINKS: Security Advisories Relating to Symantec Products SecurityTracker Alert ID: 1027289 Bugtraq ID: 54424 Bugtraq ID: 54425 Bugtraq ID: 54426 Bugtraq ID: 54427 Bugtraq ID: 54429 Bugtraq ID: 54430

52

U-015: CiscoWorks Common Services Home Page Input Validation Flaw Lets  

Broader source: Energy.gov (indexed) [DOE]

15: CiscoWorks Common Services Home Page Input Validation Flaw 15: CiscoWorks Common Services Home Page Input Validation Flaw Lets Remote Users Execute Arbitrary Commands U-015: CiscoWorks Common Services Home Page Input Validation Flaw Lets Remote Users Execute Arbitrary Commands October 20, 2011 - 7:30am Addthis PROBLEM: CiscoWorks Common Services Home Page Input Validation Flaw Lets Remote Users Execute Arbitrary Commands. PLATFORM: CiscoWorks Common Services-based products prior to version 4.1 running on Microsoft Windows ABSTRACT: Successful exploitation of this vulnerability may allow an authenticated, remote attacker to execute arbitrary commands on the affected system with the privileges of a system administrator. reference LINKS: Cisco Security Advisory ID: cisco-sa-20111019-cs Cisco Security Advisories and Responses

53

U-031: Microsoft Active Directory CRL Validation Flaw Lets Remote Users  

Broader source: Energy.gov (indexed) [DOE]

1: Microsoft Active Directory CRL Validation Flaw Lets Remote 1: Microsoft Active Directory CRL Validation Flaw Lets Remote Users Bypass Authentication U-031: Microsoft Active Directory CRL Validation Flaw Lets Remote Users Bypass Authentication November 9, 2011 - 8:30am Addthis PROBLEM: Microsoft Active Directory CRL Validation Flaw Lets Remote Users Bypass Authentication. PLATFORM: Windows XP Service Pack 3 Windows XP Professional x64 Edition Service Pack 2 Windows Server 2003 Service Pack 2 Windows Server 2003 x64 Edition Service Pack 2 Active Directory Windows Server 2003 with SP2 for Itanium-based Systems Windows Vista Service Pack 2 Windows Vista x64 Edition Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 Windows Server 2008 for x64-based Systems Service Pack 2 Windows 7 for 32-bit Systems Windows 7 for 32-bit Systems Service Pack 1

54

U-270:Trend Micro Control Manager Input Validation Flaw in Ad Hoc Query  

Broader source: Energy.gov (indexed) [DOE]

0:Trend Micro Control Manager Input Validation Flaw in Ad Hoc 0:Trend Micro Control Manager Input Validation Flaw in Ad Hoc Query Module Lets Remote Users Inject SQL Commands U-270:Trend Micro Control Manager Input Validation Flaw in Ad Hoc Query Module Lets Remote Users Inject SQL Commands September 28, 2012 - 6:00am Addthis PROBLEM: Trend Micro Control Manager Input Validation Flaw in Ad Hoc Query Module Lets Remote Users Inject SQL Commands PLATFORM: Control Manager - 3.0, 3.5, 5.0, 5.5, 6.0 ABSTRACT: Trend Micro has been notified of a potential product vulnerability in Control Manager. reference LINKS: Trend Micro Technical Support ID 1061043 SecurityTracker Alert ID: 1027584 Secunia Advisory SA50760 CVE-2012-2998 IMPACT ASSESSMENT: Medium Discussion: A vulnerability has been reported in Trend Micro Control Manager, which can

55

U-015: CiscoWorks Common Services Home Page Input Validation Flaw Lets  

Broader source: Energy.gov (indexed) [DOE]

5: CiscoWorks Common Services Home Page Input Validation Flaw 5: CiscoWorks Common Services Home Page Input Validation Flaw Lets Remote Users Execute Arbitrary Commands U-015: CiscoWorks Common Services Home Page Input Validation Flaw Lets Remote Users Execute Arbitrary Commands October 20, 2011 - 7:30am Addthis PROBLEM: CiscoWorks Common Services Home Page Input Validation Flaw Lets Remote Users Execute Arbitrary Commands. PLATFORM: CiscoWorks Common Services-based products prior to version 4.1 running on Microsoft Windows ABSTRACT: Successful exploitation of this vulnerability may allow an authenticated, remote attacker to execute arbitrary commands on the affected system with the privileges of a system administrator. reference LINKS: Cisco Security Advisory ID: cisco-sa-20111019-cs Cisco Security Advisories and Responses

56

U-238: HP Service Manager Input Validation Flaw Permits Cross...  

Broader source: Energy.gov (indexed) [DOE]

9.21, 9.30 ABSTRACT: Cross-site scripting (XSS) vulnerability in HP Service Manager Web Tier 7.11, 9.21, and 9.30, and HP Service Center Web Tier 6.28, allows remote attackers...

57

U-139: IBM Tivoli Directory Server Input Validation Flaw | Department of  

Broader source: Energy.gov (indexed) [DOE]

39: IBM Tivoli Directory Server Input Validation Flaw 39: IBM Tivoli Directory Server Input Validation Flaw U-139: IBM Tivoli Directory Server Input Validation Flaw April 3, 2012 - 7:00am Addthis PROBLEM: A vulnerability was reported in IBM Tivoli Directory Server. A remote user can conduct cross-site scripting attacks PLATFORM: Version(s): 6.2, 6.3 ABSTRACT: The Web Admin Tool does not properly filter HTML code from user-supplied input before displaying the input. Reference LINKS: Vendor Advisory Security Tracker ID 1026880 CVE-2012-0740 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a specially crafted URL that, when loaded by a target user, will cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the site running the IBM Tivoli Directory Server software and will run in the security context

58

U-193: NetBSD System Call Return Value Validation Flaw Lets Local Users  

Broader source: Energy.gov (indexed) [DOE]

3: NetBSD System Call Return Value Validation Flaw Lets Local 3: NetBSD System Call Return Value Validation Flaw Lets Local Users Gain Elevated Privileges U-193: NetBSD System Call Return Value Validation Flaw Lets Local Users Gain Elevated Privileges June 18, 2012 - 8:00am Addthis PROBLEM: A vulnerability was reported in NetBSD. A local user can obtain elevated privileges on the target system. PLATFORM: Version(s): 4.0.*, 5.0.*, 5.1, 6.0 Beta ABSTRACT: On Intel CPUs, the sysret instruction can be manipulated into returning to specific non-canonical addresses, which may yield a CPU reset. We cannot currently rule out with utter confidence that this vulnerability could not also be used to execute code with kernel privilege instead of crashing the system. reference LINKS: Vendor Advisory Security Tracker ID 1027178 CVE-2012-0217

59

T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote  

Broader source: Energy.gov (indexed) [DOE]

76: Apple iOS Certificate Chain Validation Flaw Lets Certain 76: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or Modify SSL/TLS Sessions T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or Modify SSL/TLS Sessions July 26, 2011 - 1:06am Addthis PROBLEM: A vulnerability was reported in Apple iOS. A remote user with the ability to conduct a man-in-the-middle attack can access or modify SSL/TLS sessions. PLATFORM: iOS 4.2.5 through 4.2.9 for iPhone 4 (CDMA) iOS 3.0 through 4.3.4 for iPhone 3GS and iPhone 4 (GSM) iOS 3.1 through 4.3.4 for iPod touch (3rd generation) and later iOS 3.2 through 4.3.4 for iPad ABSTRACT: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or Modify SSL/TLS Sessions. reference LINKS: SecurityTracker Alert ID: 1025837

60

T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote  

Broader source: Energy.gov (indexed) [DOE]

6: Apple iOS Certificate Chain Validation Flaw Lets Certain 6: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or Modify SSL/TLS Sessions T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or Modify SSL/TLS Sessions July 26, 2011 - 1:06am Addthis PROBLEM: A vulnerability was reported in Apple iOS. A remote user with the ability to conduct a man-in-the-middle attack can access or modify SSL/TLS sessions. PLATFORM: iOS 4.2.5 through 4.2.9 for iPhone 4 (CDMA) iOS 3.0 through 4.3.4 for iPhone 3GS and iPhone 4 (GSM) iOS 3.1 through 4.3.4 for iPod touch (3rd generation) and later iOS 3.2 through 4.3.4 for iPad ABSTRACT: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or Modify SSL/TLS Sessions. reference LINKS: SecurityTracker Alert ID: 1025837

Note: This page contains sample records for the topic "validation flaw permits" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

V-165: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote Users  

Broader source: Energy.gov (indexed) [DOE]

65: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote 65: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote Users Spoof the Server V-165: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote Users Spoof the Server May 28, 2013 - 12:46am Addthis PROBLEM: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote Users Spoof the Server PLATFORM: Cisco WebEx for iOS 4.1, Other versions may also be affected. ABSTRACT: A vulnerability was reported in Cisco WebEx for iOS. REFERENCE LINKS: Cisco SecurityTracker Alert ID: 1028592 Secunia Advisory SA51412 CVE-2012-6399 IMPACT ASSESSMENT: Medium DISCUSSION: A security issue in Cisco WebEx for iOS can be exploited by malicious people to conduct spoofing attacks. The security issue is caused due to the application not properly verifying the server SSL certificate. This can be exploited to e.g. spoof the server

62

T-693: Symantec Endpoint Protection Manager Input Validation Hole Permits  

Broader source: Energy.gov (indexed) [DOE]

3: Symantec Endpoint Protection Manager Input Validation Hole 3: Symantec Endpoint Protection Manager Input Validation Hole Permits Cross-Site Scripting and Cross-Site Request Forgery Attacks T-693: Symantec Endpoint Protection Manager Input Validation Hole Permits Cross-Site Scripting and Cross-Site Request Forgery Attacks August 15, 2011 - 3:42pm Addthis PROBLEM: Two vulnerabilities were reported in Symantec Endpoint Protection Manager. A remote user can conduct cross-site scripting attacks. A remote user can conduct cross-site request forgery attacks. PLATFORM: Version(s): 11.0 RU6(11.0.600x), 11.0 RU6-MP1(11.0.6100), 11.0 RU6-MP2(11.0.6200), 11.0 RU6-MP3(11.0.6300) ABSTRACT: Symantec Endpoint Protection Manager Input Validation Hole Permits Cross-Site Scripting and Cross-Site Request Forgery Attacks. reference LINKS:

63

T-623: HP Business Availability Center Input Validation Hole Permits  

Broader source: Energy.gov (indexed) [DOE]

3: HP Business Availability Center Input Validation Hole 3: HP Business Availability Center Input Validation Hole Permits Cross-Site Scripting Attacks T-623: HP Business Availability Center Input Validation Hole Permits Cross-Site Scripting Attacks May 16, 2011 - 3:05pm Addthis PROBLEM: A vulnerability was reported in HP Business Availability Center. A remote user can conduct cross-site scripting attacks. PLATFORM: HP Business Availability Center software 8.06 and prior versions ABSTRACT: The software does not properly filter HTML code from user-supplied input before displaying the input. reference LINKS: SecurityTracker Alert ID:1025535 HP Knowledge Base CVE-2011-1856 Secunia ID: SA44569 HP Document ID:c02823184 | ESB-2011.0525 IMPACT ASSESSMENT: High Discussion: A remote user can cause arbitrary scripting code to be executed by the

64

V-112: Microsoft SharePoint Input Validation Flaws Permit Cross...  

Broader source: Energy.gov (indexed) [DOE]

four reported vulnerabilities in Microsoft SharePoint and Microsoft SharePoint Foundation. REFERENCE LINKS: Security Tracker Alert ID 1028278 MS Security Bulletin MS13-024...

65

V-085: Cisco Unity Express Input Validation Hole Permits Cross-Site Request  

Broader source: Energy.gov (indexed) [DOE]

5: Cisco Unity Express Input Validation Hole Permits Cross-Site 5: Cisco Unity Express Input Validation Hole Permits Cross-Site Request Forgery Attacks V-085: Cisco Unity Express Input Validation Hole Permits Cross-Site Request Forgery Attacks February 6, 2013 - 1:06am Addthis PROBLEM: Cisco Unity Express Input Validation Hole Permits Cross-Site Request Forgery Attacks PLATFORM: Cisco Unity Express prior to 8.0 ABSTRACT: A vulnerability was reported in Cisco Unity Express. REFERENCE LINKS: Cisco Security Notice SecurityTracker Alert ID: 1028075 CVE-2013-1120 IMPACT ASSESSMENT: Medium DISCUSSION: Cisco Unity Express software prior to version 8.0 contains vulnerabilities that could allow an unauthenticated, remote attacker to conduct cross site request forgery attacks. The vulnerabilities are due to insufficient input validation. An attacker could exploit these vulnerabilities by

66

U-204: HP Network Node Manager i Input Validation Hole Permits Cross-Site  

Broader source: Energy.gov (indexed) [DOE]

4: HP Network Node Manager i Input Validation Hole Permits 4: HP Network Node Manager i Input Validation Hole Permits Cross-Site Scripting Attacks U-204: HP Network Node Manager i Input Validation Hole Permits Cross-Site Scripting Attacks July 3, 2012 - 7:00am Addthis PROBLEM: HP Network Node Manager i Input Validation Hole Permits Cross-Site Scripting Attacks PLATFORM: Version(s): 8.x, 9.0x, 9.1x ABSTRACT: Potential security vulnerabilities have been identified with HP Network Node Manager I (NNMi) for HP-UX, Linux, Solaris, and Windows. The vulnerabilities could be remotely exploited resulting in cross site scripting (XSS). reference LINKS: The Vendor's Advisory SecurityTracker Alert ID: 1027215 CVE-2012-2018 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in HP Network Node Manager i. The software does not properly filter HTML code from user-supplied input before

67

T-546: Microsoft MHTML Input Validation Hole May Permit Cross-Site  

Broader source: Energy.gov (indexed) [DOE]

6: Microsoft MHTML Input Validation Hole May Permit Cross-Site 6: Microsoft MHTML Input Validation Hole May Permit Cross-Site Scripting Attacks Arbitrary Code T-546: Microsoft MHTML Input Validation Hole May Permit Cross-Site Scripting Attacks Arbitrary Code January 31, 2011 - 7:00am Addthis PROBLEM: Microsoft MHTML Input Validation Hole May Permit Cross-Site Scripting Attacks Arbitrary Code. PLATFORM: Microsoft 2003 SP2, Vista SP2, 2008 SP2, XP SP3, 7; and prior service packs ABSTRACT: A vulnerability was reported in Microsoft MHTML. A remote user can conduct cross-site scripting attacks. reference LINKS: Microsoft Security Advisory 2501696 Microsoft Support Security Tracker Alert CVE-2011-0096 IMPACT ASSESSMENT: Medium Discussion: The vulnerability exists due to the way MHTML interprets MIME-formatted requests for content blocks within a document. It is possible for this

68

T-590: HP Diagnostics Input Validation Hole Permits Cross-Site Scripting  

Broader source: Energy.gov (indexed) [DOE]

0: HP Diagnostics Input Validation Hole Permits Cross-Site 0: HP Diagnostics Input Validation Hole Permits Cross-Site Scripting Attacks T-590: HP Diagnostics Input Validation Hole Permits Cross-Site Scripting Attacks March 29, 2011 - 3:05pm Addthis PROBLEM: HP Diagnostics Input Validation Hole Permits Cross-Site Scripting Attacks in ActiveSync Lets Remote Users Execute Arbitrary Code. PLATFORM: HP Diagnostics software: version(s) 7.5, 8.0 prior to 8.05.54.225 ABSTRACT: A potential security vulnerability has been identified in HP Diagnostics. The vulnerability could be exploited remotely resulting in cross site scripting (XSS). reference LINKS: HP Document ID: c02770512 SecurityTracker Alert ID: 1025255 CVE-2011-0892 Security Focus Document ID: c02770512 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in HP Diagnostics. A remote user can conduct

69

T-546: Microsoft MHTML Input Validation Hole May Permit Cross-Site  

Broader source: Energy.gov (indexed) [DOE]

6: Microsoft MHTML Input Validation Hole May Permit Cross-Site 6: Microsoft MHTML Input Validation Hole May Permit Cross-Site Scripting Attacks Arbitrary Code T-546: Microsoft MHTML Input Validation Hole May Permit Cross-Site Scripting Attacks Arbitrary Code January 31, 2011 - 7:00am Addthis PROBLEM: Microsoft MHTML Input Validation Hole May Permit Cross-Site Scripting Attacks Arbitrary Code. PLATFORM: Microsoft 2003 SP2, Vista SP2, 2008 SP2, XP SP3, 7; and prior service packs ABSTRACT: A vulnerability was reported in Microsoft MHTML. A remote user can conduct cross-site scripting attacks. reference LINKS: Microsoft Security Advisory 2501696 Microsoft Support Security Tracker Alert CVE-2011-0096 IMPACT ASSESSMENT: Medium Discussion: The vulnerability exists due to the way MHTML interprets MIME-formatted requests for content blocks within a document. It is possible for this

70

T-722: IBM WebSphere Commerce Edition Input Validation Holes Permit  

Broader source: Energy.gov (indexed) [DOE]

2: IBM WebSphere Commerce Edition Input Validation Holes Permit 2: IBM WebSphere Commerce Edition Input Validation Holes Permit Cross-Site Scripting Attacks T-722: IBM WebSphere Commerce Edition Input Validation Holes Permit Cross-Site Scripting Attacks September 21, 2011 - 8:15am Addthis PROBLEM: IBM WebSphere Commerce Edition Input Validation Holes Permit Cross-Site Scripting Attacks. PLATFORM: WebSphere Commerce Edition V7.0 ABSTRACT: A remote user can access the target user's cookies (including authentication cookies), if any, associated with the site running the IBM WebSphere software, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user. reference LINKS: IBM Recommended Fixes for WebSphere Commerce IBM Support SecurityTracker Alert ID: 1026074

71

T-590: HP Diagnostics Input Validation Hole Permits Cross-Site Scripting  

Broader source: Energy.gov (indexed) [DOE]

0: HP Diagnostics Input Validation Hole Permits Cross-Site 0: HP Diagnostics Input Validation Hole Permits Cross-Site Scripting Attacks T-590: HP Diagnostics Input Validation Hole Permits Cross-Site Scripting Attacks March 29, 2011 - 3:05pm Addthis PROBLEM: HP Diagnostics Input Validation Hole Permits Cross-Site Scripting Attacks in ActiveSync Lets Remote Users Execute Arbitrary Code. PLATFORM: HP Diagnostics software: version(s) 7.5, 8.0 prior to 8.05.54.225 ABSTRACT: A potential security vulnerability has been identified in HP Diagnostics. The vulnerability could be exploited remotely resulting in cross site scripting (XSS). reference LINKS: HP Document ID: c02770512 SecurityTracker Alert ID: 1025255 CVE-2011-0892 Security Focus Document ID: c02770512 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in HP Diagnostics. A remote user can conduct

72

U-204: HP Network Node Manager i Input Validation Hole Permits Cross-Site  

Broader source: Energy.gov (indexed) [DOE]

204: HP Network Node Manager i Input Validation Hole Permits 204: HP Network Node Manager i Input Validation Hole Permits Cross-Site Scripting Attacks U-204: HP Network Node Manager i Input Validation Hole Permits Cross-Site Scripting Attacks July 3, 2012 - 7:00am Addthis PROBLEM: HP Network Node Manager i Input Validation Hole Permits Cross-Site Scripting Attacks PLATFORM: Version(s): 8.x, 9.0x, 9.1x ABSTRACT: Potential security vulnerabilities have been identified with HP Network Node Manager I (NNMi) for HP-UX, Linux, Solaris, and Windows. The vulnerabilities could be remotely exploited resulting in cross site scripting (XSS). reference LINKS: The Vendor's Advisory SecurityTracker Alert ID: 1027215 CVE-2012-2018 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in HP Network Node Manager i. The software does not properly filter HTML code from user-supplied input before

73

V-193: Barracuda SSL VPN Input Validation Hole Permits Cross-Site Scripting  

Broader source: Energy.gov (indexed) [DOE]

93: Barracuda SSL VPN Input Validation Hole Permits Cross-Site 93: Barracuda SSL VPN Input Validation Hole Permits Cross-Site Scripting Attacks V-193: Barracuda SSL VPN Input Validation Hole Permits Cross-Site Scripting Attacks July 5, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Barracuda SSL VPN PLATFORM: Version(s) prior to 2.3.3.216 ABSTRACT: Several scripts do not properly filter HTML code from user-supplied input before displaying the input via several parameters REFERENCE LINKS: SecurityTracker Alert ID: 1028736 Barracuda SSL VPN Release Notes Zero Science Lab IMPACT ASSESSMENT: Medium DISCUSSION: The code will originate from the Barracuda SSL VPN interface and will run in the security context of that site. As a result, the code will be able to access the target user's cookies (including authentication cookies), if

74

Flawed reasoning  

SciTech Connect (OSTI)

The FERC's failure to investigate the Entergy/GSU merger's effects on market power may force other agencies to examine electric utility mergers on their own. The competitive effects of the proposed merger Entergy and Gulf States Utilities (GSU) will not be further investigated by the Federal Energy Regulatory Commission (FERC), according to a January 1993 order. The FERC's primary justification is that the [open quotes]open access[close quotes] transmission conditions offered by the merging parties eliminated concern over market power in transmission and bulk power. The FERC's reasoning is flawed. If the merger were to lead to an increase in market power, the proposed transmission conditions would not prevent the merged firm from exercising that power. The FERC also justifies its decision not to investigate the competitive effects of the merger on the grounds that no intervenor had demonstrated that present competition between the two systems is more than de minimis. This is not an appropriate standard. Intervenors demonstrated that Entergy's and GSU's transmission system offer alternative contract routes for bulk power between generators and customers. Even if Entergy and GSU both do not actually sell significant amounts of the same transmission-service, an antitrust evaluation should consider whether the availability of a second, independent route constrains the pricing of the first. The FERC's reasoning indicates that it has lost its way in carrying out its responsibilities to protect consumers. Open access to transmission systems may play an important role in increasing competition in bulk power markets. However, the FERC's goal should be to promote competition, not merely to open access for its own sake. In its enthusiasm to secure [open quotes]open access[close quotes], the FERC appears willing to ignore possible reductions in competition.

Frankena, M.W.; Owen, B.M.

1993-07-15T23:59:59.000Z

75

Fabrication Flaws in Reactor Pressure Vessel Repair Welds  

SciTech Connect (OSTI)

This paper describes the fabrication flaw distribution and characterization in the repair weld metal of reactor pressure vessels. This work indicates that the large flaws occur in these repairs. These results show that repair flaws are complex in composition and sometimes include cracks on the repair ends. Parametric analysis using an exponential fit is performed on the data. A description of repair flaw morphology is provided. Fabrication flaws in repairs are characterized using high sensitivity nondestructive ultrasonic testing, validation by other nondestructive evaluation (NDE) techniques, and complemented by destructive testing.

Schuster, George J.; Doctor, Steven R.

2007-12-01T23:59:59.000Z

76

Improved Criteria for the Repair of Fabrication Flaws  

SciTech Connect (OSTI)

Section III of the American Society of Mechanical Engineers (ASME) Boiler and Pressure Vessel Code for nuclear power plant components requires radiographic examinations (RT) of welds and requires repairs for RT indications that exceed code acceptable sizes. This paper describes research that has generated data on welding flaws, which indicated that the largest flaws occur in repaired welds. The fabrication flaws were detected in material removed from cancelled nuclear power plants using high sensitivity Nondestructive Examination (NDE) and validated by complementary NDE and destructive testing. Evidence suggests that repairs are often for small and benign RT indications at locations buried within the vessel or pipe wall. Probabilistic fracture mechanics calculations are described in this paper to predict the increases in vessel and piping failure probabilities caused by the repair-induced flaws. Calculations address failures of embrittled vessel welds for pressurized thermal shock (PTS) transients and piping failures caused by fatigue crack growth. For vessels the small flaws, which are relatively common, can cause brittle fracture, such that the rarely encountered repair flaws of large sizes gave only modestly increased failure probabilities. Calculations for piping show that only relatively large fabrication flaws can cause failures because of the ductile nature of the piping material. The large repair flaws therefore significantly increased the failure probabilities. The paper recommends the use of more discriminating ultrasonic examinations in place of RT examinations along with repair criteria based on a fitness-for-purpose approach that minimize the number of unjustified repairs.

Doctor, Steven R.; Schuster, George J.; Simonen, Fredric A.

2004-12-01T23:59:59.000Z

77

Fabrication Flaw Density and Distribution In Repairs to Reactor Pressure Vessel and Piping Welds  

SciTech Connect (OSTI)

The Pacific Northwest National Laboratory is developing a generalized fabrication flaw distribution for the population of nuclear reactor pressure vessels and for piping welds in U.S. operating reactors. The purpose of the generalized flaw distribution is to predict component-specific flaw densities. The estimates of fabrication flaws are intended for use in fracture mechanics structural integrity assessments. Structural integrity assessments, such as estimating the frequency of loss-of-coolant accidents, are performed by computer codes that require, as input, accurate estimates of flaw densities. Welds from four different reactor pressure vessels and a collection of archived pipes have been studied to develop empirical estimates of fabrication flaw densities. This report describes the fabrication flaw distribution and characterization in the repair weld metal of vessels and piping. This work indicates that large flaws occur in these repairs. These results show that repair flaws are complex in composition and sometimes include cracks on the ends of the repair cavities. Parametric analysis using an exponential fit is performed on the data. The relevance of construction records is established for describing fabrication processes and product forms. An analysis of these records shows there was a significant change in repair frequency over the years when these components were fabricated. A description of repair flaw morphology is provided with a discussion of fracture mechanics significance. Fabrication flaws in repairs are characterized using optimized-access, high-sensitivity nondestructive ultrasonic testing. Flaw characterizations are then validated by other nondestructive evaluation techniques and complemented by destructive testing.

GJ Schuster, FA Simonen, SR Doctor

2008-04-01T23:59:59.000Z

78

Validation of Innovative Exploration Technologies for Newberry Volcano: Map showing location of wells permitted, drilled and seismic test 2012  

DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

Innovative Exploration Technologies for Newberry Volcano: Map showing location of wells permitted, drilled & seismic test, 2012

Jaffe, Todd

79

U-021: Cisco Unified Communications Manager Directory Traversal Flaw Lets  

Broader source: Energy.gov (indexed) [DOE]

1: Cisco Unified Communications Manager Directory Traversal 1: Cisco Unified Communications Manager Directory Traversal Flaw Lets Remote Users Obtain Files U-021: Cisco Unified Communications Manager Directory Traversal Flaw Lets Remote Users Obtain Files October 27, 2011 - 7:45am Addthis PROBLEM: Cisco Unified Communications Manager Directory Traversal Flaw Lets Remote Users Obtain Files. PLATFORM: Cisco Unified Communications Manager 6.x, 7.x and 8.x ABSTRACT: A vulnerability was reported in Cisco Unified Communications Manager. reference LINKS: Cisco Advisory ID: cisco-sa-20111026-cucm Cisco Security Advisories and Response SecurityTracker Alert ID: 1026243 CVE-2011-3315 IMPACT ASSESSMENT: Medium Discussion: A remote user can view files on the target system. The software does not properly validate user-supplied input. A remote user can supply a specially

80

U-093: Mozilla Firefox Multiple Flaws Permit Remote Code Execution...  

Broader source: Energy.gov (indexed) [DOE]

a specially crafted content that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target user's system...

Note: This page contains sample records for the topic "validation flaw permits" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code,  

Broader source: Energy.gov (indexed) [DOE]

3: Apple Safari Multiple Flaws Let Remote Users Execute 3: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks July 21, 2011 - 1:27am Addthis PROBLEM: Multiple vulnerabilities were reported in Apple Safari. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can conduct cross-site scripting attacks. A remote user can obtain potentially sensitive information. A remote user can bypass a certificate validation control. PLATFORM: Safari 5.1 and Safari 5.0.6 Products Affected: Safari 5 (Mac OS X 10.6), Safari 5 (Mac OS X 10.5), Product Security, Safari 5.1 (OS X Lion) ABSTRACT: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code,

82

U-160: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov (indexed) [DOE]

60: Google Chrome Multiple Flaws Let Remote Users Execute 60: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-160: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code May 2, 2012 - 7:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Prior to 18.0.1025.168 ABSTRACT: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system reference LINKS: SecurityTracker Alert ID: 1027001 CVE-2011-3078 CVE-2011-3079 CVE-2011-3080 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will trigger a use-after-free, validation error, or race condition and execute arbitrary code on the target system. The code will

83

U-160: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov (indexed) [DOE]

0: Google Chrome Multiple Flaws Let Remote Users Execute 0: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-160: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code May 2, 2012 - 7:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Prior to 18.0.1025.168 ABSTRACT: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system reference LINKS: SecurityTracker Alert ID: 1027001 CVE-2011-3078 CVE-2011-3079 CVE-2011-3080 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will trigger a use-after-free, validation error, or race condition and execute arbitrary code on the target system. The code will

84

T-541: Citrix Provisioning Services Unspecified Flaw Let's Remote...  

Broader source: Energy.gov (indexed) [DOE]

Citrix Provisioning Services Unspecified Flaw Let's Remote Users Execute Arbitrary Code T-541: Citrix Provisioning Services Unspecified Flaw Let's Remote Users Execute Arbitrary...

85

V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote...  

Broader source: Energy.gov (indexed) [DOE]

6: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code June...

86

U-254: Webmin Flaws Let Remote Authenticated Users Execute Arbitrary Code  

Broader source: Energy.gov (indexed) [DOE]

54: Webmin Flaws Let Remote Authenticated Users Execute 54: Webmin Flaws Let Remote Authenticated Users Execute Arbitrary Code and View Arbitrary Files U-254: Webmin Flaws Let Remote Authenticated Users Execute Arbitrary Code and View Arbitrary Files September 10, 2012 - 6:00am Addthis PROBLEM: Webmin Multiple Input Validation Vulnerabilities PLATFORM: The vulnerabilities are reported in version 1.580. Other versions may also be affected. ABSTRACT: An authenticated attacker may be able to execute arbitrary commands. reference LINKS: Webmin Security Alerts Bugtraq ID: 55446 Secunia Advisory SA50512 SecurityTracker Alert ID: 1027507 US CERT Vulnerability Note VU#788478 CVE-2012-2981 CVE-2012-2982 CVE-2012-2983 IMPACT ASSESSMENT: Medium Discussion: Multiple vulnerabilities have been reported in Webmin, which can be exploited by malicious users to compromise a vulnerable system and by

87

V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated...  

Broader source: Energy.gov (indexed) [DOE]

or userGrant) can send specially crafted data via the web interface or XMLRPC API to gain additional administrative privileges. IMPACT: A remote authenticated user can...

88

T-670: Skype Input Validation Flaw in 'mobile phone' Profile...  

Broader source: Energy.gov (indexed) [DOE]

affected. Skype has now confirmed it is aware of the hole and has already developed a patch to be published within the next week. Skype provides a plausible explanation as to why...

89

Status of French flaw evaluation procedures  

SciTech Connect (OSTI)

The RSE-M Code is under development in France and the 1996 edition will include a complete flaw evaluation procedure for operating PWRs. For FBRs the authors have developed the RCC-MR for design and they are now developing RSE-MR rules for operating plants; a first set of flaw evaluation rules are proposed in the A16 document for low and high temperature regime. After some comments on the organization of RSE and RCC Committees, the paper presents: (1) the status of the different French code rules (RSE-M and A16 document); (2) how can one take into consideration some complex geometry or loading case situations; (3) some comparisons with ASME Code-Section XI; and (4) few examples of major on-going developments for flaw evaluation for different components. In conclusion, two different sets of rules are under development one in RSE-M for PWRs and one in RSE-MR for FBRs using partly the A16 proposals. These rules have to remain consistent, but not necessary identical due to the specific components covered by these documents. The components can be very different in term of pressure load, operating temperature, transient thermal loads and seismic loads.

Faidy, C. [Electricite de France-SEPTEN, Villeurbanne (France); Barthelet, B. [Electricite de France-EPN, Paris La Defense (France); Drubay, B. [CEA CEN Saclay, Gif-sur-Yvette (France)

1996-12-01T23:59:59.000Z

90

U-161: Citrix Provisioning Services Unspecified Flaw Lets Remote Users  

Broader source: Energy.gov (indexed) [DOE]

1: Citrix Provisioning Services Unspecified Flaw Lets Remote 1: Citrix Provisioning Services Unspecified Flaw Lets Remote Users Execute Arbitrary Code U-161: Citrix Provisioning Services Unspecified Flaw Lets Remote Users Execute Arbitrary Code May 3, 2012 - 7:00am Addthis PROBLEM: Citrix Provisioning Services Unspecified Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: 6.1 and prior ABSTRACT: A vulnerability was reported in Citrix Provisioning Services. A remote user can execute arbitrary code on the target system. reference LINKS: SecurityTracker Alert ID: 1027004 Secunia Advisory SA48971 Citrix advisory IMPACT ASSESSMENT: Medium Discussion: A remote user can send a specially crafted packet to trigger an unspecified flaw and execute arbitrary code on the target system. The code will run with the privileges of the target service.

91

T-623: HP Business Availability Center Input Validation Hole...  

Broader source: Energy.gov (indexed) [DOE]

Business Availability Center Input Validation Hole Permits Cross-Site Scripting Attacks T-623: HP Business Availability Center Input Validation Hole Permits Cross-Site Scripting...

92

Water Permits (Louisiana)  

Broader source: Energy.gov [DOE]

The Water Permits Division authorizes permits administered under the Water Quality Regulations. Louisiana's Water Quality Regulations require permits for the discharge of pollutants from any point...

93

T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users...  

Office of Environmental Management (EM)

727:Microsoft Windows SSLTLS Protocol Flaw Lets Remote Users Decryption Sessions T-727:Microsoft Windows SSLTLS Protocol Flaw Lets Remote Users Decryption Sessions September 27,...

94

T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary...  

Broader source: Energy.gov (indexed) [DOE]

Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct...

95

V-075: EMC AlphaStor Command Injection and Format String Flaws...  

Broader source: Energy.gov (indexed) [DOE]

Flaw Lets Remote Users Execute Arbitrary Commands V-181: Oracle Java SE Critical Patch Update Advisory - June 2013 V-067: Oracle Java Flaw Lets Remote Users Execute...

96

T-541: Citrix Provisioning Services Unspecified Flaw Let's Remote Users  

Broader source: Energy.gov (indexed) [DOE]

41: Citrix Provisioning Services Unspecified Flaw Let's Remote 41: Citrix Provisioning Services Unspecified Flaw Let's Remote Users Execute Arbitrary Code T-541: Citrix Provisioning Services Unspecified Flaw Let's Remote Users Execute Arbitrary Code January 24, 2011 - 5:34pm Addthis PROBLEM: Citrix Provisioning Services Unspecified Flaw Let's Remote Users Execute Arbitrary Code PLATFORM: * Provisioning Services 5.1 * Provisioning Services 5.6 ABSTRACT: A vulnerability has been identified in Citrix Provisioning Services that could result in arbitrary code execution. This vulnerability can be triggered by an attacker sending a specially crafted packet to the Provisioning Services server. This vulnerability is present in all supported versions of Citrix Provisioning Services up to and including version 5.6. reference LINKS:

97

Fabrication Flaw Density and Distribution in Piping Weldments  

SciTech Connect (OSTI)

The U.S. Nuclear Regulatory Commission supported the Pacific Northwest National Laboratory (PNNL) to develop empirical data on the density and distribution of fabrication flaws in nuclear reactor components. These data are needed to support probabilistic fracture mechanics calculations and studies on component structural integrity. PNNL performed nondestructive examination inspections and destructive testing on archived piping welds to determine the fabrication flaw size and distribution characteristics of the flaws in nuclear power plant piping weldments. Eight different processes and product forms in piping weldments were studied including wrought stainless steel and dissimilar metal weldments. Parametric analysis using an exponential fit was performed on the data. Results were created as a function of the through-wall size of the fabrication flaws as well as the length distribution. The results are compared and contrasted with those developed for reactor pressure vessel processes and product forms. The most significant findings were that the density of fabrication flaws versus through-wall size was higher in piping weldments than that for the reactor pressure vessel weldments, and the density of fabrication flaws versus through-wall size in both reactor pressure vessel weld repairs and piping weldments were greater than the density in the original weldments. Curves showing these distributions are presented.

Doctor, Steven R.

2009-09-01T23:59:59.000Z

98

U-212: RSA Authentication Manager Flaws Permit Cross-Site and...  

Broader source: Energy.gov (indexed) [DOE]

actions on the site acting as the target user. Solution: The vendor has issued a fix (Patch 14 (P14) for RSA Authentication Manager 7.1 SP4 and Appliance 3.0 SP4). Addthis...

99

T-715: Microsoft SharePoint Multiple Flaws Permit Cross-Site...  

Energy Savers [EERE]

IMPACT ASSESSMENT: High Discussion: A remote user can create a specially crafted URL or web site that, when loaded by a target user, will cause arbitrary scripting code to be...

100

Ultrasonic Flaw Detection of Cracks and Machined Flaws as Observed Through Austenitic Stainless Steel Piping Welds  

SciTech Connect (OSTI)

Piping welds in the pressure boundary of light water reactors (LWRs) are subject to a volumetric examination based on Section XI of the American Society of Mechanical Engineers (ASME) Boiler and Pressure Vessel Code. Due to access limitations and high background radiation levels, the technique used is primarily ultrasonic rather than radiographic. Many of the austenitic welds in safety-related piping systems provide limited access to both sides of the weld, so a far-side examination is necessary. Historically, far-side inspections have performed poorly because of the coarse and elongated grains that make up the microstructures of austenitic weldments. The large grains cause the ultrasound to be scattered, attenuated, and redirected. Additionally, grain boundaries or weld geometry may reflect coherent ultrasonic echoes, making flaw detection and discrimination a more challenging endeavor. Previous studies conducted at the Pacific Northwest National Laboratory (PNNL) on ultrasonic far-side examinations in austenitic piping welds involved the application of conventional transducers, use of low-frequency Synthetic Aperture Focusing Techniques (SAFT), and ultrasonic phased-array (PA) methods on specimens containing implanted thermal fatigue cracks and machined reflectors [1-2]. From these studies, PA inspection provided the best results, detecting nearly all of the flaws from the far side. These results were presented at the Fifth International Conference on NDE in Relation to Structural Integrity for Nuclear and Pressurised Components in 2006. This led to an invitation to examine field-removed specimens containing service-induced intergranular stress corrosion cracks (IGSCC) at the Electric Power Research Instituteís (EPRI) Nondestructive Evaluation (NDE) Center, in Charlotte, North Carolina. Results from this activity are presented.

Anderson, Michael T.; Cinson, Anthony D.; Crawford, Susan L.; Cumblidge, Stephen E.; Diaz, Aaron A.

2009-07-01T23:59:59.000Z

Note: This page contains sample records for the topic "validation flaw permits" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

V-073: IBM Tivoli Federated Identity Manager Signature Verification Flaw  

Broader source: Energy.gov (indexed) [DOE]

3: IBM Tivoli Federated Identity Manager Signature Verification 3: IBM Tivoli Federated Identity Manager Signature Verification Flaw Lets Remote Users Modify Attributes V-073: IBM Tivoli Federated Identity Manager Signature Verification Flaw Lets Remote Users Modify Attributes January 21, 2013 - 12:15am Addthis PROBLEM: IBM Tivoli Federated Identity Manager Signature Verification Flaw Lets Remote Users Modify Attributes PLATFORM: Tivoli Federated Identity Manager versions 6.2.0, 6.2.1, 6.2.2 ABSTRACT: A vulnerability was reported in IBM Tivoli Federated Identity Manager. REFERENCE LINKS: IBM Security Bulletin: 1615744 SecurityTracker Alert ID: 1028011 CVE-2012-6359 IMPACT ASSESSMENT: Medium DISCUSSION: The system does not check that all attributes have been signed. A remote user with the ability to conduct a man-in-the-middle attack can modify

102

Probabilistic assessment of critically flawed LMFBR PHTS piping elbows  

SciTech Connect (OSTI)

One of the important functions of the Primary Heat Transport System (PHTS) of a large Liquid Metal Fast Breeder Reactor (LMFBR) plant is to contain the circulating radioactive sodium in components and piping routed through inerted areas within the containment building. A significant possible failure mode of this vital system is the development of cracks in the piping components. This paper presents results from the probabilistic assessment of postulated flaws in the most-critical piping elbow of each piping leg. The criticality of calculated maximum sized flaws is assessed against an estimated material fracture toughness to determine safety factors and failure probability estimates using stress-strength interference theory. Subsequently, a different approach is also employed in which the randomness of the initial flaw size and loading are more-rigorously taken into account. This latter approach yields much smaller probability of failure values when compared to the stress-strength interference analysis results.

Balkey, K.R.; Wallace, I.T.; Vaurio, J.K.

1982-01-01T23:59:59.000Z

103

Class 1 Permit Modification Notification  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Class 1 Permit Modification to the Hazardous Waste Facility Permit, Permit Number: NM4890139088-TSDF Dear Mr. Kieling : Enclosed is a Class 1 Permit Modification Notification 1 0:...

104

Solubility of Flaws in Heavily-Doped Semiconductors  

Science Journals Connector (OSTI)

The solubility of a charged impurity in a semiconductor depends upon the Fermi level. This dependence may be understood in terms of a conceptual model in which an impurity is allowed to diffuse in a specimen containing a p-n junction, so that the Fermi level varies in respect to the band edges. If the impurity can exist in many states of charge (i.e., is a "flaw"), then the concentration of flaws with charge r times the electronic charge varies as the rth power of the hole density. Summing the concentrations for the different states of charge gives the solubility and its dependence upon hole concentration, and, hence, Fermi level.

W. Shockley and J. L. Moll

1960-09-01T23:59:59.000Z

105

Flawed analysis of the possibility of air capture  

E-Print Network [OSTI]

(2009) Capture of carbon dioxide from ambient air. Eur Phys J Spec Top 176: 93­106. Author contributionsLETTER Flawed analysis of the possibility of air capture In the article entitled "Economic capture and other gas separation processes. It concludes that (i) "unless air capture significantly

106

Detection of Strength-Impairing Surface Flaws in Glass  

Science Journals Connector (OSTI)

...of Strength-Impairing Surface Flaws in Glass F. M. Ernsberger Experiments have shown...sodium vapour treatment on the surface of glass (Andrade Tsien 1937) are fractures due...can also be developed, in soda-lime glass, by treatment with a molten lithium salt...

1960-01-01T23:59:59.000Z

107

On flaw tolerance of nacre: a theoretical study  

Science Journals Connector (OSTI)

...superior flaw-tolerance feature. The maximal crack size that does not evidently reduce the tensile strength of nacre is up to...PC Paris, and GR Irwin. 1985 The stress analysis of cracks handbook. St Louis, MO: Paris Productions. 48 Bao, G , and Y Song...

2014-01-01T23:59:59.000Z

108

T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

36: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls...

109

U-230: Sudo on Red Hat Enterprise Linux %postun Symlink Flaw...  

Broader source: Energy.gov (indexed) [DOE]

0: Sudo on Red Hat Enterprise Linux %postun Symlink Flaw Lets Local Users Gain Elevated Privileges U-230: Sudo on Red Hat Enterprise Linux %postun Symlink Flaw Lets Local Users...

110

V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute...  

Broader source: Energy.gov (indexed) [DOE]

2: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code April 25, 2013 - 12:14am...

111

V-104: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code...  

Broader source: Energy.gov (indexed) [DOE]

Code V-104: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code March 5, 2013 - 12:53am Addthis PROBLEM: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code...

112

U-239: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof...  

Broader source: Energy.gov (indexed) [DOE]

39: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source Addresses U-239: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source Addresses August 20,...

113

U-106: Citrix XenServer Multiple Flaws in Web Self Service Have...  

Broader source: Energy.gov (indexed) [DOE]

6: Citrix XenServer Multiple Flaws in Web Self Service Have Unspecified Impact U-106: Citrix XenServer Multiple Flaws in Web Self Service Have Unspecified Impact February 17, 2012...

114

Zoning and Permitting Resources  

Broader source: Energy.gov [DOE]

Zoning and permitting is commonly controlled by local governments and may be applicable to both residential and commercial properties.

115

Permitting Guides | Department of Energy  

Energy Savers [EERE]

Permitting Guides Permitting Guides Standardized procedures for permitting hydrogen technologies and systems are not yet well established. As a first step, DOE sponsored...

116

Stormwater Permits (Vermont)  

Broader source: Energy.gov [DOE]

Stormwater permits are required for the construction of a new generation facility, the reconstruction or expansion of a facility, the operation of a generation facility which discharges stormwater...

117

Hanford Dangerous Waste Permit  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

training, security) * Closure plan Tank-Related Permit Units New * 149 single-shell tanks (SSTs) * 28 double-shell tanks (DSTs) Existing * 242-A Evaporator * Waste Treatment...

118

EMPLOYEES U-PASS & Parking Permits Shaded area to be completed by Cashier Office  

E-Print Network [OSTI]

Motorcycle Parking Permit * (Not Valid for Automobiles, valid 24/7) Pre-tax Payroll Deduction of $10.17 per paycheck *Motorcycle permits must be displayed and locked to the motorcycle in the holder provided. Copies by hanging forward on the rearview mirror or upright on driver side dashboard. Motorcycle permits must

Dunham, Maitreya

119

A methodology for determining fabrication flaws in a reactor pressure vessel  

SciTech Connect (OSTI)

The Pacific Northwest National Laboratory (PNNL) conducted a program with the major objective of estimating the rate of occurrence of fabrication flaws in US light-water reactor pressure vessels (RPVs). In this study, RPV mate4rial was examined using the Synthetic Aperture Focusing Technique for Ultrasonic Testing (SAFT-UT) to detect and characterize flaws created during fabrication. The inspection data obtained in this program has been analyzed to address the rates of flaw occurrence.

Schuster, G.J.; Doctor, S.R.; Simonen, F.A. [Pacific Northwest National Lab., Richland, WA (United States)

1996-06-01T23:59:59.000Z

120

E-Print Network 3.0 - axial flaw detection Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

data mining for flaw identification in ceramics manufacture ORHAN DENGIZy, ALICE E. SMITH*y and IAN... elements is governed by its fracture strength, which is greatly...

Note: This page contains sample records for the topic "validation flaw permits" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Application of the TANDEM scheme for reconstructing flaw images by the SAFT method  

Science Journals Connector (OSTI)

The question of applying the TANDEM scheme for reconstructing flaw images by the SAFT method is considered. When the reflection of...

A. E. Bazulin; E. G. Bazulin; D. A. Koval

2009-07-01T23:59:59.000Z

122

Eddy current probe and method for flaw detection in metals  

DOE Patents [OSTI]

A flaw detecting system is shown which includes a probe having a pair of ferrite cores with in-line gaps in close proximity to each other. An insulating, non-magnetic, non-conducting holder fills the gaps and supports the ferrite cores in a manner such that the cores form a generally V-shape. Each core is provided with an excitation winding and a detection winding. The excitation windings are connected in series or parallel with an rf port for connection thereof to a radio frequency source. The detection windings, which are differentially wound, are connected in series circuit to a detector port for connection to a voltage measuring instrument. The ferrite cores at the in-line gaps directly engage the metal surface of a test piece, and the probe is scanned along the test piece. In the presence of a flaw in the metal surface the detection winding voltages are unbalanced, and the unbalance is detected by the voltage measuring instrument. The insulating holder is provided with a profile which conforms to that of a prominent feature of the test piece to facilitate movement of the probe along the feature, typically an edge or a corner. 9 figs.

Watjen, J.P.

1987-06-23T23:59:59.000Z

123

Eddy current probe and method for flaw detection in metals  

DOE Patents [OSTI]

A flaw detecting system is shown which includes a probe having a pair of ferrite cores with in-line gaps in close proximity to each other. An insulating, non-magnetic, non-conducting holder fills the gaps and supports the ferrite cores in a manner such that the cores form a generally V-shape. Each core is provided with an excitation winding and a detection winding. The excitation windings are connected in series or parallel with an rf port for connection thereof to a radio frequency source. The detection windings, which are differentially wound, are connected in series circuit to a detector port for connection to a voltage measuring instrument. The ferrite cores at the in-line gaps directly engage the metal surface of a test piece, and the probe is scanned along the test piece. In the presence of a flaw in the metal surface the detection winding voltages are unbalanced, and the unbalance is detected by the voltage measuring instrument. The insulating holder is provided with a profile which conforms to that of a prominent feature of the test piece to facilitate movement of the probe along the feature, typically an edge or a corner.

Watjen, John P. (Sunnyvale, CA)

1987-06-23T23:59:59.000Z

124

Direct Discharge Permit (Vermont)  

Broader source: Energy.gov [DOE]

A direct discharge permit is required if a project involves the discharge of pollutants to state waters. For generation purposes, this involves the withdrawal of surface water for cooling purposes...

125

Presidential Permits- Procedures  

Broader source: Energy.gov [DOE]

Executive Order 12038 states that, before a Presidential permit may be issued, the action must be found to be consistent with the public interest. The two criteria used by DOE to determine if a...

126

Hanford Facility RCRA permit handbook  

SciTech Connect (OSTI)

Purpose of this Hanford Facility (HF) RCRA Permit Handbook is to provide, in one document, information to be used for clarification of permit conditions and guidance for implementing the HF RCRA Permit.

NONE

1996-03-01T23:59:59.000Z

127

Evaluation of outer flaws in titanium alloys using eddy current measuring system  

SciTech Connect (OSTI)

In this paper results of shallow outer flaw detection in thick titanium alloy specimens is presented. In order to increase efficiency of inspections of minor defects an eddy current measuring system with a lock-in amplifier was used. The measurements were carried out for flat and cylindrical specimens with artificial flaws.

Chady, T.; Psuj, G.; Kowalczyk, J. [Department of Electrical and Computer Engineering, West Pomeranian University of Technology in Szczecin, ul. Sikorskiego 37, 70-313 Szczecin (Poland)

2011-06-23T23:59:59.000Z

128

Fracture response of externally flawed aluminum cylindrical shells under internal gaseous detonation loading  

E-Print Network [OSTI]

Fracture response of externally flawed aluminum cylindrical shells under internal gaseous. Experiments were performed to observe the fracture behavior of thin- wall and initially-flawed aluminum tubes to different fracture events are analyzed. Keywords: tube fracture, detonation, crack branching, crack curving

Barr, Al

129

U-230: Sudo on Red Hat Enterprise Linux %postun Symlink Flaw Lets Local  

Broader source: Energy.gov (indexed) [DOE]

0: Sudo on Red Hat Enterprise Linux %postun Symlink Flaw Lets 0: Sudo on Red Hat Enterprise Linux %postun Symlink Flaw Lets Local Users Gain Elevated Privileges U-230: Sudo on Red Hat Enterprise Linux %postun Symlink Flaw Lets Local Users Gain Elevated Privileges August 8, 2012 - 7:00am Addthis PROBLEM: Sudo on Red Hat Enterprise Linux %postun Symlink Flaw Lets Local Users Gain Elevated Privileges PLATFORM: Red Hat Enterprise Linux (v. 5 server) Red Hat Enterprise Linux Desktop (v. 5 client) ABSTRACT: An updated sudo package that fixes one security issue and several bugs is now available for Red Hat Enterprise Linux 5. reference LINKS: Advisory: RHSA-2012:1149-1 SecurityTracker Alert ID: 1027356 Sudo Main Page Bugzilla 844442 CVE-2012-3440 IMPACT ASSESSMENT: Medium Discussion: A local user can exploit a temporary file symbolic link flaw in the %postun

130

V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary  

Broader source: Energy.gov (indexed) [DOE]

2: Oracle Java Reflection API Flaw Lets Remote Users Execute 2: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code April 25, 2013 - 12:14am Addthis PROBLEM: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Version(s): 7 Update 21; possibly other versions (1.7.0_21-b11) Java Server JRE is also affected. ABSTRACT: A vulnerability was reported in Oracle Java. REFERENCE LINKS: SecurityTracker Alert ID: 1028466 Oracle IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create a specially crafted Java application that, when loaded and approved by the target user, will trigger a flaw in the Reflection API to bypass the security sandbox. IMPACT: A remote user can create a Java file that, when loaded by the target user,

131

U-270:Trend Micro Control Manager Input Validation Flaw in Ad...  

Broader source: Energy.gov (indexed) [DOE]

on the underlying database. Solution: The vendor has issued a fix. For 5.5: Critical Patch - Build 1823 For 6.0: Critical Patch - Build 1449 Addthis Related Articles V-139:...

132

U-147:Red Hat Enterprise MRG Grid Input Validation Flaw | Department...  

Broader source: Energy.gov (indexed) [DOE]

via network Modification of user information Solution: The vendor has issued a fix. The patch is available at RedHat.com Addthis Related Articles U-217: Red Hat Certificate System...

133

V-165: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote...  

Office of Environmental Management (EM)

T-551: Cisco Security Advisory: Multiple Cisco WebEx Player Vulnerabilities U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs U-239:...

134

"Mobile money" services permit  

E-Print Network [OSTI]

"Mobile money" services permit cell phone users to send small amounts of money via text message to their friends and relatives. There are over 90 mobile money services in the world today, mainly in emergingTure oF Money october 2012 - April 2013 Muriel Ansley reynolds exhibit GAllery For the full exhibit checklist

Loudon, Catherine

135

Montana Water Quality Permit Application, Nondegradation Authorization...  

Open Energy Info (EERE)

LibraryAdd to library PermittingRegulatory Guidance - Supplemental Material: Montana Water Quality Permit Application, Nondegradation Authorization, and Permit FeesPermitting...

136

Permit application handbook  

SciTech Connect (OSTI)

The objective of this handbook is to explain how to prepare a mining permit application which will satisfy the requirements of the Federal Surface Mining Control and Reclamation Act of 1977 (SMCRA) (Public Law 95-87). The requirements described in this Handbook come from the permanent program regulations issued by the Office of Surface Mining (OSM) on March 13, 1979 and the court decisions and regulatory changes up until June 1981. This Handbook was developed to provide mine operators, particularly operators of small Appalachian mines, with an explanation of the Federal permit application requirements and the work which will be entailed in satisfying these requirements. Requirement explanations in the following areas are presented: site description; surface waters; ground waters; cultural resources; road; topsoil handling; blasting plans; water quality control; excess spoil disposal; reclamation plan; and special mining conditions. (DMC)

Not Available

1981-06-23T23:59:59.000Z

137

U-213: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov (indexed) [DOE]

U-213: Google Chrome Multiple Flaws Let Remote Users Execute U-213: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-213: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code July 16, 2012 - 7:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 20.0.1132.57 ABSTRACT: Several vulnerabilities were reported in Google Chrome. reference LINKS: Stable Channel Update SecurityTracker Alert ID: 1027249 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user.

138

T-650: Microsoft Word Unspecified Flaw Lets Remote Users Execute Arbitrary  

Broader source: Energy.gov (indexed) [DOE]

650: Microsoft Word Unspecified Flaw Lets Remote Users Execute 650: Microsoft Word Unspecified Flaw Lets Remote Users Execute Arbitrary Code T-650: Microsoft Word Unspecified Flaw Lets Remote Users Execute Arbitrary Code June 20, 2011 - 3:35pm Addthis PROBLEM: A vulnerability was reported in Microsoft Word. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Office XP; possibly other versions ABSTRACT: Microsoft Word Unspecified Flaw Lets Remote Users Execute Arbitrary Code. reference LINKS: Secunia Advisory: SA44923 SecurityTracker Alert ID: 1025675 Bugtraq ID: 48261 TSL ID: TSL20110614-02 PRL: 2011-07 IMPACT ASSESSMENT: High Discussion: A code execution vulnerability has been reported in Microsoft Office Word. The vulnerability is due to memory corruption when parsing a specially crafted Word file.

139

V-058: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets  

Broader source: Energy.gov (indexed) [DOE]

8: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw 8: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code V-058: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code December 31, 2012 - 6:58am Addthis PROBLEM: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Version(s): 6, 7, 8 ABSTRACT: A vulnerability was reported in Microsoft Internet Explorer. A remote user can cause arbitrary code to be executed on the target user's system. REFERENCE LINKS: SecurityTracker Alert ID: 1027930 Secunia Advisory SA51695 CVE-2012-4792 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary

140

V-035: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov (indexed) [DOE]

5: Google Chrome Multiple Flaws Let Remote Users Execute 5: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code V-035: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code November 28, 2012 - 1:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 23.0.1271.91 ABSTRACT: Several vulnerabilities were reported in Google Chrome. REFERENCE LINKS: Release updates from the Chrome team SecurityTracker Alert ID: 1027815 Secunia Advisory SA51437 CVE-2012-5130 CVE-2012-5131 CVE-2012-5132 CVE-2012-5133 CVE-2012-5134 CVE-2012-5135 CVE-2012-5136 IMPACT ASSESSMENT: High DISCUSSION: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create specially crafted content that, when loaded by the

Note: This page contains sample records for the topic "validation flaw permits" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

V-066: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute  

Broader source: Energy.gov (indexed) [DOE]

6: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users 6: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges V-066: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges January 10, 2013 - 2:00am Addthis PROBLEM: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges PLATFORM: *Adobe Reader XI (11.0.0) for Windows and Macintosh *Adobe Reader X (10.1.4) and earlier 10.x versions for Windows and Macintosh *Adobe Reader 9.5.2 and earlier 9.x versions for Windows and Macintosh *Adobe Reader 9.5.1 and earlier 9.x versions for Linux *Adobe Acrobat XI (11.0.0) for Windows and Macintosh *Adobe Acrobat X (10.1.4) and earlier 10.x versions for Windows and

142

V-067: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code |  

Broader source: Energy.gov (indexed) [DOE]

7: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code 7: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code V-067: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code January 11, 2013 - 12:01am Addthis PROBLEM: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Oracle Java Runtime Environment (JRE) 1.7 in Java 7 Update 10 and earlier ABSTRACT: A vulnerability was reported in Oracle Java. REFERENCE LINKS: Seclist.org Vulnerability Note VU#625617 SecurityTracker Alert ID: 1027972 Malware.dontneedcoffee.com CVE-2013-0422 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted Java content that, when loaded by the target user, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user. This vulnerability is being actively exploited.

143

U-048: HP LaserJet Printers Unspecified Flaw Lets Remote Users Update  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

8: HP LaserJet Printers Unspecified Flaw Lets Remote Users 8: HP LaserJet Printers Unspecified Flaw Lets Remote Users Update Firmware with Arbitrary Code U-048: HP LaserJet Printers Unspecified Flaw Lets Remote Users Update Firmware with Arbitrary Code November 30, 2011 - 8:15am Addthis PROBLEM: HP LaserJet Printers Unspecified Flaw Lets Remote Users Update Firmware with Arbitrary Code . PLATFORM: HP LaserJet Printers manufactured prior to 2009 ABSTRACT A remote user can upgrade the printer's firmware with arbitrary code. reference LINKS: SecurityTracker Alert ID:1026357 HP Security for Imaging and Printing HP Clarifies on Printer Security IMPACT ASSESSMENT: Low Discussion: A vulnerability was reported in some HP LaserJet Printers. A remote user can update the firmware with arbitrary code. A remote user can send a specially crafted print job or specially crafted data to the

144

T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption  

Broader source: Energy.gov (indexed) [DOE]

7:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users 7:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions September 27, 2011 - 8:00am Addthis PROBLEM: Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions. PLATFORM: Windows XP Service Pack 3 Windows XP Professional x64 Edition Service Pack 2 Windows Server 2003 Service Pack 2 Windows Server 2003 x64 Edition Service Pack 2 Windows Server 2003 with SP2 for Itanium-based Systems Windows Vista Service Pack 2 Windows Vista x64 Edition Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 Windows Server 2008 for x64-based Systems Service Pack 2 Windows Server 2008 for Itanium-based Systems Service Pack 2 Windows 7 for 32-bit Systems and Windows 7 for 32-bit Systems Service Pack

145

T-713: Blue Coat Reporter Directory Traversal Flaw | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

3: Blue Coat Reporter Directory Traversal Flaw 3: Blue Coat Reporter Directory Traversal Flaw T-713: Blue Coat Reporter Directory Traversal Flaw September 9, 2011 - 10:47am Addthis PROBLEM: A vulnerability was reported in Blue Coat Reporter. A remote user can view files on the target system and gain full control of the target application. PLATFORM: All pre-9.3 versions of Reporter installed on a Windows server are vulnerable. ABSTRACT: Blue Coat Reporter Directory Traversal Flaw Lets Remote Users Gain Full Control. reference LINKS: Blue Coat Security Advisory ID: SA60 SecurityTracker Alert ID: 1026023 About Path Traversal IMPACT ASSESSMENT: High Discussion: Reporter installed on a Windows server is vulnerable to an HTTP directory traversal attack. An unauthenticated user can browse the file system and read any file. Data from these files can be used by an attacker to gain

146

T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption  

Broader source: Energy.gov (indexed) [DOE]

7:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users 7:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions September 27, 2011 - 8:00am Addthis PROBLEM: Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions. PLATFORM: Windows XP Service Pack 3 Windows XP Professional x64 Edition Service Pack 2 Windows Server 2003 Service Pack 2 Windows Server 2003 x64 Edition Service Pack 2 Windows Server 2003 with SP2 for Itanium-based Systems Windows Vista Service Pack 2 Windows Vista x64 Edition Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 Windows Server 2008 for x64-based Systems Service Pack 2 Windows Server 2008 for Itanium-based Systems Service Pack 2 Windows 7 for 32-bit Systems and Windows 7 for 32-bit Systems Service Pack

147

U-180: Cisco IOS XR Packet Processing Flaw | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

80: Cisco IOS XR Packet Processing Flaw 80: Cisco IOS XR Packet Processing Flaw U-180: Cisco IOS XR Packet Processing Flaw May 31, 2012 - 7:00am Addthis PROBLEM: A vulnerability was reported in Cisco IOS XR. PLATFORM: Version(s): XR 4.0.3, 4.0.4, 4.1.0, 4.1.1, 4.1.2, and 4.2.0 ABSTRACT: A remote user can cause denial of service conditions. Reference Links: Security Tracker ID 1027104 CVE-2012-2488 Vendor Advisory IMPACT ASSESSMENT: High Discussion: A remote user can send a specially crafted packet to the target device to cause the route processor to be unable to transmit route processor-based protocol packets to the fabric. IP traffic transiting the device cannot trigger the flaw. Cisco IOS XR is affected on the Cisco 9000 Series Aggregation Services Routers (ASR) Route Switch Processor (RSP440) and the Cisco Carrier Routing

148

U-134: Apache Traffic Server Host Header Processing Flaw Lets Remote Users  

Broader source: Energy.gov (indexed) [DOE]

4: Apache Traffic Server Host Header Processing Flaw Lets 4: Apache Traffic Server Host Header Processing Flaw Lets Remote Users Deny Service U-134: Apache Traffic Server Host Header Processing Flaw Lets Remote Users Deny Service March 27, 2012 - 7:00am Addthis PROBLEM: Apache Traffic Server Host Header Processing Flaw Lets Remote Users Deny Service PLATFORM: Versions prior to 3.0.4 and 3.1.3 ABSTRACT: A vulnerability was reported in Apache Traffic Server. A remote user can cause denial of service conditions. reference LINKS: SecurityTracker Alert ID: 1026847 CVE-2012-0256 Secunia Advisory SA48509 IMPACT ASSESSMENT: High Discussion: A remote user can send a request with a specially crafted 'Host' header value to trigger a heap allocation error and cause the target service to crash. Impact: A remote user can cause the target service to crash.

149

U-166: Adobe Shockwave Player Memory Corruption Flaws Let Remote Users  

Broader source: Energy.gov (indexed) [DOE]

6: Adobe Shockwave Player Memory Corruption Flaws Let Remote 6: Adobe Shockwave Player Memory Corruption Flaws Let Remote Users Execute Arbitrary Code U-166: Adobe Shockwave Player Memory Corruption Flaws Let Remote Users Execute Arbitrary Code May 10, 2012 - 7:00am Addthis PROBLEM: Adobe Shockwave Player Memory Corruption Flaws Let Remote Users Execute Arbitrary Code PLATFORM: 11.6.4.634 and prior ABSTRACT: Multiple vulnerabilities were reported in Adobe Shockwave Player. A remote user can cause arbitrary code to be executed on the target user's system. reference LINKS: SecurityTracker Alert ID: 1027037 CVE-2012-2029 CVE-2012-2030 CVE-2012-2031 CVE-2012-2032 CVE-2012-2033 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted Shockwave content that, when loaded by the target user, will trigger a memory corruption error and

150

V-075: EMC AlphaStor Command Injection and Format String Flaws Let Remote  

Broader source: Energy.gov (indexed) [DOE]

5: EMC AlphaStor Command Injection and Format String Flaws Let 5: EMC AlphaStor Command Injection and Format String Flaws Let Remote Users Execute Arbitrary Code V-075: EMC AlphaStor Command Injection and Format String Flaws Let Remote Users Execute Arbitrary Code January 23, 2013 - 12:26am Addthis PROBLEM: EMC AlphaStor Command Injection and Format String Flaws Let Remote Users Execute Arbitrary Code PLATFORM: EMC AlphaStor 4.0 prior to build 800 (All platforms) ABSTRACT: Two vulnerabilities were reported in EMC AlphaStor. REFERENCE LINKS: ESA-2013-008: SecurityTracker Alert ID: 1028020 Secunia Advisory SA51930 CVE-2013-0928 CVE-2013-0929 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can send a specially crafted DCP run command to inject commands and cause the Device Manager (rrobotd.exe) to execute arbitrary code on the target system [CVE-2013-0928].

151

U-010:HP Onboard Administrator Unspecified Flaw Lets Remote Users Gain  

Broader source: Energy.gov (indexed) [DOE]

0:HP Onboard Administrator Unspecified Flaw Lets Remote Users 0:HP Onboard Administrator Unspecified Flaw Lets Remote Users Gain Access U-010:HP Onboard Administrator Unspecified Flaw Lets Remote Users Gain Access October 13, 2011 - 8:15am Addthis PROBLEM: HP Onboard Administrator Unspecified Flaw Lets Remote Users Gain Access PLATFORM: Onboard Administrator (OA) 3.21 through 3.31 ABSTRACT: A remote user can gain access to the target system reference LINKS: HP Support document ID: c03048779 SecurityTracker Alert ID: 1026158 CVE-2011-3155 IMPACT ASSESSMENT: Medium Discussion: A potential security vulnerability has been identified with HP Onboard Administrator (OA). The vulnerability could be exploited remotely to gain unauthorized access. Impact: A remote user can gain access to the target system. Solution: Onboard Administrator (OA) v3.32 is available.

152

U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote  

Broader source: Energy.gov (indexed) [DOE]

14: Oracle Java Runtime Environment (JRE) Multiple Flaws Let 14: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote Users Execute Arbitrary Code and Deny Service U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote Users Execute Arbitrary Code and Deny Service October 19, 2011 - 6:00pm Addthis PROBLEM: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote Users Execute Arbitrary Code and Deny Service. PLATFORM: Oracle JDK and JRE 7; JDK and JRE 6 Update 27 and prior; JDK and JRE 5.0 Update 31 and prior; SDK and JRE 1.4.2_33 and prior ABSTRACT: A remote user can create a Java applet or Java Web Start application that, when loaded by the target user, will access or modify data or execute arbitrary code on the target user's system. reference LINKS: Oracle Critical Patch Updates and Security Alerts

153

U-134: Apache Traffic Server Host Header Processing Flaw Lets Remote Users  

Broader source: Energy.gov (indexed) [DOE]

34: Apache Traffic Server Host Header Processing Flaw Lets 34: Apache Traffic Server Host Header Processing Flaw Lets Remote Users Deny Service U-134: Apache Traffic Server Host Header Processing Flaw Lets Remote Users Deny Service March 27, 2012 - 7:00am Addthis PROBLEM: Apache Traffic Server Host Header Processing Flaw Lets Remote Users Deny Service PLATFORM: Versions prior to 3.0.4 and 3.1.3 ABSTRACT: A vulnerability was reported in Apache Traffic Server. A remote user can cause denial of service conditions. reference LINKS: SecurityTracker Alert ID: 1026847 CVE-2012-0256 Secunia Advisory SA48509 IMPACT ASSESSMENT: High Discussion: A remote user can send a request with a specially crafted 'Host' header value to trigger a heap allocation error and cause the target service to crash. Impact: A remote user can cause the target service to crash.

154

U-133: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov (indexed) [DOE]

33: Google Chrome Multiple Flaws Let Remote Users Execute 33: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-133: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code March 26, 2012 - 3:35am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Google Chrome prior to 17.0.963.83 ABSTRACT: Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026841 CVE-2011-3049 Secunia Advisory SA48512 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. A use-after-free may occur

155

V-006: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and  

Broader source: Energy.gov (indexed) [DOE]

6: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary 6: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service V-006: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service October 19, 2012 - 6:00am Addthis PROBLEM: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service PLATFORM: CA ARCserve Backup for Windows r12.5, r15, r16 ABSTRACT: Two vulnerabilities were reported in CA ARCserve Backup. A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions. REFERENCE LINKS: SecurityTracker Alert ID: 1027683 CA Technologies Support CVE-2012-2971 CVE-2012-2972 IMPACT ASSESSMENT: High DISCUSSION: A remote user can send specially crafted RPC requests to execute arbitrary code on the target system [CVE-2012-2971]. The code will run with the

156

U-143: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov (indexed) [DOE]

3: Google Chrome Multiple Flaws Let Remote Users Execute 3: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-143: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code April 9, 2012 - 7:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 18.0.1025.151 ABSTRACT: Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026892 CVE-2011-3066 Secunia Advisory SA48732 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. An out-of-bounds memory

157

T-683:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov (indexed) [DOE]

83:Google Chrome Multiple Flaws Let Remote Users Execute 83:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code T-683:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code August 3, 2011 - 3:45pm Addthis PROBLEM: Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Google Chrome prior to 13.0.782.107 ABSTRACT: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code. reference LINKS: Google Chrome advisory Update Chromium Security SecurityTracker Alert ID: 1025882 CVE-2011-2819 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a specially crafted HTML that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user.

158

V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute  

Broader source: Energy.gov (indexed) [DOE]

6: Adobe Flash Player Memory Corruption Flaw Lets Remote Users 6: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code June 12, 2013 - 12:15am Addthis PROBLEM: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Adobe Flash Player 11.7.700.202 and earlier versions for Windows Adobe Flash Player 11.7.700.203 and earlier versions for Macintosh Adobe Flash Player 11.2.202.285 and earlier versions for Linux Adobe Flash Player 11.1.115.58 and earlier versions for Android 4.x Adobe Flash Player 11.1.111.54 and earlier versions for Android 3.x and 2.x Adobe AIR 3.7.0.1860 and earlier versions for Windows and Macintosh Adobe AIR 3.7.0.1860 and earlier versions for Android

159

U-258: Adobe Flash Player Flaw Lets Remote Users Execute Arbitrary Code |  

Broader source: Energy.gov (indexed) [DOE]

8: Adobe Flash Player Flaw Lets Remote Users Execute Arbitrary 8: Adobe Flash Player Flaw Lets Remote Users Execute Arbitrary Code U-258: Adobe Flash Player Flaw Lets Remote Users Execute Arbitrary Code September 12, 2012 - 1:07pm Addthis PROBLEM: Adobe Flash Player Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: 11.3.300.270 and prior (Windows, OS X); 11.2.202.236 and prior (Linux); 11.3.300.270 and prior (Chrome) ABSTRACT: A remote user can cause arbitrary code to be executed on the target user's system. Reference LINKS: CVE-2012-1535 AdobeSecurity/bulletins SecurityTracker IMPACT ASSESSMENT: High Discussion: Vulnerability was reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a specially crafted file that, when loaded by the target user,

160

U-239: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source  

Broader source: Energy.gov (indexed) [DOE]

39: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS 39: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source Addresses U-239: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source Addresses August 20, 2012 - 7:00am Addthis PROBLEM: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source Addresses PLATFORM: Version(s): 6 beta 4 and prior versions ABSTRACT: A remote user can spoof SMS source addresses. Reference LINKS: SecurityTracker Alert ID: 1027410 Apple.com PCMag.com The original advisory IMPACT ASSESSMENT: Medum Discussion: A vulnerability was reported in Apple iPhone. A remote user can send an SMS message with a specially crafted User Data Header (UDH) value that specifies an alternate reply address. The recipient's iPhone will display the reply address as the source of the SMS.

Note: This page contains sample records for the topic "validation flaw permits" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

V-035: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov (indexed) [DOE]

5: Google Chrome Multiple Flaws Let Remote Users Execute 5: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code V-035: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code November 28, 2012 - 1:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 23.0.1271.91 ABSTRACT: Several vulnerabilities were reported in Google Chrome. REFERENCE LINKS: Release updates from the Chrome team SecurityTracker Alert ID: 1027815 Secunia Advisory SA51437 CVE-2012-5130 CVE-2012-5131 CVE-2012-5132 CVE-2012-5133 CVE-2012-5134 CVE-2012-5135 CVE-2012-5136 IMPACT ASSESSMENT: High DISCUSSION: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create specially crafted content that, when loaded by the

162

U-220: Google Android DNS Resolver Randomization Flaw Lets Remote Users  

Broader source: Energy.gov (indexed) [DOE]

0: Google Android DNS Resolver Randomization Flaw Lets Remote 0: Google Android DNS Resolver Randomization Flaw Lets Remote Users Poison the DNS Cache U-220: Google Android DNS Resolver Randomization Flaw Lets Remote Users Poison the DNS Cache July 25, 2012 - 7:00am Addthis PROBLEM: Google Android DNS Resolver Randomization Flaw Lets Remote Users Poison the DNS Cache PLATFORM: Version(s): 4.0.4 and prior versions ABSTRACT: A remote user can poison the DNS cache. reference LINKS: IBM Application Security Research Group SecurityTracker Alert ID: 1027291 Bugtraq ID: 523624 CVE-2012-2808 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Google Android. The res_randomid() function, which bases a return value on the process ID and the current time, is called twice in quick succession. As a result, the effective

163

U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary  

Broader source: Energy.gov (indexed) [DOE]

2: Microsoft Internet Explorer Flaw Lets Remote Users Execute 2: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code September 18, 2012 - 6:00am Addthis PROBLEM: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Internet Explorer 6, 7, 8, 9 ABSTRACT: A vulnerability was reported in Microsoft Internet Explorer. reference LINKS: Bugtraq ID: 55562 Security Database KB2757760 Microsoft Security Advisory (2757760) SecurityTracker Alert ID: 1027538 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system. The code will run with the privileges of the

164

V-067: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code |  

Broader source: Energy.gov (indexed) [DOE]

7: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code 7: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code V-067: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code January 11, 2013 - 12:01am Addthis PROBLEM: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Oracle Java Runtime Environment (JRE) 1.7 in Java 7 Update 10 and earlier ABSTRACT: A vulnerability was reported in Oracle Java. REFERENCE LINKS: Seclist.org Vulnerability Note VU#625617 SecurityTracker Alert ID: 1027972 Malware.dontneedcoffee.com CVE-2013-0422 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted Java content that, when loaded by the target user, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user. This vulnerability is being actively exploited.

165

V-156: Linux Kernel Array Bounds Checking Flaw Lets Local Users Gain  

Broader source: Energy.gov (indexed) [DOE]

6: Linux Kernel Array Bounds Checking Flaw Lets Local Users 6: Linux Kernel Array Bounds Checking Flaw Lets Local Users Gain Elevated Privileges V-156: Linux Kernel Array Bounds Checking Flaw Lets Local Users Gain Elevated Privileges May 15, 2013 - 12:19am Addthis PROBLEM: Linux Kernel Array Bounds Checking Flaw Lets Local Users Gain Elevated Privileges PLATFORM: Version(s): 2.6.37 to 3.8.9 ABSTRACT: A vulnerability was reported in the Linux Kernel. REFERENCE LINKS: Linux Kernel SecurityTracker Alert ID: 1028565 CVE-2013-2094 IMPACT ASSESSMENT: Medium DISCUSSION: On systems compiled with PERF_EVENTS support, a local user can supply a specially crafted perf_event_open() call to execute arbitrary code on the target system with root privileges. The vulnerability resides in the perf_swevent_init() function in 'kernel/events/core.c'.

166

U-213: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov (indexed) [DOE]

3: Google Chrome Multiple Flaws Let Remote Users Execute 3: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-213: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code July 16, 2012 - 7:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 20.0.1132.57 ABSTRACT: Several vulnerabilities were reported in Google Chrome. reference LINKS: Stable Channel Update SecurityTracker Alert ID: 1027249 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user.

167

V-006: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and  

Broader source: Energy.gov (indexed) [DOE]

6: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary 6: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service V-006: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service October 19, 2012 - 6:00am Addthis PROBLEM: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service PLATFORM: CA ARCserve Backup for Windows r12.5, r15, r16 ABSTRACT: Two vulnerabilities were reported in CA ARCserve Backup. A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions. REFERENCE LINKS: SecurityTracker Alert ID: 1027683 CA Technologies Support CVE-2012-2971 CVE-2012-2972 IMPACT ASSESSMENT: High DISCUSSION: A remote user can send specially crafted RPC requests to execute arbitrary code on the target system [CVE-2012-2971]. The code will run with the

168

T-691: Adobe Flash Player Multiple Flaws Let Remote Users Execute Arbitrary  

Broader source: Energy.gov (indexed) [DOE]

1: Adobe Flash Player Multiple Flaws Let Remote Users Execute 1: Adobe Flash Player Multiple Flaws Let Remote Users Execute Arbitrary Code T-691: Adobe Flash Player Multiple Flaws Let Remote Users Execute Arbitrary Code August 11, 2011 - 3:00pm Addthis PROBLEM: Multiple vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Version(s): 10.3.181.36 and prior; 10.3.185.25 and prior for Android. ABSTRACT: Adobe Flash Player Multiple Flaws Let Remote Users Execute Arbitrary Code. reference LINKS: Security Bulletin: APSB11-21 SecurityTracker Alert ID: 1025907 CVE-2011-2425 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted Flash content that, when loaded by the target user, will execute arbitrary code on the target system. The

169

V-095: Oracle Java Flaws Let Remote Users Execute Arbitrary Code |  

Broader source: Energy.gov (indexed) [DOE]

5: Oracle Java Flaws Let Remote Users Execute Arbitrary Code 5: Oracle Java Flaws Let Remote Users Execute Arbitrary Code V-095: Oracle Java Flaws Let Remote Users Execute Arbitrary Code February 20, 2013 - 12:38am Addthis PROBLEM: Oracle Java Flaws Let Remote Users Execute Arbitrary Code PLATFORM: JDK and JRE 7 Update 13 and earlier JDK and JRE 6 Update 39 and earlier JDK and JRE 5.0 Update 39 and earlier SDK and JRE 1.4.2_41 and earlier ABSTRACT: Several vulnerabilities were reported in Oracle Java. REFERENCE LINKS: Updated Release of the February 2013 Oracle Java SE Critical Patch Update SecurityTracker Alert ID: 1028155 CVE-2013-1484 CVE-2013-1485 CVE-2013-1486 CVE-2013-1487 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create a specially crafted Java Web Start application or Java applet that, when loaded by the target user, will execute arbitrary

170

V-075: EMC AlphaStor Command Injection and Format String Flaws Let Remote  

Broader source: Energy.gov (indexed) [DOE]

5: EMC AlphaStor Command Injection and Format String Flaws Let 5: EMC AlphaStor Command Injection and Format String Flaws Let Remote Users Execute Arbitrary Code V-075: EMC AlphaStor Command Injection and Format String Flaws Let Remote Users Execute Arbitrary Code January 23, 2013 - 12:26am Addthis PROBLEM: EMC AlphaStor Command Injection and Format String Flaws Let Remote Users Execute Arbitrary Code PLATFORM: EMC AlphaStor 4.0 prior to build 800 (All platforms) ABSTRACT: Two vulnerabilities were reported in EMC AlphaStor. REFERENCE LINKS: ESA-2013-008: SecurityTracker Alert ID: 1028020 Secunia Advisory SA51930 CVE-2013-0928 CVE-2013-0929 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can send a specially crafted DCP run command to inject commands and cause the Device Manager (rrobotd.exe) to execute arbitrary code on the target system [CVE-2013-0928].

171

U-277: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov (indexed) [DOE]

7: Google Chrome Multiple Flaws Let Remote Users Execute 7: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-277: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code October 9, 2012 - 6:00am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 22.0.1229.92 ABSTRACT: Several vulnerabilities were reported in Google Chrome. reference LINKS: SecurityTracker Alert ID: 1027617 Stable Channel Update CVE-2012-2900 CVE-2012-5108 CVE-2012-5109 CVE-2012-5110 CVE-2012-5111 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. A crash may occur in Skia text rendering [CVE-2012-2900].

172

U-089:Apache Struts ParameterInterceptor() Flaw Lets Remote Users Execute  

Broader source: Energy.gov (indexed) [DOE]

9:Apache Struts ParameterInterceptor() Flaw Lets Remote Users 9:Apache Struts ParameterInterceptor() Flaw Lets Remote Users Execute Arbitrary Commands U-089:Apache Struts ParameterInterceptor() Flaw Lets Remote Users Execute Arbitrary Commands January 26, 2012 - 6:45am Addthis PROBLEM: Apache Struts ParameterInterceptor() Flaw Lets Remote Users Execute Arbitrary Commands PLATFORM: Struts 2.0.0 - Struts 2.3.1.1 ABSTRACT: A remote user can execute arbitrary code on the target system. reference LINKS: CVE-2011-3923 SecurityTracker Alert ID: 1026575 Apache Struts 2 Documentation S2-009 blog.o0o.nu IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Apache Struts. The vulnerability allows a malicious user to bypass all the protections (regex pattern, deny method invocation) built into the ParametersInterceptor, thus being able to inject

173

U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary  

Broader source: Energy.gov (indexed) [DOE]

70: Apple QuickTime Multiple Flaws Let Remote Users Execute 70: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code May 16, 2012 - 7:00am Addthis PROBLEM: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: prior to 7.7.2 ABSTRACT: Multiple vulnerabilities were reported in Apple QuickTime. A remote user can cause arbitrary code to be executed on the target user's system. Reference LINKS: SecurityTracker Alert ID: 1027065 CVE-2012-0265 CVE-2012-0663 CVE-2012-0664 CVE-2012-0665 CVE-2012-0666 IMPACT ASSESSMENT: High Discussion: A remote user can create a specially crafted file that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. Only Windows-based systems

174

V-179: Blackberry Z10 Flaw Lets Physically Local Users Access the Device |  

Broader source: Energy.gov (indexed) [DOE]

9: Blackberry Z10 Flaw Lets Physically Local Users Access the 9: Blackberry Z10 Flaw Lets Physically Local Users Access the Device V-179: Blackberry Z10 Flaw Lets Physically Local Users Access the Device June 17, 2013 - 1:09am Addthis PROBLEM: Blackberry Z10 Flaw Lets Physically Local Users Access the Device PLATFORM: BlackBerry 10 OS version 10.0.10.261 and earlier, except version 10.0.9.2743 ABSTRACT: A vulnerability was reported in Blackberry Z10 Smartphones. REFERENCE LINKS: BlackBerry Security Advisory KB34458 SecurityTracker Alert ID: 1028669 CVE-2013-3692 IMPACT ASSESSMENT: Medium DISCUSSION: On systems with BlackBerry Protect enabled, if the user resets the device password via BlackBerry Protect and downloads a specifically crafted applications, then a physically local user can access or modify data on the device. The vulnerability is due to unsafe permissions on a BlackBerry Protect

175

V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary  

Broader source: Energy.gov (indexed) [DOE]

20: Apple QuickTime Multiple Flaws Let Remote Users Execute 20: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code November 9, 2012 - 6:00am Addthis PROBLEM: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Versions prior to QuickTime 7.7.3 are vulnerable on Windows 7, Vista and XP. ABSTRACT: Multiple vulnerabilities were reported in Apple QuickTime. REFERENCE LINKS: Apple Security Article: HT5581 SecurityTracker Alert ID: 1027737 Bugtraq ID: 56438 Secunia Advisory SA51226 CVE-2011-1374 CVE-2012-3751 CVE-2012-3752 CVE-2012-3753 CVE-2012-3754 CVE-2012-3755 CVE-2012-3756 CVE-2012-3757 CVE-2012-3758 IMPACT ASSESSMENT: High DISCUSSION: Multiple vulnerabilities have been reported in Apple QuickTime, which can

176

T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

36: Cisco ASA Multiple Flaws Let Remote Users Deny Service and 36: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls January 18, 2011 - 2:30pm Addthis PROBLEM: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls. PLATFORM: Cisco 5500 Series Adaptive Security Appliances (ASA) ABSTRACT: Cisco ASA 5500 Series Adaptive Security Appliances are affected by multiple vulnerabilities. Affected versions of Cisco ASA Software vary depending on the specific vulnerability. Cisco ASA 5500 Series Adaptive Security Appliances may experience a TCP connection exhaustion condition (no new TCP connections are accepted) that can be triggered through the receipt of specific TCP segments during the

177

U-247: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass  

Broader source: Energy.gov (indexed) [DOE]

7: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass 7: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass Authentication and Gain Administrative Access U-247: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass Authentication and Gain Administrative Access August 29, 2012 - 6:00am Addthis PROBLEM: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass Authentication and Gain Administrative Access PLATFORM: EMC Cloud Tiering Appliance (CTA) 7.4 and prior EMC Cloud Tiering Appliance Virtual Edition (CTA/VE) 7.4 and prior EMC Cloud Tiering Appliance (CTA) 9.0 and prior EMC Cloud Tiering Appliance Virtual Edition (CTA/VE) 9.0 and prior ABSTRACT: A vulnerability was reported in EMC Cloud Tiering Appliance. reference LINKS: SecurityTracker Alert ID: 1027448 Bugtraq ID: 55250 EMC.com CVE-2012-2285 IMPACT ASSESSMENT:

178

U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote  

Broader source: Energy.gov (indexed) [DOE]

4: Oracle Java Runtime Environment (JRE) Multiple Flaws Let 4: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote Users Execute Arbitrary Code and Deny Service U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote Users Execute Arbitrary Code and Deny Service October 19, 2011 - 6:00pm Addthis PROBLEM: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote Users Execute Arbitrary Code and Deny Service. PLATFORM: Oracle JDK and JRE 7; JDK and JRE 6 Update 27 and prior; JDK and JRE 5.0 Update 31 and prior; SDK and JRE 1.4.2_33 and prior ABSTRACT: A remote user can create a Java applet or Java Web Start application that, when loaded by the target user, will access or modify data or execute arbitrary code on the target user's system. reference LINKS: Oracle Critical Patch Updates and Security Alerts

179

U-077: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov (indexed) [DOE]

7: Google Chrome Multiple Flaws Let Remote Users Execute 7: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-077: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code January 9, 2012 - 9:15am Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 16.0.912.75 ABSTRACT: A remote user may be able to execute arbitrary code on the target system. reference LINKS: Google Chrome Releases Chromium Security SecurityTracker Alert ID:1026487 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. Specially crafted animation frames can trigger a use-after-free memory

180

V-049: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

9: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let 9: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users Execute Arbitrary Code V-049: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users Execute Arbitrary Code December 18, 2012 - 1:30am Addthis PROBLEM: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users Execute Arbitrary Code PLATFORM: Windows RealPlayer 15.0.6.14 and prior. ABSTRACT: Two vulnerabilities were reported in RealPlayer. REFERENCE LINKS: RealPlayer Security Vulnerabilities Secunia Advisory SA51589 SecurityTracker Alert ID: 1027893 CVE-2012-5690 CVE-2012-5691 IMPACT ASSESSMENT: Medium DISCUSSION: Two vulnerabilities have been reported in RealPlayer, which can be exploited by malicious people to compromise a user's system. A remote user can create a specially crafted RealAudio file that, when

Note: This page contains sample records for the topic "validation flaw permits" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

V-066: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute  

Broader source: Energy.gov (indexed) [DOE]

66: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users 66: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges V-066: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges January 10, 2013 - 2:00am Addthis PROBLEM: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges PLATFORM: *Adobe Reader XI (11.0.0) for Windows and Macintosh *Adobe Reader X (10.1.4) and earlier 10.x versions for Windows and Macintosh *Adobe Reader 9.5.2 and earlier 9.x versions for Windows and Macintosh *Adobe Reader 9.5.1 and earlier 9.x versions for Linux *Adobe Acrobat XI (11.0.0) for Windows and Macintosh *Adobe Acrobat X (10.1.4) and earlier 10.x versions for Windows and

182

U-242: Linux Kernel Netlink SCM_CREDENTIALS Processing Flaw Lets Local  

Broader source: Energy.gov (indexed) [DOE]

2: Linux Kernel Netlink SCM_CREDENTIALS Processing Flaw Lets 2: Linux Kernel Netlink SCM_CREDENTIALS Processing Flaw Lets Local Users Gain Elevated Privileges U-242: Linux Kernel Netlink SCM_CREDENTIALS Processing Flaw Lets Local Users Gain Elevated Privileges August 23, 2012 - 7:00am Addthis PROBLEM: Linux Kernel Netlink SCM_CREDENTIALS Processing Flaw Lets Local Users Gain Elevated Privileges PLATFORM: Linux Kernel 3.2.x Linux Kernel 3.4.x Linux Kernel 3.5.x ABSTRACT: A vulnerability was reported in the Linux Kernel. reference LINKS: The Linux Kernel Archives SecurityTracker Alert ID: 1027434 Secunia Advisory SA50323 CVE-2012-3520 IMPACT ASSESSMENT: Medium Discussion: A local user can obtain elevated privileges on the target system. A local user may be able to send specially crafted Netlink messages to spoof SCM_CREDENTIALS and perform actions with elevated privileges.

183

Individual Permit for Storm Water  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Individual Permit Individual Permit Individual Permit for Storm Water The Individual Permit authorizes the discharge of storm water associated with historical industrial activities at LANL from specified solid waste management units and areas of concern, collectively referred to as Sites. October 15, 2012 Sandia Canyon Wetlands Sandia Canyon Wetlands in the early morning looking north. Get Expertise Environmental Communications & Public Involvement Email In the Individual Permit, to 'minimize' means to reduce and/or eliminate discharges of pollutants in storm water to the extent achievable. What is the Individual Permit for Storm Water? The Permit - NPDES No. NM0030759 - was issued by the U.S. Environmental Protection Agency, Region 6, on September 30, 2010 to Los Alamos National

184

Microsoft Word - Groundwater Discharge Permit  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

State Renews Groundwater Discharge Permit for WIPP CARLSBAD, N.M., September 11, 2008 - The New Mexico Environment Department (NMED) has renewed the U.S. Department of Energy's (DOE) Waste Isolation Pilot Plant (WIPP) groundwater discharge permit until 2013. The permit regulates the discharge of water from WIPP facilities and operations to lined ponds, which protect groundwater resources. The permit allows WIPP to discharge domestic wastewater, non-hazardous wastewater and storm water into 13 on-site, synthetically-lined ponds. The new permit also provides for increased daily discharge volumes to allow more flexibility in plant operations. "This permit is the result of a positive year-long effort with the New Mexico Groundwater Quality Bureau," said Jody Plum, DOE Carlsbad Field Office Permitting and

185

Presidential Permits - Procedures | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Permits - Procedures Presidential Permits - Procedures Executive Order 12038 states that, before a Presidential permit may be issued, the action must be found to be consistent with...

186

SWRCB General NPDES Permits | Open Energy Information  

Open Energy Info (EERE)

SWRCB General NPDES Permits Jump to: navigation, search OpenEI Reference LibraryAdd to library Legal Document- Permit ApplicationPermit Application: SWRCB General NPDES...

187

Washington Joint Aquatic Resources Permit Application | Open...  

Open Energy Info (EERE)

Permit Application Jump to: navigation, search OpenEI Reference LibraryAdd to library Legal Document- Permit ApplicationPermit Application: Washington Joint Aquatic...

188

Caltrans Encroachment Permit Application Guide | Open Energy...  

Open Energy Info (EERE)

Permit Application Guide Jump to: navigation, search OpenEI Reference LibraryAdd to library PermittingRegulatory Guidance - GuideHandbook: Caltrans Encroachment Permit...

189

CDPHE Industrial Individual Wastewater Discharge Permit Application...  

Open Energy Info (EERE)

Legal Document- Permit ApplicationPermit Application: CDPHE Industrial Individual Wastewater Discharge Permit ApplicationLegal Abstract Application provided by the Colorado...

190

Hawaii Individual Wastewater Management Permit Packet | Open...  

Open Energy Info (EERE)

to library PermittingRegulatory Guidance - Supplemental Material: Hawaii Individual Wastewater Management Permit PacketPermittingRegulatory GuidanceSupplemental Material Author...

191

Statistics of the Charge Distribution for a Localized Flaw in a Semiconductor  

Science Journals Connector (OSTI)

A localized flaw such as a vacancy-interstitial pair, gold atom, or small void is considered. It is found that the charge situation can be described by a set of energy levels which are independent of the Fermi level but which are temperature-dependent. If the flaw is electrically neutral for a certain position of the Fermi level, then as the Fermi level is raised from the neutral level successively above each higher-lying level of the set, the flaw acquires an additional electron unit of negative charge. These levels are called the first-acceptor level, second-acceptor level, etc. The energy levels are essentially equal to kTln(Z1Z2), where Z1 and Z2 are the contributions of the flaw to the state sum for the system for the two conditions of charge. Similarly, as the Fermi level is lowered below the neutral point, it passes the first-donor level, second-donor level, etc., and the flaw acquires charges of plus one, plus two, etc. The statistics are derived for the distribution for the various conditions of charge, referred to as first-donor condition, neutral condition, first-acceptor condition, etc.

W. Shockley and J. T. Last

1957-07-15T23:59:59.000Z

192

Predicting Flaw-Induced Resonance Spectrum Shift with Theoretical Perturbation Analysis  

SciTech Connect (OSTI)

Resonance inspection is an emerging non-destructive evaluation (NDE) technique which uses the resonance spectra differences between the good part population and the flawed parts to identify anomalous parts. It was previously established that finite-element (FE)-based modal analysis can be used to predict the resonance spectrum for an engineering scale part with relatively good accuracy. However, FE-based simulations can be time consuming in examining the spectrum shifts induced by all possible structural flaws. This paper aims at developing a computationally efficient perturbation technique to quantify the frequency shifts induced by small structural flaws, based on the FE simulated resonance spectrum for the perfect part. A generic automotive connecting rod is used as the example part for our study. The results demonstrate that the linear perturbation theory provides a very promising way in predicting frequency changes induced by small structural flaws. As the flaw size increases, the discrepancy between the perturbation analysis and the actual FE simulation results increases due to nonlinearity, yet the perturbation analysis is still able to predict the right trend in frequency shift.

Lai, Canhai; Sun, Xin

2013-10-28T23:59:59.000Z

193

Obtaining flaw images by the SAFT method taking the variable velocity of sound in a test object into account  

Science Journals Connector (OSTI)

A modification of the SAFT method for obtaining flaw images in test ... are presented. The images obtained by the SAFT method without taking different SVs into account...

E. G. Bazulin

2010-11-01T23:59:59.000Z

194

U-107: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny Service  

Broader source: Energy.gov (indexed) [DOE]

07: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny 07: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny Service U-107: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny Service February 21, 2012 - 6:00am Addthis PROBLEM: A vulnerability was reported in Cisco NX-OS. A remote user can cause denial of service conditions. PLATFORM: Nexus 1000v, 5000, and 7000 Series Switches ABSTRACT: A remote user can send a specially crafted IP packet to cause the target device to reload. reference LINKS: Cisco Advisory SecurityTracker Alert ID:1026692 CVE-2012-0352 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Cisco NX-OS. A remote user can cause denial of service conditions. A remote user can send a specially crafted IP packet to cause the target device to reload. The vulnerability occurs when the device attepts to obtain Layer 4 (e.g.,

195

U-140: HP-UX Unspecified Flaw in DCE Lets Remote Users Execute Arbitrary  

Broader source: Energy.gov (indexed) [DOE]

U-140: HP-UX Unspecified Flaw in DCE Lets Remote Users Execute U-140: HP-UX Unspecified Flaw in DCE Lets Remote Users Execute Arbitrary Code U-140: HP-UX Unspecified Flaw in DCE Lets Remote Users Execute Arbitrary Code April 4, 2012 - 7:15am Addthis PROBLEM: A vulnerability was reported in HP-UX PLATFORM: Version(s): 11.11, 11.23; running DCE ABSTRACT: A remote user can execute arbitrary code on the target system. A remote user can send specially crafted data to execute arbitrary code on the target system. The code will run with the privileges of the target service. Reference LINKS: Vendor Advisory Security Tracker ID 1026885 CVE-2012-0131 IMPACT ASSESSMENT: High Discussion: A potential security vulnerability has been identified in HP-UX running DCE. The vulnerability could be exploited remotely to create a Denial of Service (DoS).

196

U-245: Critical Java 0-day flaw exploited | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

45: Critical Java 0-day flaw exploited 45: Critical Java 0-day flaw exploited U-245: Critical Java 0-day flaw exploited August 27, 2012 - 4:41pm Addthis PROBLEM: Attackers are exploiting a new and unpatched vulnerability that affects the latest version of Java -- Java 7 Update 6, and it works against a fully patched Windows 7 SP1 with Java 7 Update 6, Mozilla Firefox on Ubuntu Linux 10.04, Internet Explorer / Mozilla Firefox / Chrome on Windows XP, Internet Explorer / Mozilla Firefox on Windows Vista and Windows 7, and Safari on OS X 10.7.4. PLATFORM: Version(s): Java 7 Update 6 ABSTRACT: Targeted attacks exploiting a zero-day Java vulnerability to deliver the Poison Ivy RAT onto the unsuspecting victims' machines REFERENCE LINKS: http://www.net-security.org/secworld.php?id=13484 zero-day CVE-2012-4681

197

V-218: HP Service Manager Unspecified Flaw Lets Remote Users Gain  

Broader source: Energy.gov (indexed) [DOE]

8: HP Service Manager Unspecified Flaw Lets Remote Users Gain 8: HP Service Manager Unspecified Flaw Lets Remote Users Gain Unauthorized Access V-218: HP Service Manager Unspecified Flaw Lets Remote Users Gain Unauthorized Access August 15, 2013 - 1:30am Addthis PROBLEM: A potential security vulnerability has been identified with HP Service Manager. The vulnerability could be exploited to allow remote unauthenticated access and elevation of privilege. PLATFORM: HP Service Manager v9.31, v9.30, v9.21, v7.11, v6.2.8 ABSTRACT: The vulnerabilities are reported in versions 9.31 and prior. REFERENCE LINKS: SecurityTracker Alert ID: 1028912 CVE-2013-4808 IMPACT ASSESSMENT: High DISCUSSION: A vulnerability was reported in HP Service Manager. A remote user can gain unauthorized access on the target system. IMPACT: User access via network

198

V-218: HP Service Manager Unspecified Flaw Lets Remote Users Gain  

Broader source: Energy.gov (indexed) [DOE]

8: HP Service Manager Unspecified Flaw Lets Remote Users Gain 8: HP Service Manager Unspecified Flaw Lets Remote Users Gain Unauthorized Access V-218: HP Service Manager Unspecified Flaw Lets Remote Users Gain Unauthorized Access August 15, 2013 - 1:30am Addthis PROBLEM: A potential security vulnerability has been identified with HP Service Manager. The vulnerability could be exploited to allow remote unauthenticated access and elevation of privilege. PLATFORM: HP Service Manager v9.31, v9.30, v9.21, v7.11, v6.2.8 ABSTRACT: The vulnerabilities are reported in versions 9.31 and prior. REFERENCE LINKS: SecurityTracker Alert ID: 1028912 CVE-2013-4808 IMPACT ASSESSMENT: High DISCUSSION: A vulnerability was reported in HP Service Manager. A remote user can gain unauthorized access on the target system. IMPACT: User access via network

199

T-617: BIND RPZ Processing Flaw Lets Remote Users Deny Service | Department  

Broader source: Energy.gov (indexed) [DOE]

7: BIND RPZ Processing Flaw Lets Remote Users Deny Service 7: BIND RPZ Processing Flaw Lets Remote Users Deny Service T-617: BIND RPZ Processing Flaw Lets Remote Users Deny Service May 6, 2011 - 7:00am Addthis PROBLEM: A vulnerability has been reported in BIND, which can be exploited by malicious people to cause a DoS (Denial of Service). PLATFORM: ISC BIND version 9.8.0. ABSTRACT: When a name server is configured with a response policy zone (RPZ), queries for type RRSIG can trigger a server crash. REFERENCE LINKS: ISC Advisory: CVE-2011-1907 Secunia Advisory: SA44416 Vulnerability Report: ISC BIND CVE-2011-1907 SecurityTracker Alert ID: 1025503 IMPACT ASSESSMENT: High Discussion: This advisory only affects BIND users who are using the RPZ feature configured for RRset replacement. BIND 9.8.0 introduced Response Policy Zones (RPZ), a mechanism for modifying DNS responses returned by a

200

V-225: McAfee Email Gateway SMTP Processing Flaw Lets Remote Users Deny  

Broader source: Energy.gov (indexed) [DOE]

5: McAfee Email Gateway SMTP Processing Flaw Lets Remote Users 5: McAfee Email Gateway SMTP Processing Flaw Lets Remote Users Deny Service V-225: McAfee Email Gateway SMTP Processing Flaw Lets Remote Users Deny Service August 23, 2013 - 1:26am Addthis PROBLEM: A vulnerability was reported in McAfee Email Gateway. A remote user can cause denial of service conditions. PLATFORM: McAfee Email Gateway (MEG) 7.5 ABSTRACT: A remote user can cause the SMTP proxy to stop responding. REFERENCE LINKS: SecurityTracker Alert ID: 1028941 GENERIC-MAP-NOMATCH IMPACT ASSESSMENT: High DISCUSSION: A vulnerability was reported in McAfee Email Gateway. A remote user can cause denial of service conditions.A remote user can send a specially crafted e-mail to cause the ws_inv-smtp process to enter an infinite loop and cause the target SMTP proxy to stop responding.

Note: This page contains sample records for the topic "validation flaw permits" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

T-663: Cisco Content Services Gateway ICMP Processing Flaw Lets Remote  

Broader source: Energy.gov (indexed) [DOE]

3: Cisco Content Services Gateway ICMP Processing Flaw Lets 3: Cisco Content Services Gateway ICMP Processing Flaw Lets Remote Users Deny Service T-663: Cisco Content Services Gateway ICMP Processing Flaw Lets Remote Users Deny Service July 7, 2011 - 12:41pm Addthis PROBLEM: A denial of service (DoS) vulnerability exists in the Cisco Content Services Gateway - Second Generation, that runs on the Cisco Service and Application Module for IP (SAMI). An unauthenticated, remote attacker could exploit this vulnerability by sending a series of crafted ICMP packets to an affected device. Exploitation could cause the device to reload. There are no workarounds available to mitigate exploitation of this vulnerability other than blocking ICMP traffic destined to the affected device. PLATFORM: Second Generation only Cisco IOS 12.4(24)MDA3,Cisco IOS 12.4(24)MDA3,Cisco

202

V-227: VMware Workstation and Player vmware-mount Command Flaw Lets Local  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

7: VMware Workstation and Player vmware-mount Command Flaw Lets 7: VMware Workstation and Player vmware-mount Command Flaw Lets Local Users Gain Root Privileges V-227: VMware Workstation and Player vmware-mount Command Flaw Lets Local Users Gain Root Privileges August 26, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in VMware Workstation and Player on Debian-based systems PLATFORM: VMware Workstation 8.x, 9.x and Player 4.x, 5.x ABSTRACT: VMware Workstation and Player contain a vulnerability in the handling of the vmware-mount command REFERENCE LINKS: Security Tracker Alert ID 1028948 VMware Security Advisory VMSA-2013-0010 CVE-2013-1662 IMPACT ASSESSMENT: Medium DISCUSSION: A local malicious user may exploit this vulnerability to escalate their privileges to root on the host OS. The issue is present when Workstation or

203

U-106: Citrix XenServer Multiple Flaws in Web Self Service Have Unspecified  

Broader source: Energy.gov (indexed) [DOE]

6: Citrix XenServer Multiple Flaws in Web Self Service Have 6: Citrix XenServer Multiple Flaws in Web Self Service Have Unspecified Impact U-106: Citrix XenServer Multiple Flaws in Web Self Service Have Unspecified Impact February 17, 2012 - 8:30am Addthis PROBLEM: Multiple vulnerabilities were reported in Citrix XenServer Web Self Service. PLATFORM: Version(s): 5.5, 5.6 SP2, 6.0; Web Self Service prior to 1.1.1 ABSTRACT: A number of security vulnerabilities have been identified in the management web interface of Citrix XenServer Web Self Service. reference LINKS: Citrix Support Center SecurityTracker Alert ID:1026695 IMPACT ASSESSMENT: Medium Discussion: Customers who have installed XenServer but have not additionally downloaded and installed the optional Web Self Service component are not affected by these vulnerabilities. These vulnerabilities affect all currently supported

204

T-574: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov (indexed) [DOE]

74: Google Chrome Multiple Flaws Let Remote Users Execute 74: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code T-574: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code March 10, 2011 - 3:05pm Addthis PROBLEM: Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can bypass the pop-up blocker. PLATFORM: Google Chrome prior to 10.0.648.127 ABSTRACT: Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact while others can be exploited by malicious people bypass certain security restrictions, disclose system information, and compromise a user's system. reference LINKS: Secunia Advisory: SA43683 Google Chrome Support Chrome Stable Release SecurityTracker Alert ID:1025181

205

U-006:Cisco Network Admission Control Manager Directory Traversal Flaw Lets  

Broader source: Energy.gov (indexed) [DOE]

6:Cisco Network Admission Control Manager Directory Traversal 6:Cisco Network Admission Control Manager Directory Traversal Flaw Lets Remote Users Obtain Potentially Sensitive Information U-006:Cisco Network Admission Control Manager Directory Traversal Flaw Lets Remote Users Obtain Potentially Sensitive Information October 7, 2011 - 8:45am Addthis PROBLEM: Cisco Network Admission Control Manager Directory Traversal Flaw Lets Remote Users Obtain Potentially Sensitive Information PLATFORM: Cisco NAC Manager software versions 4.8.X Cisco NAC Manager software versions 4.7.X and earlier are not affected ABSTRACT: An unauthenticated attacker could exploit this vulnerability to access sensitive information, including password files and system logs, that could be leveraged to launch subsequent attacks. reference LINKS: Cisco Security Advisory Document ID: 113189

206

T-546: Microsoft MHTML Input Validation Hole May Permit Cross...  

Office of Environmental Management (EM)

vulnerability to allow an attacker to inject a client-side script in the response of a Web request run in the context of the victim's Internet Explorer. The script could spoof...

207

Flaws Identification Using Eddy Current Differential Transducer and Artificial Neural Networks  

SciTech Connect (OSTI)

In this paper we present a multi-frequency excitation eddy current differential transducer and dynamic neural models which were used to detect and identify artificial flaws in thin conducting plates. Plates are made of Inconel600. EDM notches have relative depth from 10% to 80% and length from 2 mm to 7 mm. All flaws were located on the opposite surface of the examined specimen. Measured signals were used as input for training and verifying dynamic neural networks with a moving window. Wide range of ANN (Artificial Neural Network) structures are examined for different window length and different number of frequency components in excitation signal. Observed trends are presented in this paper.

Chady, T.; Lopato, P. [Szczecin University of Technology. al Piastow 17, 70-310 Szczecin (Poland)

2006-03-06T23:59:59.000Z

208

An Electrical Instrument for Detecting Invisible Flaws in Nonmagnetic Conductors Such as Tungsten  

Science Journals Connector (OSTI)

In this instrument the conductor being inspected is passed axially through a coil forming a part of the tuned circuit of an oscillator. Any flaws in the conductor cause a change in the tuning and thus in the frequency generated which is conveniently observed through heterodyning with a fixed frequency. By using high frequency of the order of 6000 kilocycles the response is limited to flaws near the surface of the conductor. This instrument is used in the factory inspection of tungsten wire particularly for the location of longitudinal cracks and is also effective in the determination of asymmetry of coated wires.

D. W. Dana

1934-01-01T23:59:59.000Z

209

Technical Letter Report Development of Flaw Size Distribution Tables Including Effects of Flaw Depth Sizing Errors for Draft 10CFR 50.61a (Alternate PTS Rule) JCN-N6398, Task 4  

SciTech Connect (OSTI)

This document describes a new method to determine whether the flaws in a particular reactor pressure vessel are consistent with the assumptions regarding the number and sizes of flaws used in the analyses that formed the technical justification basis for the new voluntary alternative Pressurized Thermal Shock (PTS) rule (Draft 10 CFR 50.61a). The new methodology addresses concerns regarding prior methodology because ASME Code Section XI examinations do not detect all fabrication flaws, they have higher detection performance for some flaw types, and there are flaw sizing errors always present (e.g., significant oversizing of small flaws and systematic under sizing of larger flaws). The new methodology allows direct comparison of ASME Code Section XI examination results with values in the PTS draft rule Tables 2 and 3 in order to determine if the number and sizes of flaws detected by an ASME Code Section XI examination are consistent with those assumed in the probabilistic fracture mechanics calculations performed in support of the development of 10 CFR 50.61a.

Simonen, Fredric A.; Gosselin, Stephen R.; Doctor, Steven R.

2013-04-22T23:59:59.000Z

210

Presidential Permits | Department of Energy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Presidential Permits Presidential Permits Presidential Permits Below is a listing of all the presidential permits grouped by Canada and Mexico. View the Presidental Permits - Mexico View the Presidential Permits - Canada PRESIDENTIAL PERMITS - CANADA BACK TO TOP Docket No. Company Date Issued PP-6 Puget Sound Energy 04/28/81 PP-10 BPA 10/27/45 PP-10-1 BPA 11/30/65 PP-11-2 Fraser Papers 02/29/99 PP-11 Fraser Papers (Rescinded in PP-366) 11/18/10 PP-12 Maine 12/05/63 PP-13 NiMo Hogansburg 01/31/48 PP-18 Glacier Electric 12/12/52 PP-20 Eastern Maine 05/25/65 PP-22 BC Hydro 08/24/67 PP-22-1 BC Hydro 07/21/55 PP-22-2 BC Hydro 02/04/58 PP-22-3 BC Hydro 08/24/67 PP-22-4 BCTC 09/05/07 PP-23 Netley 07/20/55 PP-24 Long Sault 06/06/80 PP-25 NYPA 06/06/80 PP-28 Northern Electric 04/17/63

211

U-260: ISC BIND RDATA Processing Flaw Lets Remote Users Deny Service |  

Broader source: Energy.gov (indexed) [DOE]

0: ISC BIND RDATA Processing Flaw Lets Remote Users Deny 0: ISC BIND RDATA Processing Flaw Lets Remote Users Deny Service U-260: ISC BIND RDATA Processing Flaw Lets Remote Users Deny Service September 14, 2012 - 6:00am Addthis PROBLEM: ISC BIND RDATA Processing Flaw Lets Remote Users Deny Service PLATFORM: Version(s): 9.0.x -> 9.6.x, 9.4-ESV->9.4-ESV-R5-P1, 9.6-ESV->9.6-ESV-R7-P2, 9.7.0->9.7.6-P2, 9.8.0->9.8.3-P2, 9.9.0->9.9.1-P2 ABSTRACT: A vulnerability was reported in ISC BIND. reference LINKS: The vendor's advisory SecurityTracker Alert ID: 1027529 Bugtraq ID: 55522 Red Hat Bugzilla - Bug 856754 CVE-2012-4244 IMPACT ASSESSMENT: High Discussion: A remote user can send a query for a record that has RDATA in excess of 65535 bytes to cause named to exit. This can be exploited against recursive servers by causing the server to query for records provided by an

212

T-636: Wireshark Multiple Flaws Let Remote Users Deny Service | Department  

Broader source: Energy.gov (indexed) [DOE]

T-636: Wireshark Multiple Flaws Let Remote Users Deny Service T-636: Wireshark Multiple Flaws Let Remote Users Deny Service T-636: Wireshark Multiple Flaws Let Remote Users Deny Service June 3, 2011 - 3:35pm Addthis PROBLEM: Wireshark Multiple Flaws Let Remote Users Deny Service PLATFORM: Wireshark Version(s): 1.2.0 to 1.2.16, 1.4.0 to 1.4.6 ABSTRACT: Multiple vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions. reference LINKS: wnpa-sec-2011-07 SecurityTracker Alert ID: 1025597 wnpa-sec-2011-08 IMPACT ASSESSMENT: High Discussion: A remote user can send specially crafted DICOM data, Visual Networks file, compressed capture data, snoop file, or Diameter dictionary file to cause the target service to crash or enter an infinite loop. Versions affected: 1.2.0 to 1.2.16 and 1.4.0 to 1.4.6.

213

V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary  

Broader source: Energy.gov (indexed) [DOE]

4: Apple QuickTime Multiple Flaws Let Remote Users Execute 4: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code May 27, 2013 - 12:23am Addthis PROBLEM: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Apple QuickTime prior to 7.7.4. ABSTRACT: Apple QuickTime Multiple Vulnerabilities REFERENCE LINKS: Apple Article: HT5770 SecurityTracker Alert ID: 1028589 Secunia Advisory SA53520 CVE-2013-0986, CVE-2013-0987, CVE-2013-0988 CVE-2013-0989, CVE-2013-1015, CVE-2013-1016 CVE-2013-1017, CVE-2013-1018, CVE-2013-1019 CVE-2013-1020, CVE-2013-1021, CVE-2013-1022 IMPACT ASSESSMENT: High DISCUSSION: Multiple vulnerabilities have been reported in Apple QuickTime, which can be exploited by malicious people to compromise a user's system.

214

U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the  

Broader source: Energy.gov (indexed) [DOE]

5: RSA Access Manager Session Replay Flaw Lets Remote Users 5: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System July 5, 2012 - 7:02am Addthis PROBLEM: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System PLATFORM: Version(s): Server version 6.0.x, 6.1, 6.1 SP1, 6.1 SP2, 6.1 SP3; all Agent versions ABSTRACT: A vulnerability was reported in RSA Access Manager. A remote user can gain access to the target system. reference LINKS: SecurityFocus ESA-2012-026 SecurityTracker Alert ID: 1027220 CVE-2012-2281 RSA SecurCare Online MPACT ASSESSMENT: Medium Discussion: RSA Access Manager contains a vulnerability that can be potentially exploited by a malicious user to replay the session with compromised session tokens. This is due to improper invalidation of session tokens

215

U-007: IBM Rational AppScan Import/Load Function Flaws Let Remote Users  

Broader source: Energy.gov (indexed) [DOE]

7: IBM Rational AppScan Import/Load Function Flaws Let Remote 7: IBM Rational AppScan Import/Load Function Flaws Let Remote Users Execute Arbitrary Code U-007: IBM Rational AppScan Import/Load Function Flaws Let Remote Users Execute Arbitrary Code October 10, 2011 - 9:15am Addthis PROBLEM: IBM Rational AppScan Import/Load Function Flaws Let Remote Users Execute Arbitrary Code. PLATFORM: Version(s): 7.8, 7.8.0.1, 7.8.0.2, 7.9, 7.9.0.1, 7.9.0.2, 7.9.0.3, 8.0, 8.0.0.1, 8.0.0.2 ABSTRACT: Two vulnerabilities were reported in IBM Rational AppScan. A remote user can cause arbitrary code to be executed on the target user's system. reference LINKS: IBM Security Advisory Document ID: 1515110 IBM Fix Pack Document ID: 4030774 SecurityTracker Alert ID: 1026154 IMPACT ASSESSMENT: High Discussion: A high risk security vulnerability in the "Import functionality" of IBM

216

Visual Data Analysis for Detecting Flaws and Intruders in Computer Network Systems  

E-Print Network [OSTI]

Visual Data Analysis for Detecting Flaws and Intruders in Computer Network Systems Soon Tee Teoh T the complex behaviors of computer network systems. We describe three log-file analysis applications operation of a large computer network sys- tem, the common practice is to constantly collect system logs

Ma, Kwan-Liu

217

U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the  

Broader source: Energy.gov (indexed) [DOE]

205: RSA Access Manager Session Replay Flaw Lets Remote Users 205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System July 5, 2012 - 7:02am Addthis PROBLEM: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System PLATFORM: Version(s): Server version 6.0.x, 6.1, 6.1 SP1, 6.1 SP2, 6.1 SP3; all Agent versions ABSTRACT: A vulnerability was reported in RSA Access Manager. A remote user can gain access to the target system. reference LINKS: SecurityFocus ESA-2012-026 SecurityTracker Alert ID: 1027220 CVE-2012-2281 RSA SecurCare Online MPACT ASSESSMENT: Medium Discussion: RSA Access Manager contains a vulnerability that can be potentially exploited by a malicious user to replay the session with compromised session tokens. This is due to improper invalidation of session tokens

218

Solar Permitting & Inspection Webinar Series  

Office of Energy Efficiency and Renewable Energy (EERE)

ICLEI Local Governments for Sustainability U.S.A. and the Interstate Renewable Energy Council, Inc. (IREC) present a series of three webinars on Solar Permitting & Inspection. As part of the U...

219

Well Permits (District of Columbia)  

Broader source: Energy.gov [DOE]

Well permits are required for the installation of wells in private and public space. Wells are defined as any trest hole, shaft, or soil excavation created by any means including, but not limited...

220

Rack Permitting Efficient Handling of Tissue Cultures  

Science Journals Connector (OSTI)

...for Microbiology research-article Notes Rack Permitting Efficient Handling of Tissue...American Society for Microbiology NOTES Rack Permitting Efficient Handling of Tissue...of this communication is to describe a rack which permits the simultaneous handling...

Samuel Baron; Charles E. Buckler; Kenneth K. Takemoto

1966-11-01T23:59:59.000Z

Note: This page contains sample records for the topic "validation flaw permits" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Montana 310 Permit Database | Open Energy Information  

Open Energy Info (EERE)

Permit Database Jump to: navigation, search OpenEI Reference LibraryAdd to library Web Site: Montana 310 Permit Database Abstract Provides access to Montana's 310 permit mapping...

222

Data Validation  

Science Journals Connector (OSTI)

Data validation is a†process which ensures the correctness of data, reduces database error rate and ensures an acceptable level of . Data validation is the key to the quality of the database. It is carried ou...

2008-01-01T23:59:59.000Z

223

Hanfordźs Site-Wide Permit  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

* Across entire Hanford Site ("Facility") What the permit does NOT cover * Solely radioactive materials * Superfund sites How does the permit protect? * Requirements for...

224

Caltrans Transportation Permits Manual | Open Energy Information  

Open Energy Info (EERE)

Permits Manual Jump to: navigation, search OpenEI Reference LibraryAdd to library Legal Document- OtherOther: Caltrans Transportation Permits ManualLegal Abstract...

225

Standardized Permit Guidance | Open Energy Information  

Open Energy Info (EERE)

Permit Guidance Jump to: navigation, search OpenEI Reference LibraryAdd to library Legal Document- OtherOther: Standardized Permit GuidanceLegal Abstract Standardized...

226

Nevada Department of Transportation - Occupancy Permits | Open...  

Open Energy Info (EERE)

Occupancy Permits Jump to: navigation, search OpenEI Reference LibraryAdd to library Web Site: Nevada Department of Transportation - Occupancy Permits Abstract This website gives...

227

Montana Produced Water General Permit - Example Authorization...  

Open Energy Info (EERE)

Water General Permit - Example Authorization Jump to: navigation, search OpenEI Reference LibraryAdd to library PermittingRegulatory Guidance - Supplemental Material: Montana...

228

permitting | OpenEI Community  

Open Energy Info (EERE)

permitting permitting Home Alevine's picture Submitted by Alevine(5) Member 29 July, 2013 - 14:46 Texas Legal Review BHFS flora and fauna leasing Legal review permitting roadmap Texas The NREL roadmap team recently met with our legal team Brownstein Hyatt Farber and Schreck (www.bhfs.com) for a review of the Texas portion of the Geothermal Regulatory Roadmap (GRR). BHFS provided excellent suggestions to the Section 3 flowcharts for geothermal leases on Texas state lands. The Texas portion of the GRR now encompasses a flowchart for Texas state land leasing on Permanent School Fund Lands, Texas Parks and Wildlife Department Lands, Land Trade Lands, and Relinquishment Act Lands. Additionally, BHFS provided many other helpful tips for clarifying other issue Kyoung's picture Submitted by Kyoung(155)

229

GRR/Section 15-CO-a - Air Permit - Construction Permit | Open Energy  

Open Energy Info (EERE)

5-CO-a - Air Permit - Construction Permit 5-CO-a - Air Permit - Construction Permit < GRR Jump to: navigation, search GRR-logo.png GEOTHERMAL REGULATORY ROADMAP Roadmap Home Roadmap Help List of Sections Section 15-CO-a - Air Permit - Construction Permit 15COAAirPermitConstructionPermit.pdf Click to View Fullscreen Contact Agencies Colorado Department of Public Health and Environment Regulations & Policies 5 CCR 1001-5 Colorado Stationary Source Permitting and Air Pollution Control Emission Notice Requirements Triggers None specified Click "Edit With Form" above to add content 15COAAirPermitConstructionPermit.pdf 15COAAirPermitConstructionPermit.pdf 15COAAirPermitConstructionPermit.pdf Error creating thumbnail: Page number not in range. Flowchart Narrative The Colorado Department of Public Health and Environment (CDPHE) Air

230

Characterization of Service Induced Flaws on the Far Side of Austenitic Welds Using Phased Array Technology  

SciTech Connect (OSTI)

Conventional ultrasonic testing methods continue to exhibit problems for applications involving coarse-grained structures. Pacific Northwest National Laboratory is evaluating the capabilities and limitations of phased array (PA) technology to detect service-type flaws in these coarse-grained materials. The work is being sponsored by the U.S. Nuclear Regulatory Commission, Office of Research. Work to determine detection capabilities through welds with varied grain structures is being explored to provide a better understanding of the acoustic properties of these welded structures. Piping specimens with welds fabricated in vertical and horizontal positions to simulate field conditions have been studied. The insights gained from the austenitic piping will be applied to dissimilar metal weld configurations, corrosion resistant clad piping and cast stainless steels. This paper presents results for using PA ultrasonic technology to determine the effectiveness of detecting and accurately characterizing flaws on the far-side of austenitic piping welds.

Anderson, Michael T.; Cumblidge, Stephen E.

2004-01-01T23:59:59.000Z

231

T-662: ISC BIND Packet Processing Flaw Lets Remote Users Deny Service |  

Broader source: Energy.gov (indexed) [DOE]

2: ISC BIND Packet Processing Flaw Lets Remote Users Deny 2: ISC BIND Packet Processing Flaw Lets Remote Users Deny Service T-662: ISC BIND Packet Processing Flaw Lets Remote Users Deny Service July 6, 2011 - 7:47am Addthis PROBLEM: A vulnerability was reported in ISC BIND. A remote user can cause denial of service conditions. PLATFORM: 9.6.3, 9.6-ESV-R4, 9.6-ESV-R4-P1, 9.6-ESV-R5b1 9.7.0, 9.7.0-P1, 9.7.0-P2, 9.7.1, 9.7.1-P1, 9.7.1-P2, 9.7.2, 9.7.2-P1, 9.7.2-P2, 9.7.2-P3, 9.7.3, 9.7.3-P1, 9.7.3-P2, 9.7.4b1 9.8.0, 9.8.0-P1, 9.8.0-P2, 9.8.0-P3, 9.8.1b1 ABSTRACT: A defect in the affected BIND 9 versions allows an attacker to remotely cause the "named" process to exit using a specially crafted packet. This defect affects both recursive and authoritative servers. The code location of the defect makes it impossible to protect BIND using ACLs configured

232

U-111: IBM AIX ICMP Processing Flaw Lets Remote Users Deny Service |  

Broader source: Energy.gov (indexed) [DOE]

11: IBM AIX ICMP Processing Flaw Lets Remote Users Deny Service 11: IBM AIX ICMP Processing Flaw Lets Remote Users Deny Service U-111: IBM AIX ICMP Processing Flaw Lets Remote Users Deny Service February 27, 2012 - 6:27am Addthis PROBLEM: A vulnerability was reported in IBM AIX. A remote user can cause denial of service conditions. PLATFORM: version(s): 5.3, 6.1, and 7.1 ABSTRACT: A remote user can send a specially crafted ICMP packet to cause the target service to crash. reference LINKS: Vendor Advisory Security Tracker ID 1026742 CVE-2011-1385 IMPACT ASSESSMENT: Medium Discussion: There is an error in the handling of a particular ICMP packet in which a remote user can cause a denial of service. Impact: Denial of service on AIX via network. Solution: The vendor has issued a fix. 5.3.12: APAR IV03369 6.1.5: APAR IV13672 6.1.6: APAR IV13554

233

Evaluation of Manual Ultrasonic Examinations Applied to Detect Flaws in Primary System Dissimilar Metal Welds at North Anna Power Station  

SciTech Connect (OSTI)

During a recent inservice inspection (ISI) of a dissimilar metal weld (DMW) in an inlet (hot leg) steam generator nozzle at North Anna Power Station Unit 1, several axially oriented flaws went undetected by the licensee's manual ultrasonic testing (UT) technique. The flaws were subsequently detected as a result of outside diameter (OD) surface machining in preparation for a full structural weld overlay. The machining operation uncovered the existence of two through-wall flaws, based on the observance of primary water leaking from the DMW. Further ultrasonic tests were then performed, and a total of five axially oriented flaws, classified as primary water stress corrosion cracking (PWSCC), were detected in varied locations around the weld circumference.

Anderson, Michael T.; Diaz, Aaron A.; Doctor, Steven R.

2012-06-01T23:59:59.000Z

234

Estimation of the Residual Magnetic Field Strength Inside a Pipeline after Testing by a Magnetic Flaw Detector  

Science Journals Connector (OSTI)

The residual magnetic field strength inside a pipeline after testing by a magnetic flaw detector ... demagnetizing local joint-pipe sections in carrying out repair-welding works is proposed.

R. V. Zagidulin; V. F. Muzhitskii

2003-07-01T23:59:59.000Z

235

Theoretical estimation of discontinuity flaw of adhesive contacts between multilayer elements of the liquid metal blanket in a fusion reactor  

Science Journals Connector (OSTI)

A technique developed for calculating the discontinuity flaw of an adhesive contact and the adhesion energy for two bodies makes it possible to take into account these effects in designing a multilayer cermet wal...

I. V. Vitkovsky; A. N. Konev; V. S. Shorkin; S. I. Yakushina

2007-06-01T23:59:59.000Z

236

Permit Parking Emergency Blue Light  

E-Print Network [OSTI]

P P P P P P P P P P P P P P P P P PP P P P P P Permit Parking Food P P Emergency Blue Light underground Emergency Blue Light outdoors Wheelchair Wheelchair prior arrangements necessary Telephone Visitor 144 Albert Street 21 152 Albert Street 20 154 Albert Street 94 34 Barrie Street 91 68 Barrie Street 90

Abolmaesumi, Purang

237

V-198: Red Hat Enterprise MRG Messaging Qpid Python Certificate Validation  

Broader source: Energy.gov (indexed) [DOE]

8: Red Hat Enterprise MRG Messaging Qpid Python Certificate 8: Red Hat Enterprise MRG Messaging Qpid Python Certificate Validation Flaw Lets Remote Users Conduct Man-in-the-Middle Attacks V-198: Red Hat Enterprise MRG Messaging Qpid Python Certificate Validation Flaw Lets Remote Users Conduct Man-in-the-Middle Attacks July 12, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Red Hat Enterprise MRG Messaging. PLATFORM: Red Hat Enterprise MRG v2 for Red Hat Enterprise Linux (version 6) ABSTRACT: A remote user can conduct a man-in-the-middle attack to access potentially sensitive information REFERENCE LINKS: SecurityTracker Alert ID: 1028774 Redhat Advisory RHSA-2013:1024-1 CVE-2013-1909 IMPACT ASSESSMENT: Medium DISCUSSION: The system does not properly validate the remote server's TLS/SSL certificates. A remote user can conduct a man-in-the-middle attack to

238

General Air Permits (Louisiana) | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

General Air Permits (Louisiana) General Air Permits (Louisiana) General Air Permits (Louisiana) < Back Eligibility Agricultural Construction Industrial Investor-Owned Utility Municipal/Public Utility Rural Electric Cooperative Utility Program Info State Louisiana Program Type Environmental Regulations Provider Louisiana Department of Environmental Quality Any source, including a temporary source, which emits or has the potential to emit any air contaminant requires an air permit. Facilities with potential emissions less than 5 tons per year of any regulated air pollutant do not need a permit. The Louisiana Department of Environmental Quality issues Title V General Permits. The permit is developed based on equipment types versus facility types, the general permits are not limited in their use to a specific industry or category. Title V permits combine

239

Development of flaw accept/reject criteria for solid propellant rocket grains  

E-Print Network [OSTI]

OF SCIENCE May 1976 Major Subjects Aerospace Engineering DEVELOPMENT OF FLAW ACCEPT/REJECT CRITERIA FOR SOLID PROPELLANT ROCKET GRAINS A Thesis by JAMES JEROME ROTTER Approved as to style and content bys Head o Depar men Mem er Mem er May 1976 4... crack, ) Mathematically, dU & ~dAa dA dA where& U = internal strain energy A = area of one surface of the crack 10 ~ = s pec if ic surface energy density More recent advances in fracture mechanics have resulted from a detailed examination...

Rotter, James Jerome

2012-06-07T23:59:59.000Z

240

Market Power in Pollution Permit Markets  

E-Print Network [OSTI]

As with other commodity markets, markets for trading pollution permits have not been immune to market power concerns. In this paper, I survey the existing literature on market power in permit trading but also contribute ...

Montero, Juan Pablo

Note: This page contains sample records for the topic "validation flaw permits" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Air Permitting for Stationary Sources (New Hampshire)  

Broader source: Energy.gov [DOE]

The permitting system implements the permitting requirements of RSA 125-C and 125-I to regulate the operation and modification of new and existing stationary sources, area sources, and devices to...

242

Full Permit Application Handbook | Open Energy Information  

Open Energy Info (EERE)

Full Permit Application Handbook Jump to: navigation, search OpenEI Reference LibraryAdd to library Legal Document- OtherOther: Full Permit Application HandbookLegal Abstract...

243

Idaho NPDES Permits Webpage | Open Energy Information  

Open Energy Info (EERE)

Permits Webpage Jump to: navigation, search OpenEI Reference LibraryAdd to library Web Site: Idaho NPDES Permits Webpage Abstract This webpage provides an overview of the process...

244

Flaw Shape Reconstruction from SH-Wave Array Ultrasonic Data Using Time Domain Linearized Inverse Scattering Method  

SciTech Connect (OSTI)

A linearized inverse scattering method, so called the Kirchhoff inversion, is formulated in time domain for SH-waves measured by a contact ultrasonic transducer and tested using experimental data. The data for reconstruction are experimentally obtained by measuring ultrasonic echoes from artificial flaws in steel plate specimens. For an efficient and accurate data collection, a contact SH-wave linear array transducer is used. The shapes of the artificial flaws are reconstructed by the Kirchhoff inversion and the conventional SAFT (Synthetic Aperture Focusing Technique) using the waves from a single ray path. Comparison of the two methods shows that the Kirchhoff inversion works well for experimental data and outperforms SAFT although only an illuminated portion of the flaw boundaries is reconstructed by either method. In order to gain more information on the flaw boundaries, the Kirchhoff inversion which takes into account multiple ray paths is also tested with the same experimental data. As a result, it is shown that a larger part of the flaw boundaries can be visualized by considering the multiple ray paths.

Kimoto, K.; Hirose, S. [Department of Mechanical and Environmental Informatics, Graduate School of Information Science and Engineering, Tokyo Institute of Technology 2-12-1 O-okayama, Meguro-ku, Tokyo 152-8552 (Japan)

2005-04-09T23:59:59.000Z

245

PIA - Radiological Work Permit | Department of Energy  

Energy Savers [EERE]

Work Permit More Documents & Publications PIA - Bonneville Power Adminstration Ethics Helpline Occupational Medical Surveillance System (OMSS) PIA, Idaho National...

246

RPP Environmental Permits and Related Documentation  

SciTech Connect (OSTI)

This document contains the current list of environmental permits and related documentation for TWRS facilities and activities.

DEXTER, M.L.

2000-11-29T23:59:59.000Z

247

GRR/Section 15-ID-b - Air Quality Permit - Tier II Operating Permit | Open  

Open Energy Info (EERE)

GRR/Section 15-ID-b - Air Quality Permit - Tier II Operating Permit GRR/Section 15-ID-b - Air Quality Permit - Tier II Operating Permit < GRR Jump to: navigation, search GRR-logo.png GEOTHERMAL REGULATORY ROADMAP Roadmap Home Roadmap Help List of Sections Section 15-ID-b - Air Quality Permit - Tier II Operating Permit 15IDBAirQualityPermitTierIIOperatingPermit.pdf Click to View Fullscreen Contact Agencies Idaho Department of Environmental Quality Regulations & Policies IDAPA 58.01.01 Triggers None specified Click "Edit With Form" above to add content 15IDBAirQualityPermitTierIIOperatingPermit.pdf Error creating thumbnail: Page number not in range. Error creating thumbnail: Page number not in range. Error creating thumbnail: Page number not in range. Flowchart Narrative Tier II Operating Permits are issued to facilities or stationary sources

248

Siting & Permitting | Open Energy Information  

Open Energy Info (EERE)

Siting & Permitting Siting & Permitting Jump to: navigation, search Siting and permitting policies can facilitate the installation of clean energy systems by specifying the conditions and fees involved in project development. Some local governments have adopted simplified or expedited permitting standards for wind and/or solar projects. ¬ďTop-of-the-stack¬Ē or fast-track permitting saves system owners and project developers time and money. Some states have established maximum fees that local governments may charge for a permit for a solar or wind energy system. In addition, some states have developed (or have supported the development of) model wind ordinances for use by local governments. [1] References ‚ÜĎ DSIRE Glossary Retrieved from "http://en.openei.org/w/index.php?title=Siting_%26_Permitting&oldid=538321"

249

Annual Hanford Site Environmental Permitting status report  

SciTech Connect (OSTI)

The information contained in, and/or referenced in, this Annual Hanford Site Environmental Permitting Status Report addresses Permit Condition II.W (Other Permits and/or Approvals) of the Dangerous Waste Portion of the Resource Conservation and Recovery Act Permit for the Treatment, Storage, and Disposal of Dangerous Waste, issued by the Washington State Department of Ecology (WA7890008967). Condition II.W specifies that the Permittees are responsible for obtaining all other applicable federal, state, and local permits authorizing the development and operation of the Hanford Facility. Condition II.W further specifies that the Permittees are to use their best efforts to obtain such permits. For the purposes of this Permit Condition, ''best efforts'' mean submittal of documentation and/or approval(s) in accordance with schedules specified in applicable regulations, or as determined through negotiations with the applicable regulatory agencies.

SONNICHSEN, J.C.

1999-10-18T23:59:59.000Z

250

GRR/Section 15-ID-a - Air Quality Permit - Permit to Construct | Open  

Open Energy Info (EERE)

15-ID-a - Air Quality Permit - Permit to Construct 15-ID-a - Air Quality Permit - Permit to Construct < GRR Jump to: navigation, search GRR-logo.png GEOTHERMAL REGULATORY ROADMAP Roadmap Home Roadmap Help List of Sections Section 15-ID-a - Air Quality Permit - Permit to Construct 15IDAAirQualityPermitPermitToConstruct (1).pdf Click to View Fullscreen Contact Agencies Idaho Department of Environmental Quality Regulations & Policies IDAPA 58.01.01 Triggers None specified Click "Edit With Form" above to add content 15IDAAirQualityPermitPermitToConstruct (1).pdf Error creating thumbnail: Page number not in range. Error creating thumbnail: Page number not in range. Error creating thumbnail: Page number not in range. Flowchart Narrative The Idaho Department of Environmental Quality (DEQ) requires an air quality

251

GRR/Section 15-CA-b - Air Permit - Operating Permit | Open Energy  

Open Energy Info (EERE)

15-CA-b - Air Permit - Operating Permit 15-CA-b - Air Permit - Operating Permit < GRR Jump to: navigation, search GRR-logo.png GEOTHERMAL REGULATORY ROADMAP Roadmap Home Roadmap Help List of Sections Section 15-CA-b - Air Permit - Operating Permit 15CABAirPermitOperatingPermit.pdf Click to View Fullscreen Contact Agencies California Air Resources Board Regulations & Policies Clean Air Act (42 USC 1857 et seq.) California Air Pollution Control Laws Triggers None specified Click "Edit With Form" above to add content 15CABAirPermitOperatingPermit.pdf Error creating thumbnail: Page number not in range. Error creating thumbnail: Page number not in range. Error creating thumbnail: Page number not in range. Flowchart Narrative A developer operating a facility that emits air pollutants must obtain an

252

Idaho DEQ Air Quality Permits Applicant and DEQ Responsibilities...  

Open Energy Info (EERE)

LibraryAdd to library PermittingRegulatory Guidance - GuideHandbook: Idaho DEQ Air Quality Permits Applicant and DEQ Responsibilities guidebookPermittingRegulatory...

253

Alaska Public Participation in APDES Permitting Process | Open...  

Open Energy Info (EERE)

search OpenEI Reference LibraryAdd to library PermittingRegulatory Guidance - GuideHandbook: Alaska Public Participation in APDES Permitting ProcessPermittingRegulatory...

254

AZPDES Construction General Permit Fact Sheet | Open Energy Informatio...  

Open Energy Info (EERE)

General Permit Fact Sheet Jump to: navigation, search OpenEI Reference LibraryAdd to library PermittingRegulatory Guidance - Instructions: AZPDES Construction General Permit...

255

GRR/Section 15-TX-a - Air Permit - Permit to Construct | Open Energy  

Open Energy Info (EERE)

GRR/Section 15-TX-a - Air Permit - Permit to Construct GRR/Section 15-TX-a - Air Permit - Permit to Construct < GRR Jump to: navigation, search GRR-logo.png GEOTHERMAL REGULATORY ROADMAP Roadmap Home Roadmap Help List of Sections Section 15-TX-a - Air Permit - Permit to Construct 15TXAAirPermitPermitToConstruct (1).pdf Click to View Fullscreen Contact Agencies Texas Commission on Environmental Quality Regulations & Policies Title 30 of the Texas Administrative Code 30 TAC 116.114 30 TAC 39.418 30 TAC 39.604 30 TAC 39.605 30 TAC 39.409 30 TAC 116.136 30 TAC 55.254 30 TAC 116.136 30 TAC 116.137 Triggers None specified Click "Edit With Form" above to add content 15TXAAirPermitPermitToConstruct (1).pdf 15TXAAirPermitPermitToConstruct (1).pdf 15TXAAirPermitPermitToConstruct (1).pdf Error creating thumbnail: Page number not in range.

256

Reference flaw size for structural and fracture analysis of Types 1 and 2 waste tanks  

SciTech Connect (OSTI)

High Level Waste Engineering (HLWE) is reviewing the Technical Standard requirements for tank level and minimum wall temperature. These requirements are necessary to minimize the probability of brittle fracture of the primary liner due to normal operating and/or seismic loads. The review includes the determination of a reference flaw size, a maximum through-wall crack length, which may reasonably be applied to structural and fracture analysis of the Type I and II waste tank primary liners. This memorandum briefly discusses the mechanism of crack initiation and propagation, the inspections of primary wall cracks, and a statistical analysis of the measured crack lengths. Recommendations on additional analyses which may increase the confidence in the reference flaw size will also be presented. The primary liner for Type I and II waste tanks is fabricated from ASTM A285, Grade B carbon steel (A285). The liner received no heat treatments to relieve residual stresses in the heat affected zones. Five Type I waste tanks and all four Type II waste tanks developed through-wall cracks. Leaks developed in tanks 9, 10,14 and 16 within less than two years. Small surface cracks were also observed on the interior of the tank primary. The cracks were perpendicular to the butt welds and extended through the heat affected zone before stopping shortly after penetrating the base metal. The largest leakage of radioactive waste, approximately 185,000 gallons from the primary into the annulus, occurred from Tank 16, a Type II waste tank. During inspections of this tank over 300 leaks were discovered with the longest observed crack being approximately 6 inches. Due to the large number of observed cracks and the amount of leakage, this wag the only tank that was surveyed for crack lengths. For this analysis, Tank 16 will be considered representative of all Type I and II waste tanks because the materials, construction practices, and tank chemistry represented a worst case.

Wiersma, B.J.; Sindelar, R.L.

1994-01-01T23:59:59.000Z

257

SANSMIC Validation.  

SciTech Connect (OSTI)

SANSMIC is solution mining software that was developed and utilized by SNL in its role as geotechnical advisor to the US DOE SPR for planning purposes. Three SANSMIC leach modes - withdrawal, direct, and reverse leach - have been revalidated with multiple test cases for each mode. The withdrawal mode was validated using high quality data from recent leach activity while the direct and reverse modes utilized data from historical cavern completion reports. Withdrawal results compared very well with observed data, including the location and size of shelves due to string breaks with relative leached volume differences ranging from 6 - 10% and relative radius differences from 1.5 - 3%. Profile comparisons for the direct mode were very good with relative leached volume differences ranging from 6 - 12% and relative radius differences from 5 - 7%. First, second, and third reverse configurations were simulated in order to validate SANSMIC over a range of relative hanging string and OBI locations. The first-reverse was simulated reasonably well with relative leached volume differences ranging from 1 - 9% and relative radius differences from 5 - 12%. The second-reverse mode showed the largest discrepancies in leach profile. Leached volume differences ranged from 8 - 12% and relative radius differences from 1 - 10%. In the third-reverse, relative leached volume differences ranged from 10 - 13% and relative radius differences were ~4 %. Comparisons to historical reports were quite good, indicating that SANSMIC is essentially the same as documented and validated in the early 1980's.

Weber, Paula D.; Rudeen, David Keith; Lord, David

2014-08-01T23:59:59.000Z

258

Joint Estimation of NDE Inspection Capability and Flaw-size Distribution for in-service Aircraft Inspections  

E-Print Network [OSTI]

1 Joint Estimation of NDE Inspection Capability and Flaw- size Distribution for in-service Aircraft, Dayton, OH 45469 Abstract: Nondestructive evaluation (NDE) is widely used in the aerospace industry of unknown existing cracks is more difficult. If NDE signal strength is recorded at all inspections

259

Colorado - Access Permit Application File Review Checklist |...  

Open Energy Info (EERE)

Checklist Jump to: navigation, search OpenEI Reference LibraryAdd to library General: Colorado - Access Permit Application File Review Checklist Author Colorado Department of...

260

Catawba County- Green Construction Permitting Incentive Program  

Broader source: Energy.gov [DOE]

Catawba County is providing incentives to encourage the construction of sustainably built homes and commercial buildings. Rebates on permit fees and plan reviews are available for certain...

Note: This page contains sample records for the topic "validation flaw permits" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Montana - Encroachment Permit Application | Open Energy Information  

Open Energy Info (EERE)

General: Montana - Encroachment Permit Application Author Montana Department of Transportation Published Montana Department of Transportation, 2007 DOI Not Provided Check for...

262

Annual Hanford Site environmental permitting status report  

SciTech Connect (OSTI)

This Annual Hanford Site Environmental Permitting Status Report (Status Report) was prepared in response to requirements prescribed in U.S. Department of Energy (DOE) Order 5400.2A, `Environmental Compliance Issue Coordination`. This Order, canceled in April 1996, required that information on existing and anticipated environmental permitting for DOE facilities be submitted (or updated) annually by October 1 of each calendar year. Although the Order was canceled, the need for this Status Report still remains. For example, the Washington State Department of Ecology`s (Ecology) Dangerous Waste Permit Application Requirements (Publication Number 95-402, June 1996), Checklist Section J, calls for current information on existing and anticipated environmental permitting. As specified in the Hanford Facility Dangerous Waste Permit Application, General Information Portion (DOE/RL-91-28), this Status Report serves as the vehicle for meeting this requirement for the Hanford Facility. This Status Report includes information on all existing and anticipated environmental permitting. Environmental permitting required by the Resource Conservation and Recovery Act (RCRA) of 1976, the Hazardous and Solid Waste Amendments (HSWA) of 1984, and non-RCRA permitting (solid waste handling, Clean Air Act Amendments of 1990, Clean Water Act Amendments of 1987, Washington State waste discharge, and onsite sewage system) are addressed. Information on RCRA and non-RCRA permitting is included and is current as of July 31, 1996.

Thompson, S.A.

1996-10-01T23:59:59.000Z

263

Arizona Department of Environmental Quality's Individual Permits...  

Open Energy Info (EERE)

process for an individual AZPDES permit. Author Arizona Department of Environmental Quality Published ADEQ, Date Not Provided DOI Not Provided Check for DOI availability: http:...

264

Arizona Department of Environmental Quality's General Permits...  

Open Energy Info (EERE)

regarding AZPDES general permits. Author Arizona Department of Environmental Quality Published ADEQ, Date Not Provided DOI Not Provided Check for DOI availability: http:...

265

WIPP Hazardous Waste Permit - Approved Modifications  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Modification to Add South Access Road for Transportation of TRU Mixed Waste dated March 17, 2011 Class 1 Permit Modification Notification to Revise TRU-Pact III Management...

266

Permitted Mercury Storage Facility Notifications | Department...  

Broader source: Energy.gov (indexed) [DOE]

Services Waste Management Waste Disposition Long-Term Management and Storage of Elemental Mercury is in the Planning Stages Permitted Mercury Storage Facility...

267

Transmission/Permitting Atlas | Open Energy Information  

Open Energy Info (EERE)

mittingAtlasHeader.png Roadmap Compare States General Transmission Dashboard Permitting Atlas Compare States Arizona California Colorado Idaho Montana Nevada New Mexico Oregon Utah...

268

California Permit Streamlining Act | Open Energy Information  

Open Energy Info (EERE)

Streamlining Act Jump to: navigation, search OpenEI Reference LibraryAdd to library Legal Document- StatuteStatute: California Permit Streamlining ActLegal Abstract California...

269

Industrial Discharge Permits (District of Columbia)  

Broader source: Energy.gov [DOE]

All businesses and government agencies discharging process wastewater to the public sewer system must report their activities to DC Water's Pretreatment Center. Wastewater discharge permits are...

270

Wastewater Construction and Operation Permits (Iowa)  

Broader source: Energy.gov [DOE]

These regulations describe permit requirements for the construction and operation of facilities treating wastewater, and provide separation distances from other water sources.

271

Groundwater Discharge Permit and Registration (New Hampshire)  

Broader source: Energy.gov [DOE]

The Groundwater Discharge Permitting and Registration Program seeks to protect groundwater quality by establishing standards, criteria, and procedures for wastewater discharges. The program...

272

NPDES Permit Program Website | Open Energy Information  

Open Energy Info (EERE)

Program Website Jump to: navigation, search OpenEI Reference LibraryAdd to library Web Site: NPDES Permit Program Website Author Environmental Protection Agency Published Publisher...

273

Hawaii Underground Injection Control Permitting Webpage | Open...  

Open Energy Info (EERE)

Webpage Jump to: navigation, search OpenEI Reference LibraryAdd to library Web Site: Hawaii Underground Injection Control Permitting Webpage Author State of Hawaii Department of...

274

Colorado Air Pollution Control Division - Construction Permits...  

Open Energy Info (EERE)

Jump to: navigation, search OpenEI Reference LibraryAdd to library Web Site: Colorado Air Pollution Control Division - Construction Permits Forms and Air Pollutant Emission...

275

Program for field validation of the synthetic aperture focusing technique for ultrasonic testing (SAFT UT). Quarterly progress report, November 1980-January 1981  

SciTech Connect (OSTI)

The purpose of the project is to validate the usefulness of SAFT UT for industrial nondestructive evaluations (NDE). SAFT UT is an ultrasonic imaging method for accurate measurement of the spatial location and extent of acoustically reflective surfaces (flaws) contained in objects such as structural components and weldments in nuclear power reactor systems. The increased measurement accuracy offered by SAFT, when compared with that provided by measurement methods now in use, will improve the reliability of flaw severity assessments with resultant safety and economic benefits to the nuclear power industry.

Hamlin, D.R.; Jackson, J.L.; Mueller, T.A.

1981-03-01T23:59:59.000Z

276

GRR/Section 7-NV-a - Permit to Construct and Permit to Operate | Open  

Open Energy Info (EERE)

7-NV-a - Permit to Construct and Permit to Operate 7-NV-a - Permit to Construct and Permit to Operate < GRR Jump to: navigation, search GRR-logo.png GEOTHERMAL REGULATORY ROADMAP Roadmap Home Roadmap Help List of Sections Section 7-NV-a - Permit to Construct and Permit to Operate 07NVAPermitToConstructAndPermitToOperate (3).pdf Click to View Fullscreen Contact Agencies Nevada Division of Environmental Protection Triggers None specified Click "Edit With Form" above to add content 07NVAPermitToConstructAndPermitToOperate (3).pdf Error creating thumbnail: Page number not in range. Error creating thumbnail: Page number not in range. Error creating thumbnail: Page number not in range. Flowchart Narrative _ 7-NV-a.1 and 6-NV-a.2 - Has an Environmental Review been Completed for Construction? The developer must make sure to undergo an environmental process before

277

MCA 75-5-401 - Water Quality Permits: Board Rules for Permits...  

Open Energy Info (EERE)

- Water Quality Permits: Board Rules for Permits Jump to: navigation, search OpenEI Reference LibraryAdd to library Legal Document- StatuteStatute: MCA 75-5-401 - Water Quality...

278

Annual Hanford Site environmental permitting status report  

SciTech Connect (OSTI)

The information contained and/or referenced in this Annual Hanford Site Environmental Permitting Status Report (Status Report) addresses the State Environmental Policy Act (SEPA) of 1971 and Condition II.W. of the Resource Conservation and Recovery Act (RCRA) of 1976 Permit, Dangerous Waste Portion (DW Portion). Condition II.W. of the RCRA Permit specifies the Permittees are responsible for all other applicable federal, state, and local permits for the development and operation of the Hanford Facility. Condition II.W. of the RCRA Permit specifies that the Permittees are to use their best efforts to obtain such permits. For the purposes of permit condition, `best efforts` means submittal of documentation and/or approval(s) in accordance with schedules specified in applicable regulations, or as determined through negotiations with the applicable regulatory agencies. This Status Report includes information on all existing and anticipated environmental permitting. Environmental permitting required by RCRA, the Hazardous and Solid Waste Amendments (HSWA) of 1984, and non-RCRA permitting (solid waste handling, Clean Air Act Amendments of 1990, Clean Water Act Amendments of 1987, Washington State waste discharge, and onsite sewage system) is addressed. Information on RCRA and non-RCRA is current as of July 31, 1998. For the purposes of RCRA and the State of Washington Hazardous Waste Management Act of 1976 [as administered through the Dangerous Waste Regulations, Washington Active Code (WAC) 173-303], the Hanford Facility is considered a single facility. As such, the Hanford Facility has been issued one US Environmental Protection Agency (EPA)/State Identification Number (WA7890008967). This EPA/State identification number encompasses over 60 treatment, storage, and/or disposal (TSD) units. The Washington State Department of Ecology (Ecology) has been delegated authority by the EPA to administer the RCRA, including mixed waste authority. The RCRA permitting approach for the Hanford Facility is addressed in the Hanford Federal Facility Agreement and Consent Order (Tri-Party Agreement). Pursuant to the Tri-Party Agreement, a single RCRA permit was issued by Ecology and the EPA to cover the Hanford Facility. The RCRA Permit, through the permit modification process, eventually will incorporate all TSD units.

Sonnichsen, J.C.

1998-09-17T23:59:59.000Z

279

Coordinating Permit Office | OpenEI Community  

Open Energy Info (EERE)

Coordinating Permit Office Coordinating Permit Office Home Kyoung's picture Submitted by Kyoung(155) Contributor 9 July, 2013 - 20:57 GRR 3rd Quarter - Stakeholder Update Meeting Alaska analysis appropriations Categorical Exclusions Coordinating Permit Office Cost Mechanisms Cost Recovery geothermal Hawaii NEPA permitting quarterly meeting White Papers On June 26th, we held the 3rd Quarter GRR Stakeholder Update at the Grand Sierra Resort in Reno, NV. The meeting was well-attended with over 40 attendees, including in-person and webinar attendance. Thanks to all who attended! Files: application/pdf icon Presentation: 3rd Quarterly Stakeholder Update Meeting application/vnd.openxmlformats-officedocument.presentationml.presentation icon Mock-up: GRR Permitting Wizard Interface Kyoung's picture Submitted by Kyoung(155)

280

Operating Permits (New Jersey) | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Operating Permits (New Jersey) Operating Permits (New Jersey) Operating Permits (New Jersey) < Back Eligibility Utility Fed. Government Commercial Agricultural Investor-Owned Utility State/Provincial Govt Industrial Construction Municipal/Public Utility Local Government Residential Installer/Contractor Rural Electric Cooperative Tribal Government Low-Income Residential Schools Retail Supplier Institutional Multi-Family Residential Systems Integrator Fuel Distributor Nonprofit General Public/Consumer Transportation Program Info State New Jersey Program Type Siting and Permitting Provider Department of Environmental Protection The owner or operator of a facility subject to this article shall obtain and maintain an operating permit for the facility. The owner or operator of a facility subject to this article shall ensure that no person shall use or

Note: This page contains sample records for the topic "validation flaw permits" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

HQ Work Control Permit | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

HQ Work Control Permit HQ Work Control Permit HQ Work Control Permit To ensure safe operations when undertaking work at DOE Headquarters, the Office of Headquarters Health and Safety has developed a Work Permit document (doc) to help ensure the safety of all workers and headquarters employees. The form should be completed and brought to the Office of Headquarters Safety, Health and Security office at GE-112 at the Forrestal facility, or the Germantown Building Manager's office at E-076 for review and sign off. Any questions can be directed to the HQ Health and Safety office on (202) 586-1005. HQ_Work_Control_Permit.docx More Documents & Publications Preliminary Notice of Violation, Petsco and Son, Inc - EA-96-06 OSS 19.10 Barriers and Postings 5/26/95 OSS 19.3 Confined Space Entry 5/23/95

282

Solar Construction Permitting Standards | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Standards Standards Solar Construction Permitting Standards < Back Eligibility Agricultural Commercial General Public/Consumer Industrial Local Government Nonprofit Residential Savings Category Solar Buying & Making Electricity Heating & Cooling Water Heating Program Info State Colorado Program Type Solar/Wind Permitting Standards Provider Colorado Energy Office Owners of solar photovoltaic (PV) systems and solar water heating systems in Colorado are required to obtain a building permit before their systems may be installed. Permits are handled at the local level and awarded by counties and municipalities. Traditionally, counties and municipalities have been free to assign their own fees for a permit. These fees can vary broadly in size across jurisdictions and in some cases, can be large enough

283

HQ Work Control Permit | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

HQ Work Control Permit HQ Work Control Permit HQ Work Control Permit To ensure safe operations when undertaking work at DOE Headquarters, the Office of Headquarters Health and Safety has developed a Work Permit document (doc) to help ensure the safety of all workers and headquarters employees. The form should be completed and brought to the Office of Headquarters Safety, Health and Security office at GE-112 at the Forrestal facility, or the Germantown Building Manager's office at E-076 for review and sign off. Any questions can be directed to the HQ Health and Safety office on (202) 586-1005. HQ_Work_Control_Permit.docx More Documents & Publications Preliminary Notice of Violation, Petsco and Son, Inc - EA-96-06 OSS 19.3 Confined Space Entry 5/23/95 WA_02_026_UNITED_TECHNOLOGIES_Waiver_of_Domestic_and_Foreign

284

Wind Project Permitting | Open Energy Information  

Open Energy Info (EERE)

Project Permitting Project Permitting Jump to: navigation, search Invenergy is the developer of the 129-MW Forward Wind Energy Center project near Fond du Lac, Wisconsin, that came online in 2008. Photo by Ruth Baranowski, NREL 16412 As with other energy facility permitting processes, the goal of the wind project permitting process is to reach decisions that are timely, minimize challenges, and ensure compliance with laws and regulations that provide for necessary environmental protection.[1] Resources National Wind Coordinating Committee. (2002). Permitting of Wind Energy Facilities. Accessed August 28, 2013. This handbook is written for individuals and groups involved in evaluating wind projects: decision-makers and agency staff at all levels of government, wind developers, interested parties and the public.

285

THE CHOICE OF OPTIMAL STRUCTURE OF ARTIFICIAL NEURAL NETWORK CLASSIFIER INTENDED FOR CLASSIFICATION OF WELDING FLAWS  

SciTech Connect (OSTI)

Nondestructive testing and evaluation are under continuous development. Currently researches are concentrated on three main topics: advancement of existing methods, introduction of novel methods and development of artificial intelligent systems for automatic defect recognition (ADR). Automatic defect classification algorithm comprises of two main tasks: creating a defect database and preparing a defect classifier. Here, the database was built using defect features that describe all geometrical and texture properties of the defect. Almost twenty carefully selected features calculated for flaws extracted from real radiograms were used. The radiograms were obtained from shipbuilding industry and they were verified by qualified operator. Two weld defect's classifiers based on artificial neural networks were proposed and compared. First model consisted of one neural network model, where each output neuron corresponded to different defect group. The second model contained five neural networks. Each neural network had one neuron on output and was responsible for detection of defects from one group. In order to evaluate the effectiveness of the neural networks classifiers, the mean square errors were calculated for test radiograms and compared.

Sikora, R.; Chady, T.; Baniukiewicz, P.; Caryk, M.; Piekarczyk, B. [West Pomeranian University of Technology in Szczecin, Department of Electrical Engineering, 70-313 Szczecin (Poland)

2010-02-22T23:59:59.000Z

286

Non-destructive evaluation means and method of flaw reconstruction utilizing an ultrasonic multi-viewing transducer data acquistion system  

DOE Patents [OSTI]

A multi-viewing ultrasound transducer acquisition system for non-destructive evaluation, flaw detection and flaw reconstruction in materials. A multiple transducer assembly includes a central transducer surrounded by a plurality of perimeter transducers, each perimeter transducer having an axis of transmission which can be angularly oriented with respect to the axis of transmission of the central transducer to intersect the axis of transmission of the central transducer. A control apparatus automatically and remotely positions the transducer assembly with respect to the material by a positioning apparatus and adjusts the pe GRANT REFERENCE This invention was conceived and reduced to practice at least in part under a grant from the Department of Energy under Contract No. W-7407-ENG-82.

Thompson, Donald O. (Ames, IA); Wormley, Samuel J. (Ames, IA)

1989-03-28T23:59:59.000Z

287

Automated Flaw Detection Scheme For Cast Austenitic Stainless Steel Weld Specimens Using Hilbert Huang Transform Of Ultrasonic Phased Array Data  

SciTech Connect (OSTI)

The objective of this work is to develop processing algorithms to detect and localize the flaws using NDE ultrasonic data. Data was collected using cast austenitic stainless steel (CASS) weld specimens on-loan from the U.S. nuclear power industryís Pressurized Water Reactor Owners Group (PWROG) specimen set. Each specimen consists of a centrifugally cast stainless steel (CCSS) pipe section welded to a statically cast (SCSS) or wrought (WRSS) section. The paper presents a novel automated flaw detection and localization scheme using low frequency ultrasonic phased array inspection signals in the weld and heat affected zone of the base materials. The major steps of the overall scheme are preprocessing and region of interest (ROI) detection followed by the Hilbert Huang transform (HHT) of A-scans in the detected ROIs. HHT offers time-frequency-energy distribution for each ROI. The accumulation of energy in a particular frequency band is used as a classification feature for the particular ROI.

Khan, T.; Majumdar, Shantanu; Udpa, L.; Ramuhalli, Pradeep; Crawford, Susan L.; Diaz, Aaron A.; Anderson, Michael T.

2012-01-01T23:59:59.000Z

288

Program for field validation of the Synthetic Aperture Focusing Technique for Ultrasonic Testing (SAFT UT). Final report  

SciTech Connect (OSTI)

This final report describes work performed by Southwest Research Institute for the Nuclear Regulatory Commission (NRC) in fulfillment of NRC Contract No. NRC-04-77-145: ''Program for Field Validation of the Synthetic Aperture Focusing Technique for Ultrasonic Testing (SAFT UT).'' The purpose of the project was to validate the effectiveness of SAFT UT as a nondestructive examination technique for nuclear power and other related industries. SAFT UT is an ultrasonic imaging method for accurate measurement of the spatial location and extent of acoustically reflective surfaces (flaws) contained in objects such as structural components and weldments in nuclear power reactor systems. The increased measurement accuracy offered by SAFT, when compared with that provided by measurement methods now in use, will improve the reliability of flaw severity assessment with resultant safety and economic benefits to the nuclear power industry. This report presents a comprehensive discussion of the work accomplished in evaluating the performance capabilities of the developed SAFT UT inspection system. Inspection results obtained using both 0-degree longitudinal and angle-beam operating modes are presented. These results include laboratory and nuclear power plant field site examinations on a variety of defect types contained within carbon and stainless steel flat plate and cylindrical test specimens or components. The SAFT UT processed data flaw images are evaluated by comparing them to results obtained from destructive sectioning or by using flaw fabrication data which predicted actual flaw depth, orientation and size. On the basis of these evaluations, conclusions are presented which summarize the performance capabilities of the SAFT UT inspection technique. 116 figs.

Hamlin, D.R.

1985-11-01T23:59:59.000Z

289

Technical basis for flawed cylinder test specification to assure adequate fracture resistance of ISO high strength steel cylinder  

SciTech Connect (OSTI)

High pressure industrial gases (such as oxygen, nitrogen, argon, hydrogen, etc.) are stored and transported in portable cylinders. ISO TC58 SC3 has developed a draft specification 9809 for design and fabrication of high pressure cylinders with maximum tensile strength limitation of 1,100 N/mm{sup 2}. In order to extend the ISO 9809 rules for higher than 1,100 N/mm{sup 2} strength level cylinders, a working group WG14 was formed in 1989 to develop new rules to assure adequate fracture resistance. In 1994, WG14 recommended a simple, but unique flawed cylinder test method for design qualification of the cylinder and acceptance criteria to assure adequate fracture resistance. WG14 also recommended Charpy-V-Notch impact tests to control the required fracture resistance on production cylinders. This paper presents the technical basis that was employed in developing the flawed cylinder test method and acceptance criteria. The specification was developed for seamless steel cylinders having actual strength in the range of 1,100 to 1,400 N/mm{sup 2} and cylindrical section wall thickness in the range of 3mm to 10mm. Flawed cylinder tests were conducted on several hundred cylinders of varying sizes and strength levels. The specification requires to demonstrate LEAK-BEFORE-BREAK performance of the cylinder having flaw length equal to 1.6(O.D. {times} t{sub design}){sup 0.5} at failure pressure = (t{sub design}/t{sub actual}) {times} Design Pressure.

Rana, M.D. [Praxair, Inc., Tonawanda, NY (United States). Process and Systems R and D; Smith, J.H. [National Inst. of Standards and Technology, Gaithersburg, MD (United States). Metallurgy Div.; Tribolet, R.O.

1996-12-01T23:59:59.000Z

290

Technical basis for flawed cylinder test specification to assure adequate fracture resistance of ISO high-strength steel cylinder  

SciTech Connect (OSTI)

High-pressure industrial gases (such as oxygen, nitrogen, argon, hydrogen, etc.) are stored and transported in portable cylinders. ISO TC58 SC3 has developed a draft specification 9809 for design and fabrication of high-pressure cylinders with maximum tensile strength limitation of 1,100 N/mm{sup 2}. In order to extend the ISO 9809 rules for higher than 1,100 N/mm{sup 2} strength level cylinders, a working group WG14 was formed in 1989 to develop new rules to assure adequate fracture resistance. In 1994, WG14 recommended a simple, but unique flawed cylinder test method for design qualification of the cylinder and acceptance criteria to assure adequate fracture resistance. WG14 also recommended Charpy-V-notch impact tests to control the required fracture resistance on production cylinders. This paper presents the technical basis that was employed in developing the flawed cylinder test method and acceptance criteria. The specification was developed for seamless steel cylinders having actual strength in the range of 1,100 to 1,400 N/mm{sup 2} and cylindrical section wall thickness in the range of 3 to 10 mm. Flawed cylinder tests were conducted on several hundred cylinders of varying sizes and strength levels. The specification requires to demonstrate LEAK-BEFORE-BREAK performance of the cylinder having flaw length equal to 1.6 (o.d. {times} t{sub design}){sup 0.5} at failure pressure = (t{sub design}/t{sub actual}) x Design Pressure.

Rana, M.D. [Praxair, Inc., Tonawanda, NY (United States); Smith, J.H. [National Inst. of Standards and Technology, Gaithersburg, MD (United States). Metallurgy Div.; Tribolet, R.O. [Tribolet (R.O.), Van Wert, OH (United States)

1997-11-01T23:59:59.000Z

291

Dilatation-strain analysis of the effects of flaws on the mechanical behavior of a highly filled elastomer  

E-Print Network [OSTI]

DILATATION-STRAIN ANALYSIS OF THE EFFECTS OF FLANS ON THE MECHANICAL BEHAVIOR OF A HIGHLY FILLED ELASTOMER A Thesis By BENJAMIN RAY SMITH Submitted to the Graduate College of the Texas A&M University in partial fulfillment... of the requirements for the degree of MASTER OF SCIENCE August 1966 Major Subject. 'Aerospace Engineering DILATATION-STRAIN ANALYSIS OF THE EFFECTS OF FLAWS ON THE MECHANICAL BEHAVIOR OF A HIGHLY FILLED ELASTOMER A Thesis By BENJAMIN RAY SMITH Approved...

Smith, Benjamin Ray

2012-06-07T23:59:59.000Z

292

State Surface Water Discharge Permits (New Hampshire)  

Broader source: Energy.gov [DOE]

Rules apply to the discharge of all pollutants from a point source to surface waters of the state. The rule does not apply to facilities that require both a state discharge permit and a federal...

293

Regulations and Permits Related to Dams (Vermont)  

Broader source: Energy.gov [DOE]

Vermont law requires a permit, or a dam order, for the construction, alteration, or removal of dams impounding more than 500,000 cubic feet of water, including any accumulated sediments. Dam...

294

Reclamation permit application handbook. Final technical report  

SciTech Connect (OSTI)

The objective of this handbook is to provide Appalachian surface coal mine operators with an explanation of the Office of Surface Mining's (OSM) permanent regulatory program permit application requirements. The format of the handbook is designed to give the reader an understanding of how the permit application regulations were developed, the number of subjects the application must cover, the work entailed in satisfying the permit requirements, and sources of information for more technical studies. Preparation of the handbook involved reviewing the OSM regulations and devising a hypothetical permit, incorporating information required by all the sections of the regulations. The outlines and drafts of the handbook were reviewed by mine operators, OSM, and State agencies for completeness, and to ensure that the maximum benefit would be derived by using such a handbook.

Myers, L.L.; Calvert, R.P.

1981-06-01T23:59:59.000Z

295

Environmental Permit Application Background Statement (Delaware)  

Broader source: Energy.gov [DOE]

The purpose of Chapter 79 of Delaware Title 7 is to ensure that the State has adequate information about the background of applicants or regulated parties for the purposes of processing permits and...

296

Disclosure of Permitted Communication Concerning Fossil Fuel...  

Energy Savers [EERE]

Fossil Fuel Energy Consumption Reduction for New Construction and Major Renovations of Federal Buildings -- Docket No. EERE-2010-BT-STD-0031; RIN 1904-AB96 Disclosure of Permitted...

297

Disclosure of Permitted Communication Concerning Regional Standards  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Disclosure of Permitted Communication Concerning Regional Standards Disclosure of Permitted Communication Concerning Regional Standards Enforcement Framework Document -- Docket No. EERE-2011-BT-CE-0077 Disclosure of Permitted Communication Concerning Regional Standards Enforcement Framework Document -- Docket No. EERE-2011-BT-CE-0077 This memo provides an overview of communications made to DOE staff on the subject of a policy for providing waivers from new regional furnace efficiency standards. memo_furnace_std_waiver_policy.pdf More Documents & Publications Disclosure of Permitted Communication Concerning Fossil Fuel Energy Consumption Reduction for New Construction and Major Renovations of Federal Buildings -- Docket No. EERE-2010-BT-STD-0031; RIN 1904-AB96 Record of Communication Concerning Ceiling Fan and Ceiling Fan Light Kit

298

Distributed PV Permitting and Inspection Processes  

Broader source: Energy.gov [DOE]

This presentation summarizes case studies of the time and cost involved in the distributed PV permitting and inspection process in three Solar America Cities, Austin, Portland, and Salt Lake City.

299

Major Source Permits (District of Columbia) | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Major Source Permits (District of Columbia) Major Source Permits (District of Columbia) Major Source Permits (District of Columbia) < Back Eligibility Utility Commercial Industrial Program Info State District of Columbia Program Type Environmental Regulations Provider District Department of the Environment The District reviews designs for new pollution sources and design modifications for existing sources. Permits are issued to allow sources to emit limited and specified amounts of pollution as allowed by air quality laws and regulations. Major sources include power plants, heating plants, and large printing facilities. Three types of permits are issued: pre-construction review permits; new source review permits; and operating permits. These permits include conditions intended to minimize emissions of

300

SAFT imaging of flaws in the rail base blade with consideration of multiple reflections of an ultrasonic pulse from the boundaries of a test object  

Science Journals Connector (OSTI)

The possibility of obtaining images of type-69 flaws in blades of the railroad rail base is considered. For this purpose, a modification of the SAFT algorithm is proposed, in which, during...

E. G. Bazulin

2010-02-01T23:59:59.000Z

Note: This page contains sample records for the topic "validation flaw permits" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Reconstruction of flaw images by the C-SAFT method from echo signals measured by an antenna array in the triple-scanning mode  

Science Journals Connector (OSTI)

The application of antenna matrices (AMs) for obtaining flaw images during automated nondestructive ultrasonic testing is considered. The conventional technique of using an AM as a phased AM (PAM) has a number...

E. G. Bazulin

2012-01-01T23:59:59.000Z

302

Has operating permitting really changed with Title V? Reflecting on the Title V operating permit program  

SciTech Connect (OSTI)

Now that some state regulatory agencies are reviewing Title V permit applications and issuing permits, evaluation of the process can be made in comparison with the original goals of the Title V permitting program. In addition, assessment of the terms and conditions that are being incorporated into permits, the nature of draft permits that are issued to facilities for comment, and the extent and type of negotiation that have been conducted with agencies to develop successful Title V permits, will be helpful for facilities that are currently undergoing application review. In working with a Fortune 500 surface coating company, fourteen Title V permit applications were developed and submitted for plants located in Maryland, Pennsylvania, Ohio, New Jersey, Illinois, Georgia, West Virginia, Wisconsin, Indiana and southern California. Draft permits have been issued for several of the plants, and differences in the terms and conditions, testing requirements, and permit format and structure have been noted between states. One of the issued permits required modification, and the process was one of the first for this state agency.

Goldstein, D.R.; Cressman, A.W.

1999-07-01T23:59:59.000Z

303

State Waste Discharge Permit ST-4502 Implementation Plan  

SciTech Connect (OSTI)

Plan has been developed to demonstrate compliance with regulatory requirements set forth in Permit ST-3502 and as a line management tool for use in maintaining configuration control of permit as well as documentation used to implement permit requirements.

BROWN, M.J.; LECLAIR, M.D.

2000-09-27T23:59:59.000Z

304

EPA Region 6 NPDES General Permits | Open Energy Information  

Open Energy Info (EERE)

NPDES General Permits Jump to: navigation, search OpenEI Reference LibraryAdd to library Web Site: EPA Region 6 NPDES General Permits Abstract Access to NPDES General Permits for...

305

Introduction to Coast Guard Bridge Permitting | Open Energy Informatio...  

Open Energy Info (EERE)

search OpenEI Reference LibraryAdd to library PermittingRegulatory Guidance - GuideHandbook: Introduction to Coast Guard Bridge PermittingPermittingRegulatory GuidanceGuide...

306

EPA - Construction General Permit Fact Sheet | Open Energy Information  

Open Energy Info (EERE)

search OpenEI Reference LibraryAdd to library PermittingRegulatory Guidance - GuideHandbook: EPA - Construction General Permit Fact SheetPermittingRegulatory GuidanceGuide...

307

ARM 12-14-150 - Commercial Use Permitting: Restricted Use Permitting...  

Open Energy Info (EERE)

use permits for land use within the jurisdiction of the Montana Department of Fish, Wildlife and Parks. Published NA Year Signed or Took Effect 2009 Legal Citation ARM...

308

ARM 12-14-145 - Commercial Use Permitting: Restricted Use Permit...  

Open Energy Info (EERE)

use permits for land use within the jurisdiction of the Montana Department of Fish, Wildlife and Parks. Published NA Year Signed or Took Effect 2007 Legal Citation ARM...

309

Integrated Title V/acid rain permits: Transitioning through initial permit issuance and reopenings  

SciTech Connect (OSTI)

Titles IV and V of the Clean Air Act Amendments of 1990 (Act or CAA) created two new stationary source permitting programs, one specific to acid rain (Title IV), and a second for operating permits in general (Title V). The Phase 2 portion of the acid rain program was designed to be implemented through the Title V operating permit program, thereby subjecting all Phase 2 acid rain sources to the requirements of Title V. Permits issued pursuant to Phase 2 of the acid rain program will be viewed as a self-contained portion of the Title V operating permit and will be governed by regulations promulgated under both Title IV and Title V. The requirements imposed by Title IV may not always be consistent with the broader operating permit program requirements of Title V, and when inconsistency occurs, the acid rain requirements will take precedence. This nonalignment will perhaps be most apparent during two stages of initial permitting: (1) the transition period following Title V program approval when permit application, issuance, and effective dates differ between the two programs, and (2) at the point when acid rain permits must be reopened to incorporate Phase 2 NO{sub x} requirements. This paper explores strategies for streamlining implementation of the two programs with particular focus on these two coordination issues.

Bloomfield, C. [Environmental Protection Agency, San Francisco, CA (United States)

1995-12-31T23:59:59.000Z

310

DEVELOPMENT AND APPLICATION OF MATERIALS PROPERTIES FOR FLAW STABILITY ANALYSIS IN EXTREME ENVIRONMENT SERVICE  

SciTech Connect (OSTI)

Discovery of aging phenomena in the materials of a structure may arise after its design and construction that impact its structural integrity. This condition can be addressed through a demonstration of integrity with the material-specific degraded conditions. Two case studies of development of fracture and crack growth property data, and their application in development of in-service inspection programs for nuclear structures in the defense complex are presented. The first case study covers the development of fracture toughness properties in the form of J-R curves for rolled plate Type 304 stainless steel with Type 308 stainless steel filler in the application to demonstrate the integrity of the reactor tanks of the heavy water production reactors at the Savannah River Site. The fracture properties for the base, weld, and heat-affected zone of the weldments irradiated at low temperatures (110-150 C) up to 6.4 dpa{sub NRT} and 275 appm helium were developed. An expert group provided consensus for application of the irradiated properties for material input to acceptance criteria for ultrasonic examination of the reactor tanks. Dr. Spencer H. Bush played a lead advisory role in this work. The second case study covers the development of fracture toughness for A285 carbon steel in high level radioactive waste tanks. The approach in this case study incorporated a statistical experimental design for material testing to address metallurgical factors important to fracture toughness. Tolerance intervals were constructed to identify the lower bound fracture toughness for material input to flaw disposition through acceptance by analysis.

Sindelar, R; Ps Lam, P; Andrew Duncan, A; Bruce Wiersma, B; Karthik Subramanian, K; James Elder, J

2007-04-18T23:59:59.000Z

311

Page not found | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

71 - 28580 of 31,917 results. 71 - 28580 of 31,917 results. Article T-701: Citrix Access Gateway Enterprise Edition Input Validation Flaw in Logon Portal Permits Cross-Site Scripting Attacks Citrix Access Gateway Enterprise Edition Input Validation Flaw in Logon Portal Permits Cross-Site Scripting Attacks. http://energy.gov/cio/articles/t-701-citrix-access-gateway-enterprise-edition-input-validation-flaw-logon-portal Article T-650: Microsoft Word Unspecified Flaw Lets Remote Users Execute Arbitrary Code Microsoft Word Unspecified Flaw Lets Remote Users Execute Arbitrary Code. http://energy.gov/cio/articles/t-650-microsoft-word-unspecified-flaw-lets-remote-users-execute-arbitrary-code Article IRS Announces New Tribal Economic Development Bond Allocation Guidance Treasury and the IRS published new guidance today allocating Tribal

312

Utah Underground Storage Tank Installation Permit | Open Energy...  

Open Energy Info (EERE)

Underground Storage Tank Installation Permit Jump to: navigation, search OpenEI Reference LibraryAdd to library Form: Utah Underground Storage Tank Installation Permit Form Type...

313

Alaska Special Area Permit Application | Open Energy Information  

Open Energy Info (EERE)

Form: Alaska Special Area Permit Application Form Type ApplicationNotice Form Topic Fish and Game Special Area Permit Application Organization Alaska Department of Fish and...

314

Alaska Fish Habitat Permit Application | Open Energy Information  

Open Energy Info (EERE)

Form: Alaska Fish Habitat Permit Application Form Type ApplicationNotice Form Topic Fish Habitat Permit Organization Alaska Department of Fish and Game Published Publisher Not...

315

Arizona State Land Department Applications and Permits Website...  

Open Energy Info (EERE)

Permits Website Jump to: navigation, search OpenEI Reference LibraryAdd to library Web Site: Arizona State Land Department Applications and Permits Website Abstract This website...

316

BLM - Paleontological Resource Use Permits webpage | Open Energy...  

Open Energy Info (EERE)

Use Permits webpage Jump to: navigation, search OpenEI Reference LibraryAdd to library Web Site: BLM - Paleontological Resource Use Permits webpage Abstract This webpage provides...

317

Idaho DEQ Waste Management and Permitting Webpage | Open Energy...  

Open Energy Info (EERE)

Permitting Webpage Jump to: navigation, search OpenEI Reference LibraryAdd to library Web Site: Idaho DEQ Waste Management and Permitting Webpage Abstract This webpage provides...

318

Application for presidential permit OE Docket No. PP-234 Baja...  

Broader source: Energy.gov (indexed) [DOE]

presidential permit OE Docket No. PP-234 Baja California Power, Inc Application for presidential permit OE Docket No. PP-234 Baja California Power, Inc Application from Baja...

319

Air Quality Approvals and Permits (New Brunswick, Canada) | Department...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Approvals and Permits (New Brunswick, Canada) Air Quality Approvals and Permits (New Brunswick, Canada) < Back Eligibility Commercial Construction Developer Industrial Installer...

320

Fact Sheet - Air Quality Permitting | Open Energy Information  

Open Energy Info (EERE)

Air Quality Permitting Jump to: navigation, search OpenEI Reference LibraryAdd to library PermittingRegulatory Guidance - GuideHandbook: Fact Sheet - Air Quality...

Note: This page contains sample records for the topic "validation flaw permits" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

RAPID/Best Practices/Coordinating Permit Offices | Open Energy...  

Open Energy Info (EERE)

accept the permit plan until the environmental review process is complete. DBEDT will conduct agency outreach and coordination to discuss federal, state, and county permits...

322

Hydrogen Codes and Standards and Permitting | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Codes and Standards and Permitting Hydrogen Codes and Standards and Permitting 2009 DOE Hydrogen Program and Vehicle Technologies Program Annual Merit Review and Peer Evaluation...

323

WSDE Report: Wastewater Discharge Permits in Washington State...  

Open Energy Info (EERE)

Wastewater Discharge Permits in Washington State Jump to: navigation, search OpenEI Reference LibraryAdd to library Report: WSDE Report: Wastewater Discharge Permits in Washington...

324

Request for Information on Permitting of Transmission Lines:...  

Broader source: Energy.gov (indexed) [DOE]

Request for Information on Permitting of Transmission Lines: Federal Register Notice Volume 77, No. 38 - Feb. 27, 2012 Request for Information on Permitting of Transmission Lines:...

325

Guide to Permitting Electric Transmission Lines in Wyoming |...  

Open Energy Info (EERE)

Permitting Electric Transmission Lines in Wyoming Jump to: navigation, search OpenEI Reference LibraryAdd to library PermittingRegulatory Guidance - GuideHandbook: Guide to...

326

EPA - Permit Compliance System webpage | Open Energy Information  

Open Energy Info (EERE)

System webpage Jump to: navigation, search OpenEI Reference LibraryAdd to library Web Site: EPA - Permit Compliance System webpage Abstract This webpage contains EPA's Permit...

327

Construction and Minor Permit Applications | Open Energy Information  

Open Energy Info (EERE)

Permit Applications Jump to: navigation, search OpenEI Reference LibraryAdd to library Web Site: Construction and Minor Permit Applications Author Division of Air Quality...

328

New Mexico Archaeological Permits Webpage | Open Energy Information  

Open Energy Info (EERE)

Permits Webpage Jump to: navigation, search OpenEI Reference LibraryAdd to library Web Site: New Mexico Archaeological Permits Webpage Abstract Provides information about...

329

EPA - Section 404 Dredge and Fill Permitting webpage | Open Energy...  

Open Energy Info (EERE)

Permitting webpage Jump to: navigation, search OpenEI Reference LibraryAdd to library Web Site: EPA - Section 404 Dredge and Fill Permitting webpage Abstract This webpage...

330

Hawaii Permit Application for Solid Waste Management Facility...  

Open Energy Info (EERE)

to receive a permit for a solid waste management facility. Form Type CertificateForm of Completion Form Topic Permit Application for Solid Waste Management Facility Organization...

331

Hawaii Clean Energy Initiative - Transmission Line Approval Permit...  

Open Energy Info (EERE)

Hawaii Clean Energy Initiative - Transmission Line Approval Permit Packet Jump to: navigation, search OpenEI Reference LibraryAdd to library PermittingRegulatory Guidance -...

332

Guide to Colorado Well Permits, Water Rights, and Water Administration...  

Open Energy Info (EERE)

Colorado Well Permits, Water Rights, and Water Administration Jump to: navigation, search OpenEI Reference LibraryAdd to library PermittingRegulatory Guidance - GuideHandbook:...

333

Westinghouse and Fuzhou Permitted to Restart Distribution of...  

Broader source: Energy.gov (indexed) [DOE]

Westinghouse and Fuzhou Permitted to Restart Distribution of Light Bulb Products Westinghouse and Fuzhou Permitted to Restart Distribution of Light Bulb Products August 6, 2010 -...

334

Property:ExplorationPermit-Drilling | Open Energy Information  

Open Energy Info (EERE)

without first obtaining a permit issued under the authority of the State Department of Geology and Mineral Industries and without complying with the conditions of such permit....

335

AUTHORIZATION FOR PAYROLL DEDUCTION 2012-2013 PARKING PERMIT  

E-Print Network [OSTI]

________________________________________________ DATE______________________________ $267.00 (ONE PERMIT) $66.00 (MOTORCYCLE PERMIT) $267.00 (TOTAL MONTH____________ OPTION FOR MOTORCYCLE DEDUCTION--1 MONTH______________ PLEASE INCLUDE YOUR CAMPUS

Escher, Christine

336

Hanford facility dangerous waste permit application  

SciTech Connect (OSTI)

This document, Set 2, the Hanford Facility Dangerous Waste Part B Permit Application, consists of 15 chapters that address the content of the Part B checklists prepared by the Washington State Department of Ecology (Ecology 1987) and the US Environmental Protection Agency (40 CFR 270), with additional information requirements mandated by the Hazardous and Solid Waste Amendments of 1984 and revisions of WAC 173-303. For ease of reference, the Washington State Department of Ecology checklist section numbers, in brackets, follow the chapter headings and subheadings. This permit application contains umbrella- type'' documentation with overall application to the Hanford Facility. This documentation is broad in nature and applies to all TSD units that have final status under the Hanford Facility Permit.

none,

1991-09-18T23:59:59.000Z

337

Underground Injection Control Permits and Registrations (Texas) |  

Broader source: Energy.gov (indexed) [DOE]

You are here You are here Home ¬Ľ Underground Injection Control Permits and Registrations (Texas) Underground Injection Control Permits and Registrations (Texas) < Back Eligibility Utility Agricultural Investor-Owned Utility State/Provincial Govt Industrial Construction Municipal/Public Utility Local Government Installer/Contractor Rural Electric Cooperative Fuel Distributor Savings Category Buying & Making Electricity Program Info State Texas Program Type Environmental Regulations Safety and Operational Guidelines Provider Texas Commission on Environmental Quality Chapter 27 of the Texas Water Code (the Injection Well Act) defines an "injection well" as "an artificial excavation or opening in the ground made by digging, boring, drilling, jetting, driving, or some other

338

WIPP Hazardous Waste Facility Permit Update  

SciTech Connect (OSTI)

The Waste Isolation Pilot Plant (WIPP) Hazardous Waste Facility Permit (HWFP) was issued on October 27, 1999 [1]. Since that time, the WIPP has sought modifications to clarify the permit language, provide alternative methods for meeting permit requirements and to update permit conditions. Significant advancements have been made in transuranic (TRU) waste management as the result of modifications to the HWFP. Among these advancements is a modification to obtain a drum age criteria (DAC) value to perform headspace gas sampling on drums to be super-compacted and placed in a 100-gallon overpack drum. In addition, the Section 311 permit modification request that would allow for more efficient waste characterization, and the modification to authorize the shipment and disposal of Remote-Handled (RH) TRU waste were merged together and submitted to the regulator as the Consolidated Permit Modification Request (PMR). The submittal of the Consolidated PMR came at the request of the regulator as part of responses to Notices of Deficiency (NODs) for the separate PMRs which had been submitted in previous years. Section 311 of the fiscal year 2004 Energy and Water Developments Appropriations Act (Public Law 108-137) [2] directs the Department of Energy to submit a permit modification that limits waste confirmation to radiography or visual examination of a statistical subpopulation of containers. Section 311 also specifically directs that disposal room performance standards be to be met by monitoring for volatile organic compounds in the underground disposal rooms. This statute translates into the elimination of other waste confirmation methods such as headspace gas sampling and analysis and solids sampling and analysis. These methods, as appropriate, will continue to be used by the generator sites during hazardous waste determinations or characterization activities. This modification is expected to reduce the overall cost of waste analysis by hundreds of millions of dollars [3]. Combining both the chap. 311 and RH TRU waste permit modification requests allows for both the regulator and DOE to expedite action on the modification requests. The Combined PMR reduces costs by having only one administrative process for both modification requests. (authors)

Kehrman, B.; Most, W. [Washington Regulatory and Environmental Services, 4021 National Parks Highway, Carlsbad, NM 88220 (United States)

2006-07-01T23:59:59.000Z

339

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

August 29, 2011 August 29, 2011 T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password RSA enVision lets remote users view files and remote authenticated users obtain password. August 25, 2011 T-701: Citrix Access Gateway Enterprise Edition Input Validation Flaw in Logon Portal Permits Cross-Site Scripting Attacks Citrix Access Gateway Enterprise Edition Input Validation Flaw in Logon Portal Permits Cross-Site Scripting Attacks. August 22, 2011 T-698: Adobe ColdFusion Input Validation Flaw in 'probe.cfm' Permits Cross-Site Scripting Attacks Adobe ColdFusion Input Validation Flaw in 'probe.cfm' Permits Cross-Site Scripting Attacks. August 17, 2011 T-695: Avaya Aura Application Server Buffer Overflow in 'cstore.exe' Lets Remote Users Execute Arbitrary Code

340

V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site...  

Broader source: Energy.gov (indexed) [DOE]

U-255: Apache Wicket Input Validation Flaw Permits Cross-Site Scripting Attacks U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting...

Note: This page contains sample records for the topic "validation flaw permits" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Permitting of Wind Energy Facilities: A Handbook  

SciTech Connect (OSTI)

This handbook has been written for individuals and groups involved in evaluating wind projects: decision-makers and agency staff at all levels of government, wind developers, interested parties and the public. Its purpose is to help stakeholders make permitting wind facility decisions in a manner which assures necessary environmental protection and responds to public needs.

NWCC Siting Work Group

2002-08-01T23:59:59.000Z

342

UCSF Bicycle Permit Application Transportation Services  

E-Print Network [OSTI]

UCSF Bicycle Permit Application Transportation Services 500 Parnassus Ave, Box 0240 MU- P7 Room 26 ____________________________________________________________________ ____________________________ ______________________________ ____________________________________________________________________ Street City State Zip Home Phone Number Work Phone Number Bicycle Make Color Frame Serial #Bicycle Model 1. Bicycles which are not moved for a period of 7 days or longer will be tagged for removal

Yamamoto, Keith

343

Two photo permits are available: Daily Photographer Permit and Annual Photographer Permit. Daily Photographer Permit is $75 and includes gate admission for up to 15 adults and photographer. To reserve  

E-Print Network [OSTI]

Two photo permits are available: Daily Photographer Permit and Annual Photographer Permit. Daily of the photo session will be $75 plus a $25 processing fee. Your Daily Photo Badge can be picked up the business day before. Any permits purchased on the day of the photo session will be $225 and subject

Netoff, Theoden

344

Enforcing Emissions Trading when Emissions Permits are Bankable  

Science Journals Connector (OSTI)

We propose enforcement strategies for emissions trading programs with bankable emissions permits that guarantee...

John K. Stranlund; Christopher CostelloÖ

2005-09-01T23:59:59.000Z

345

Alternative Fuels Data Center: Biofuels Construction and Permitting  

Alternative Fuels and Advanced Vehicles Data Center [Office of Energy Efficiency and Renewable Energy (EERE)]

Biofuels Construction Biofuels Construction and Permitting Assistance to someone by E-mail Share Alternative Fuels Data Center: Biofuels Construction and Permitting Assistance on Facebook Tweet about Alternative Fuels Data Center: Biofuels Construction and Permitting Assistance on Twitter Bookmark Alternative Fuels Data Center: Biofuels Construction and Permitting Assistance on Google Bookmark Alternative Fuels Data Center: Biofuels Construction and Permitting Assistance on Delicious Rank Alternative Fuels Data Center: Biofuels Construction and Permitting Assistance on Digg Find More places to share Alternative Fuels Data Center: Biofuels Construction and Permitting Assistance on AddThis.com... More in this section... Federal State Advanced Search All Laws & Incentives Sorted by Type

346

Alternative Fuels Data Center: Hydrogen Fueling Infrastructure Permitting  

Alternative Fuels and Advanced Vehicles Data Center [Office of Energy Efficiency and Renewable Energy (EERE)]

Hydrogen Fueling Hydrogen Fueling Infrastructure Permitting and Safety to someone by E-mail Share Alternative Fuels Data Center: Hydrogen Fueling Infrastructure Permitting and Safety on Facebook Tweet about Alternative Fuels Data Center: Hydrogen Fueling Infrastructure Permitting and Safety on Twitter Bookmark Alternative Fuels Data Center: Hydrogen Fueling Infrastructure Permitting and Safety on Google Bookmark Alternative Fuels Data Center: Hydrogen Fueling Infrastructure Permitting and Safety on Delicious Rank Alternative Fuels Data Center: Hydrogen Fueling Infrastructure Permitting and Safety on Digg Find More places to share Alternative Fuels Data Center: Hydrogen Fueling Infrastructure Permitting and Safety on AddThis.com... More in this section... Federal State Advanced Search

347

Water pollution Control Permit Fee Schedules (West Virginia) | Department  

Broader source: Energy.gov (indexed) [DOE]

pollution Control Permit Fee Schedules (West Virginia) pollution Control Permit Fee Schedules (West Virginia) Water pollution Control Permit Fee Schedules (West Virginia) < Back Eligibility Utility Fed. Government Commercial Agricultural Investor-Owned Utility State/Provincial Govt Industrial Construction Municipal/Public Utility Local Government Residential Installer/Contractor Rural Electric Cooperative Tribal Government Low-Income Residential Schools Retail Supplier Institutional Multi-Family Residential Systems Integrator Fuel Distributor Nonprofit General Public/Consumer Transportation Program Info State West Virginia Program Type Fees Siting and Permitting Provider Department of Environmental Protection This rule establishes schedules of permit application fees and annual permit fees for state water pollution control permits and national

348

Hanford Site air operating permit application  

SciTech Connect (OSTI)

The Clean Air Act Amendments of 1990, which amended the Federal Clean Air Act of 1977, required that the US Environmental Protection Agency develop a national Air Operating Permit Program, which in turn would require each state to develop an Air Operating Permit Program to identify all sources of ``regulated`` pollutants. Regulated pollutants include ``criteria`` pollutants (oxides of nitrogen, sulfur oxides, total suspended particulates, carbon monoxide, particulate matter greater than 10 micron, lead) plus 189 other ``Hazardous`` Air Pollutants. The Hanford Site, owned by the US Government and operated by the US Department of Energy, Richland Operations Office, is located in southcentral Washington State and covers 560 square miles of semi-arid shrub and grasslands located just north of the confluence of the Snake and Yakima Rivers with the Columbia River. This land, with restricted public access, provides a buffer for the smaller areas historically used for the production of nuclear materials, waste storage, and waste disposal. About 6 percent of the land area has been disturbed and is actively used. The Hanford Site Air Operating Permit Application consists of more than 1,100 sources and in excess of 300 emission points. Before January 1995, the maintenance and operations contractor and the environmental restoration contractor for the US Department of Energy completed an air emission inventory on the Hanford Site. The inventory has been entered into a database so that the sources and emission points can be tracked and updated information readily can be retrieved. The Hanford Site Air Operating Permit Application contains information current as of April 19, 1995.

NONE

1995-05-01T23:59:59.000Z

349

Broward County Online Solar Permitting (Florida) | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Broward County Online Solar Permitting (Florida) Broward County Online Solar Permitting (Florida) Broward County Online Solar Permitting (Florida) < Back Eligibility Commercial Residential Savings Category Solar Buying & Making Electricity Program Info State Florida Program Type Solar/Wind Permitting Standards Provider Unincorporated Broward County Broward County now offers Go SOLAR Online Permitting*, for rooftop solar photovoltaic system permitting. This online permitting system may be used for residential or low commercial properties that are governed by a participating municipality. The online permitting system is designed to provide a one-stop solar permitting process with a single application form, electronic review and approval, and flat fee. Applicants can use this system to choose from pre-approved and pre-engineered solar panel mounting installation designs,

350

Alternative Fuels Data Center: Compressed Natural Gas (CNG) Permit  

Alternative Fuels and Advanced Vehicles Data Center [Office of Energy Efficiency and Renewable Energy (EERE)]

Compressed Natural Gas Compressed Natural Gas (CNG) Permit to someone by E-mail Share Alternative Fuels Data Center: Compressed Natural Gas (CNG) Permit on Facebook Tweet about Alternative Fuels Data Center: Compressed Natural Gas (CNG) Permit on Twitter Bookmark Alternative Fuels Data Center: Compressed Natural Gas (CNG) Permit on Google Bookmark Alternative Fuels Data Center: Compressed Natural Gas (CNG) Permit on Delicious Rank Alternative Fuels Data Center: Compressed Natural Gas (CNG) Permit on Digg Find More places to share Alternative Fuels Data Center: Compressed Natural Gas (CNG) Permit on AddThis.com... More in this section... Federal State Advanced Search All Laws & Incentives Sorted by Type Compressed Natural Gas (CNG) Permit Anyone dispensing CNG for use in vehicles must obtain a permit from the

351

Chapter 52 Permits, Registrations, and Prohibitory Rules (Kentucky) |  

Broader source: Energy.gov (indexed) [DOE]

Chapter 52 Permits, Registrations, and Prohibitory Rules (Kentucky) Chapter 52 Permits, Registrations, and Prohibitory Rules (Kentucky) Chapter 52 Permits, Registrations, and Prohibitory Rules (Kentucky) < Back Eligibility Agricultural Commercial Construction Developer Industrial Installer/Contractor Investor-Owned Utility Municipal/Public Utility Rural Electric Cooperative Utility Program Info State Kentucky Program Type Environmental Regulations Siting and Permitting Provider Kentucky Department for Environmental Protection Kentucky Administrative Regulation Chapter 52, entitled Air Quality: Permits, Registrations, and Prohibitory Rules, is promulgated under the authority of the Division of Air Quality within the Energy and Environment Cabinet's Department for Environmental Protection. Chapter 52 outlines the permitting requirements for all air pollution sources within the state;

352

Petroleum Pipeline Eminent Domain Permit Procedures (Georgia) | Department  

Broader source: Energy.gov (indexed) [DOE]

Petroleum Pipeline Eminent Domain Permit Procedures (Georgia) Petroleum Pipeline Eminent Domain Permit Procedures (Georgia) Petroleum Pipeline Eminent Domain Permit Procedures (Georgia) < Back Eligibility Commercial Construction Developer Fuel Distributor General Public/Consumer Industrial Investor-Owned Utility Municipal/Public Utility Utility Program Info State Georgia Program Type Environmental Regulations Siting and Permitting Provider Georgia Department of Natural Resources The Petroleum Pipeline Eminent Domain Permit Procedures serve to protect Georgia's natural and environmental resources by requiring permits be issued by the Director of the Environmental Protection Division prior to any petroleum or petroleum product pipe company acquiring property or interests by eminent domain. Monitoring conditions will be issued with

353

General Conditions Applicable to Water Discharge Permits and Procedures and  

Broader source: Energy.gov (indexed) [DOE]

General Conditions Applicable to Water Discharge Permits and General Conditions Applicable to Water Discharge Permits and Procedures and Criteria for Issuing Water Discharge Permits (Connecticut) General Conditions Applicable to Water Discharge Permits and Procedures and Criteria for Issuing Water Discharge Permits (Connecticut) < Back Eligibility Agricultural Commercial Construction Fed. Government Fuel Distributor General Public/Consumer Industrial Installer/Contractor Institutional Investor-Owned Utility Local Government Low-Income Residential Multi-Family Residential Municipal/Public Utility Nonprofit Residential Retail Supplier Rural Electric Cooperative Schools State/Provincial Govt Systems Integrator Transportation Tribal Government Utility Program Info State Connecticut Program Type Siting and Permitting Provider Department of Energy and Environmental Protection

354

Permit Types, Tiers, and Parking Privileges 2012-2013 Alr 07-01-2012 1  

E-Print Network [OSTI]

loading permit from booth. M (motorcycle permit) Motorcycle Spaces ME (Maple Avenue Complex) Perimeter

355

T-590: HP Diagnostics Input Validation Hole Permits Cross-Site...  

Broader source: Energy.gov (indexed) [DOE]

actions on the site acting as the target user. Solution: HP has provided HP Diagnostics patch version 8.05.54.225 to resolve the vulnerability. This patch can be obtained by...

356

Technology Validation Fact Sheet  

Broader source: Energy.gov [DOE]

Fact sheet produced by the Fuel Cell Technologies Office describing hydrogen and fuel cell technology validation efforts.

357

Alternative Fuels Data Center: Compressed Natural Gas (CNG) Dealer Permit  

Alternative Fuels and Advanced Vehicles Data Center [Office of Energy Efficiency and Renewable Energy (EERE)]

Compressed Natural Gas Compressed Natural Gas (CNG) Dealer Permit to someone by E-mail Share Alternative Fuels Data Center: Compressed Natural Gas (CNG) Dealer Permit on Facebook Tweet about Alternative Fuels Data Center: Compressed Natural Gas (CNG) Dealer Permit on Twitter Bookmark Alternative Fuels Data Center: Compressed Natural Gas (CNG) Dealer Permit on Google Bookmark Alternative Fuels Data Center: Compressed Natural Gas (CNG) Dealer Permit on Delicious Rank Alternative Fuels Data Center: Compressed Natural Gas (CNG) Dealer Permit on Digg Find More places to share Alternative Fuels Data Center: Compressed Natural Gas (CNG) Dealer Permit on AddThis.com... More in this section... Federal State Advanced Search All Laws & Incentives Sorted by Type Compressed Natural Gas (CNG) Dealer Permit

358

Solar and Wind Permitting Standards | Open Energy Information  

Open Energy Info (EERE)

Permitting Standards Permitting Standards Jump to: navigation, search Permitting standards can facilitate the installation of wind and solar energy systems by specifying the conditions and fees involved in project development. Some local governments have adopted simplified or expedited permitting standards for wind and/or solar. ¬ďTop-of-the-stack¬Ē or fast-track permitting saves system owners and project developers time and money. Some states have established maximum fees that local governments may charge for a permit for a solar or wind energy system. In addition, some states have developed (or have supported the development of) model wind ordinances for use by local governments. [1] Contents 1 Solar/Wind Permitting Standards Incentives 2 References Solar/Wind Permitting Standards Incentives

359

File:UtilityPermitFranchiseApp.pdf | Open Energy Information  

Open Energy Info (EERE)

UtilityPermitFranchiseApp.pdf Jump to: navigation, search File File history File usage Metadata File:UtilityPermitFranchiseApp.pdf Size of this preview: 463 599 pixels. Other...

360

DOE to Hold Public Information Meetings on Permit Modifications  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Meetings On Permit Modifications CARLSBAD, N.M., May 8, 2001 - The public is invited to comment on two proposed modifications to the Hazardous Waste Facility Permit for the Waste...

Note: This page contains sample records for the topic "validation flaw permits" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Idaho Dredge and Fill Permits Webpage | Open Energy Information  

Open Energy Info (EERE)

Fill Permits Webpage Jump to: navigation, search OpenEI Reference LibraryAdd to library Web Site: Idaho Dredge and Fill Permits Webpage Author Idaho Department of Environmental...

362

WAC - 173-401 Operating Permit Regulation | Open Energy Information  

Open Energy Info (EERE)

Operating Permit Regulation Jump to: navigation, search OpenEI Reference LibraryAdd to library Legal Document- RegulationRegulation: WAC - 173-401 Operating Permit RegulationLegal...

363

EPA Citizens Guide to Hazardous Waste Permitting Process | Open...  

Open Energy Info (EERE)

Citizens Guide to Hazardous Waste Permitting Process Jump to: navigation, search OpenEI Reference LibraryAdd to library Web Site: EPA Citizens Guide to Hazardous Waste Permitting...

364

Hazardous Waste Facility Permit Fact Sheet | Open Energy Information  

Open Energy Info (EERE)

search OpenEI Reference LibraryAdd to library Legal Document- OtherOther: Hazardous Waste Facility Permit Fact SheetLegal Abstract Hazardous Waste Facility Permit Fact Sheet,...

365

Hazardous Waste Facility Permit Public Comments to Community...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

covered by the permit. Please use another word for "promulgated," such as "created." This section should state that it is a ten-year permit, set to expire in November 2020. It...

366

Property:AirQualityPermitProcess | Open Energy Information  

Open Energy Info (EERE)

"AirQualityPermitProcess" Showing 1 page using this property. R RAPIDOverviewGeothermalAir QualityAlaska + The Air Permit process in Alaska is divided into two divisions: Title...

367

Alternative Fuels Data Center: Fueling Station Air Quality Permit Exemption  

Alternative Fuels and Advanced Vehicles Data Center [Office of Energy Efficiency and Renewable Energy (EERE)]

Fueling Station Air Fueling Station Air Quality Permit Exemption to someone by E-mail Share Alternative Fuels Data Center: Fueling Station Air Quality Permit Exemption on Facebook Tweet about Alternative Fuels Data Center: Fueling Station Air Quality Permit Exemption on Twitter Bookmark Alternative Fuels Data Center: Fueling Station Air Quality Permit Exemption on Google Bookmark Alternative Fuels Data Center: Fueling Station Air Quality Permit Exemption on Delicious Rank Alternative Fuels Data Center: Fueling Station Air Quality Permit Exemption on Digg Find More places to share Alternative Fuels Data Center: Fueling Station Air Quality Permit Exemption on AddThis.com... More in this section... Federal State Advanced Search All Laws & Incentives Sorted by Type Fueling Station Air Quality Permit Exemption

368

Idaho Application for Water Permit (DWR Form 202) | Open Energy...  

Open Energy Info (EERE)

Idaho Application for Water Permit (DWR Form 202) Jump to: navigation, search OpenEI Reference LibraryAdd to library Form: Idaho Application for Water Permit (DWR Form 202)...

369

On-Site Wastewater Treatment Systems: Selecting and Permitting (Spanish)  

E-Print Network [OSTI]

This publication explains how to select and obtain a permit for an on-site wastewater treatment system in Texas....

Lesikar, Bruce J.

2005-04-30T23:59:59.000Z

370

Biotechnology Regulatory Services public data file (permits, notifications,  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Biotechnology Regulatory Services public data file (permits, notifications, Biotechnology Regulatory Services public data file (permits, notifications, and petitions) Agriculture Community Menu DATA APPS EVENTS DEVELOPER STATISTICS COLLABORATE ABOUT Agriculture You are here Data.gov ¬Ľ Communities ¬Ľ Agriculture ¬Ľ Data Biotechnology Regulatory Services public data file (permits, notifications, and petitions) Dataset Summary Description Public information on BRS applications for genetically engineered permits, notifications, and petitions. Tags {BRS,Permits,Notifications,Petitions,GE,"Agronomic Properties","Bacterial Resistance","Fungal Resistance","Herbicide Tolerance","Insect Resistance","Marker Gene","Nematode Resistance","Product Quality","Virus Resistance",Institution,Article,Phenotypes,"Genotypes "}

371

Hazardous Waste Transporter Permits (Connecticut) | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Hazardous Waste Transporter Permits (Connecticut) Hazardous Waste Transporter Permits (Connecticut) Hazardous Waste Transporter Permits (Connecticut) < Back Eligibility Agricultural Commercial Construction Fed. Government Fuel Distributor General Public/Consumer Industrial Installer/Contractor Institutional Investor-Owned Utility Local Government Low-Income Residential Multi-Family Residential Municipal/Public Utility Nonprofit Residential Retail Supplier Rural Electric Cooperative Schools State/Provincial Govt Systems Integrator Transportation Tribal Government Utility Program Info State Connecticut Program Type Siting and Permitting Provider Department of Energy and Environmental Protection Transportation of hazardous wastes into or through the State of Connecticut requires a permit. Some exceptions apply. The regulations provide

372

Aquatic Habitat Protection Permit (Saskatchewan, Canada) | Department of  

Broader source: Energy.gov (indexed) [DOE]

Aquatic Habitat Protection Permit (Saskatchewan, Canada) Aquatic Habitat Protection Permit (Saskatchewan, Canada) Aquatic Habitat Protection Permit (Saskatchewan, Canada) < Back Eligibility Agricultural Commercial Construction Developer Industrial Installer/Contractor Institutional Investor-Owned Utility Local Government Low-Income Residential Multi-Family Residential Municipal/Public Utility Nonprofit Residential Rural Electric Cooperative Schools Utility Savings Category Buying & Making Electricity Water Home Weatherization Solar Wind Program Info State Saskatchewan Program Type Environmental Regulations Siting and Permitting Provider Saskatchewan Ministry of the Environment The Environmental Management and Protection Act, 2002 (EMPA) provides for the protection of aquatic habitat and states that a permit is required: to

373

City of Portland - Streamlined Building Permits for Residential Solar  

Broader source: Energy.gov (indexed) [DOE]

Commercial Commercial Residential Savings Category Solar Buying & Making Electricity Heating & Cooling Water Heating Program Info State Oregon Program Type Solar/Wind Permitting Standards Provider City of Portland The City of Portland's Bureau of Development Services (BDS) developed an electronic permitting process for residential solar energy system installations. With this streamlined, expedited process, solar contractors can submit the project plans and permit application online for residential installations. In order to file the online application, the contractor must first be trained. The City of Portland has staff at the permitting desk trained as solar experts to assist solar contractors who need help filing their permits in person. This process has a turnaround time of

374

Storm Water Discharge Permits (Wisconsin) | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Storm Water Discharge Permits (Wisconsin) Storm Water Discharge Permits (Wisconsin) Storm Water Discharge Permits (Wisconsin) < Back Eligibility Agricultural Commercial Construction Developer Fed. Government Fuel Distributor General Public/Consumer Industrial Installer/Contractor Institutional Investor-Owned Utility Local Government Low-Income Residential Multi-Family Residential Municipal/Public Utility Nonprofit Residential Retail Supplier Rural Electric Cooperative Schools State/Provincial Govt Systems Integrator Transportation Tribal Government Utility Program Info Start Date 08/2004 State Wisconsin Program Type Siting and Permitting Provider Department of Natural Resources Wisconsin's storm water runoff regulations include permitting requirements for construction sites and industrial facilities, including those

375

City and County of Denver - Solar Panel Permitting (Colorado) | Department  

Broader source: Energy.gov (indexed) [DOE]

Solar Panel Permitting (Colorado) Solar Panel Permitting (Colorado) City and County of Denver - Solar Panel Permitting (Colorado) < Back Eligibility Commercial Construction General Public/Consumer Industrial Low-Income Residential Multi-Family Residential Residential Savings Category Solar Buying & Making Electricity Heating & Cooling Water Heating Program Info State Colorado Program Type Solar/Wind Permitting Standards Provider Department of Development Services Construction, Electrical, Plumbing and Zoning Permits* are required for Photovoltaic (PV) systems installed in the city of Denver. Denver provides same day permit review for most solar panel projects. More complex engineering projects may still be required to go through the Plan Review process. To obtain Zoning Permits for flush mounted solar panels, applicants must

376

Solar/Wind Permitting Standards | Open Energy Information  

Open Energy Info (EERE)

Permitting Standards Permitting Standards < Solar Jump to: navigation, search Permitting standards can facilitate the installation of wind and solar energy systems by specifying the conditions and fees involved in project development. Some local governments have adopted simplified or expedited permitting standards for wind and/or solar. ¬ďTop-of-the-stack¬Ē or fast-track permitting saves system owners and project developers time and money. Some states have established maximum fees that local governments may charge for a permit for a solar or wind energy system. In addition, some states have developed (or have supported the development of) model wind ordinances for use by local governments. [1] Solar/Wind Permitting Standards Incentives CSV (rows 1 - 55) Incentive Incentive Type Place Applicable Sector Eligible Technologies Active

377

GRR/Section 6 - Construction Permits Overview | Open Energy Information  

Open Energy Info (EERE)

6 - Construction Permits Overview 6 - Construction Permits Overview < GRR Jump to: navigation, search GRR-logo.png GEOTHERMAL REGULATORY ROADMAP Roadmap Home Roadmap Help List of Sections Section 6 - Construction Permits Overview 06 - ConstructionPermitsOverview.pdf Click to View Fullscreen Triggers None specified Click "Edit With Form" above to add content 06 - ConstructionPermitsOverview.pdf 06 - ConstructionPermitsOverview.pdf Error creating thumbnail: Page number not in range. Error creating thumbnail: Page number not in range. Flowchart Narrative Constructing a geothermal power plant requires numerous permits from Federal, state, and local governments, related to transporting construction materials, encroaching upon Federal and state right-of-ways, demolishing existing structures and building new structures.

378

Transmission/Permitting Atlas/State Data | Open Energy Information  

Open Energy Info (EERE)

Transmission/Permitting Atlas/State Data Transmission/Permitting Atlas/State Data < Transmission‚Äé | Permitting Atlas Jump to: navigation, search PermittingAtlasHeader.png Roadmap Compare States General Transmission Dashboard Permitting Atlas Compare States Arizona California Colorado Idaho Montana Nevada New Mexico Oregon Utah Washington Wyoming Resource Library NEPA Database State State Siting Act State Preemptive Authority Siting/Permitting Entities Permit Processing Timeframe Arizona None If TLSC finds compliance with local land use unreasonable or unfeasible, then the TLSC may grant a certificate Arizona Corporation Commission (ACC); Transmission Line Siting Committee (TLSC) 210-240 Days California Public Utilities Code Section 1001 Local jurisdictions are preempted from regulating electric power line projects California Public Utilities Commission (CPUC) 18 months

379

Solar and Wind Permitting Laws | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Permitting Laws Permitting Laws Solar and Wind Permitting Laws < Back Eligibility Commercial Industrial Nonprofit Residential Schools Savings Category Solar Buying & Making Electricity Wind Program Info State New Jersey Program Type Solar/Wind Permitting Standards Provider New Jersey Department of Community Affairs New Jersey has enacted three separate laws addressing local permitting practices for solar and wind energy facilities. The first deals with solar and wind facilities located in industrial-zoned districts; the second with wind energy devices sited on piers; and the third addresses permitting standards small wind energy devices in general. All three are described below. '''Solar and Wind as Permitted Uses in Industrial Zones''' In March 2009 the state enacted legislation (A.B. 2550) defining facilities

380

EOS Land Validation Presentations  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

EOS Land Validation Presentations EOS Land Validation Presentations Meeting: Land Cover Validation Workshop Date: February 2, 2004 Place: Boston, MA Title: Validation Data Support Activities at the ORNL DAAC (Power Point) Presenter: Bob Cook Meeting: Fall 2003 American Geophysical Union (AGU) Meeting Date: December 9, 2003 Place: San Francisco, CA Title: Ground-Based Data Supporting the Validation of MODIS Land Products (Power Point) Presenter: Larry Voorhees Meeting: Terra and Aqua Products Review Date: March 2003 Place: NASA HQ Title: Supporting the Validation of MODIS Land Products (Power Point) Presenter: Larry Voorhees Meeting: Terra and Aqua Products Review Date: March 2003 Place: NASA HQ Title: MODIS Land Summary (Power Point) Presenter: Chris Justice, University of Maryland Meeting: Spring 2002 American Geophysical Union (AGU) Meeting

Note: This page contains sample records for the topic "validation flaw permits" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Accelerated Testing Validation  

Broader source: Energy.gov (indexed) [DOE]

Accelerated Testing Validation Rangachary Mukundan (PI), Rodney Borup, John Davey, Roger Lujan Los Alamos National Laboratory Adam Z. Weber Lawrence Berkeley National Laboratory...

382

Presidential Permits and Export Authorizations - Frequently Asked Questions  

Broader source: Energy.gov (indexed) [DOE]

Permits and Export Permits and Export Authorizations - Frequently Asked Questions Presidential Permits and Export Authorizations - Frequently Asked Questions Presidential Permits Export Authorizations Self Certifications Annual Reports Presidential Permits What are they? Permits for the construction, connection, operation and/or maintenance of electric transmission lines that cross the U.S. international border. What are the criteria? Two primary criteria are used to determine if a proposed project is consistent with the public interest. 1. DOE considers the impact the proposed project would have on the operating reliability of the U.S. electric power supply. 2. DOE must comply with the National Environmental Policy Act of 1969 (NEPA), which requires DOE to consider the environmental consequences

383

Request for Information on Permitting of Transmission Lines: Federal  

Broader source: Energy.gov (indexed) [DOE]

Request for Information on Permitting of Transmission Lines: Request for Information on Permitting of Transmission Lines: Federal Register Notice Volume 77, No. 38 - Feb. 27, 2012 Request for Information on Permitting of Transmission Lines: Federal Register Notice Volume 77, No. 38 - Feb. 27, 2012 The Department of Energy's Office of Electricity Delivery and Energy Reliability requested information on questions related to permitting of transmission lines. Infrastructure projects - such as high voltage, long distance, electric transmission facilities - often involve multiple Federal, State, local and Tribal authorizations and are subject to a wide array of processes and procedural requirements in order to obtain all necessary permits and other authorizations. Delays in securing required statutory reviews, permits, and consultations can threaten the completion

384

Presidential Permit Holders - Annual Reports | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Permit Holders - Permit Holders - Annual Reports Presidential Permit Holders - Annual Reports Presidential permit holders are responsible for reporting the gross amount electric energy which flows into and out of the United States over the permitted international transmission facility regardless if the energy is wheeled to or for another entity. For example, utility A receives a Presidential permit for a single international transmission line across the U.S.-Canadian border. During the calendar year just completed, 300,000,000 kilowatt-hours (kwh) are imported from Canada across this line. Utility A arranged for the purchase of 200,000,000 kwh for its own use and wheeled 100,000,000 kwh to neighboring utility B. Utility A must report 300,000,000 kwh of imports over the international

385

Environmental assessment for presidential permit applications for Baja  

Broader source: Energy.gov (indexed) [DOE]

Environmental assessment for presidential permit applications for Environmental assessment for presidential permit applications for Baja California Power Inc and Sempra Energy Resources PP-234 and PP-235 Environmental assessment for presidential permit applications for Baja California Power Inc and Sempra Energy Resources PP-234 and PP-235 Environmental assessment for presidential permit applications for Baja California Power Inc and Sempra Energy Resources. December 2001 PP-234 and PP-235 Enviornmental assessment for presidential permit applications for Baja California Power Inc and Sempra Energy Resources PP-234 and PP-235 More Documents & Publications DOE Environmental Assessment EA-1391 for Presidential Permit Applications for Baja California Power Inc and Sempra Energy Resources PP-234 and PP-235: Finding of No Significant Impact

386

Coastal Permit Program Rules (New Jersey) | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Coastal Permit Program Rules (New Jersey) Coastal Permit Program Rules (New Jersey) Coastal Permit Program Rules (New Jersey) < Back Eligibility Utility Fed. Government Commercial Agricultural Investor-Owned Utility State/Provincial Govt Industrial Construction Municipal/Public Utility Local Government Residential Installer/Contractor Rural Electric Cooperative Tribal Government Low-Income Residential Schools Retail Supplier Institutional Multi-Family Residential Systems Integrator Fuel Distributor Nonprofit General Public/Consumer Transportation Savings Category Alternative Fuel Vehicles Hydrogen & Fuel Cells Buying & Making Electricity Water Home Weatherization Solar Wind Program Info State New Jersey Program Type Siting and Permitting Provider Department of Environmental Protection The Coastal Permit Program Rules provide the processes for permit reviews.

387

DOE Seeking Information on Transmission Line Permitting | Department of  

Broader source: Energy.gov (indexed) [DOE]

Seeking Information on Transmission Line Permitting Seeking Information on Transmission Line Permitting DOE Seeking Information on Transmission Line Permitting February 27, 2012 - 3:25pm Addthis The Department of Energy's Office of Electricity Delivery and Energy Reliability is seeking information on the questions related to permitting of transmission lines. Infrastructure projects - such as high voltage, long distance, electric transmission facilities - often involve multiple Federal, State, local, and Tribal authorizations and are subject to a wide array of processes and procedural requirements in order to obtain all necessary permits and other authorizations. Delays in securing required statutory reviews, permits, and consultations can threaten the completion projects of national and regional significance. This Request for

388

Orange County - Wind Permitting Standards | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Orange County - Wind Permitting Standards Orange County - Wind Permitting Standards Orange County - Wind Permitting Standards < Back Eligibility Agricultural Commercial Residential Savings Category Wind Buying & Making Electricity Program Info State California Program Type Solar/Wind Permitting Standards Provider OC Planning In December 2010, the County of Orange Board of Supervisors adopted small wind performance and development standards (Ord. No. 10-020) in order to promote distributed generation systems in non-urbanized areas (as defined in Government Code Section 65944(d)(2)) within the unincorporated territory. Permitting standards are for systems of 50 kW or less per customer site, for which the energy is primarily for on-site consumption. Height: For systems 45 feet tall or less, a use permit must be approved by

389

Expedited Permitting of Grid-Scale Wind Energy Development (Maine) |  

Broader source: Energy.gov (indexed) [DOE]

Expedited Permitting of Grid-Scale Wind Energy Development (Maine) Expedited Permitting of Grid-Scale Wind Energy Development (Maine) Expedited Permitting of Grid-Scale Wind Energy Development (Maine) < Back Eligibility Utility Fed. Government Commercial Agricultural Investor-Owned Utility State/Provincial Govt Industrial Construction Municipal/Public Utility Local Government Residential Installer/Contractor Rural Electric Cooperative Tribal Government Low-Income Residential Schools Retail Supplier Institutional Multi-Family Residential Systems Integrator Fuel Distributor Nonprofit General Public/Consumer Transportation Savings Category Wind Buying & Making Electricity Program Info State Maine Program Type Siting and Permitting Maine's Expedited Permitting of Grid-Scale Wind Energy Development statue provides an expedited permitting pathway for proposed wind developments in

390

Request for Information on Permitting of Transmission Lines: Federal  

Broader source: Energy.gov (indexed) [DOE]

Request for Information on Permitting of Transmission Lines: Request for Information on Permitting of Transmission Lines: Federal Register Notice Volume 77, No. 38 - Feb. 27, 2012 Request for Information on Permitting of Transmission Lines: Federal Register Notice Volume 77, No. 38 - Feb. 27, 2012 The Department of Energy's Office of Electricity Delivery and Energy Reliability requested information on questions related to permitting of transmission lines. Infrastructure projects - such as high voltage, long distance, electric transmission facilities - often involve multiple Federal, State, local and Tribal authorizations and are subject to a wide array of processes and procedural requirements in order to obtain all necessary permits and other authorizations. Delays in securing required statutory reviews, permits, and consultations can threaten the completion

391

Chapter 38 Hazardous Waste Permitting Process (Kentucky) | Department of  

Broader source: Energy.gov (indexed) [DOE]

8 Hazardous Waste Permitting Process (Kentucky) 8 Hazardous Waste Permitting Process (Kentucky) Chapter 38 Hazardous Waste Permitting Process (Kentucky) < Back Eligibility Agricultural Commercial Construction Developer Fed. Government Industrial Institutional Investor-Owned Utility Local Government Municipal/Public Utility Rural Electric Cooperative Schools State/Provincial Govt Transportation Tribal Government Utility Savings Category Alternative Fuel Vehicles Hydrogen & Fuel Cells Program Info State Kentucky Program Type Environmental Regulations Provider Department for Environmental Protection This administrative regulation establishes the general provisions for storage, treatment, recycling, or disposal of hazardous waste. It provides information about permits and specific requirements for containers, tanks,

392

Local Option - Building Permit Fee Waivers for Renewable Energy Projects  

Broader source: Energy.gov (indexed) [DOE]

Local Option - Building Permit Fee Waivers for Renewable Energy Local Option - Building Permit Fee Waivers for Renewable Energy Projects (Connecticut) Local Option - Building Permit Fee Waivers for Renewable Energy Projects (Connecticut) < Back Eligibility Agricultural Commercial Construction Fed. Government General Public/Consumer Industrial Installer/Contractor Institutional Local Government Low-Income Residential Multi-Family Residential Nonprofit Residential Schools State Government Tribal Government Savings Category Bioenergy Alternative Fuel Vehicles Hydrogen & Fuel Cells Water Buying & Making Electricity Solar Home Weatherization Wind Program Info State Connecticut Program Type Solar/Wind Permitting Standards Provider Department of Energy and Environmental Protection As of July 2011, Connecticut authorizes municipalities to pass a local

393

Phase III - Permitting and Initial Development | Open Energy Information  

Open Energy Info (EERE)

III - Permitting and Initial Development III - Permitting and Initial Development Jump to: navigation, search GEOTHERMAL ENERGYGeothermal Home GEA Development Phase III: Permitting and Initial Development GEA Development Phases The Geothermal Energy Association's (GEA) Geothermal Reporting Terms and Definitions are a guideline for geothermal developers to use when submitting geothermal resource development information to GEA for public dissemination in its annual US Geothermal Power Production and Development Update. GEA's Geothermal Reporting Terms and Definitions serve to increase the consistency, accuracy, and reliability of industry information presented in the development updates. Phase I - Resource Procurement and Identification Phase II - Resource Exploration and Confirmation Phase III - Permitting and Initial Development

394

Alteration of Terrain Permits (New Hampshire) | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Alteration of Terrain Permits (New Hampshire) Alteration of Terrain Permits (New Hampshire) Alteration of Terrain Permits (New Hampshire) < Back Eligibility Agricultural Commercial Construction Fed. Government Fuel Distributor General Public/Consumer Industrial Installer/Contractor Institutional Investor-Owned Utility Local Government Low-Income Residential Multi-Family Residential Municipal/Public Utility Nonprofit Residential Retail Supplier Rural Electric Cooperative Schools State/Provincial Govt Systems Integrator Transportation Tribal Government Utility Savings Category Alternative Fuel Vehicles Hydrogen & Fuel Cells Buying & Making Electricity Water Home Weatherization Solar Wind Program Info State New Hampshire Program Type Siting and Permitting Provider NH Department of Environmental Services Alteration of Terrain Bureau

395

Bureau of Land Management - Geothermal Drilling Permit | Open...  

Open Energy Info (EERE)

Bureau of Land Management - Geothermal Drilling Permit Jump to: navigation, search OpenEI Reference LibraryAdd to library Form: Bureau of Land Management - Geothermal Drilling...

396

Frederick County (Maryland) Department of Permits and Inspections (FCDPI)  

Broader source: Energy.gov [DOE]

The Frederick County (Maryland) Department of Permits and Inspections (FCDPI) is currently reviewing two proposed amendments to the 2012 International Energy Conservation Code (IECC), copies of...

397

Colorado - Access Permit Pre-Design Checklist | Open Energy Informatio...  

Open Energy Info (EERE)

Checklist Jump to: navigation, search OpenEI Reference LibraryAdd to library General: Colorado - Access Permit Pre-Design Checklist Author Colorado Department of Transportation...

398

ARM 12-14-101 - Commercial Use Permitting Requirements: Definitions...  

Open Energy Info (EERE)

permitting requirements for land within the jurisdiction of the Montana Department of Fish, Wildlife and Parks. Published NA Year Signed or Took Effect 2009 Legal Citation ARM...

399

Alaska Sample Special Area Permit | Open Energy Information  

Open Energy Info (EERE)

to library General: Alaska Sample Special Area Permit Author Alaska Department of Fish and Game Published Division of Habitat, 122012 DOI Not Provided Check for DOI...

400

50 CFR 13 - General Permit Procedures | Open Energy Information  

Open Energy Info (EERE)

denial, suspension, revocation, and general administration of permits issued by the Fish and Wildlife Service. Published NA Year Signed or Took Effect 2014 Legal Citation 50...

Note: This page contains sample records for the topic "validation flaw permits" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Application for Presidential Permit OE Docket No. PP-371 Northern...  

Broader source: Energy.gov (indexed) [DOE]

Conservation Law Foundation, Appalachian Mountain Club, and Society for the Protection of New Hampshire Forests Application for Presidential Permit OE Docket No. PP-371 Northern...

402

Application for Presidential Permit OE Docket No. PP-400 TDI...  

Broader source: Energy.gov (indexed) [DOE]

Project - Comments and Motion to Intervene of Conservation Law Foundation Application for Presidential Permit OE Docket No. PP-400 TDI-NE - New England Clean Power Link Project -...

403

CDOT - Utility/Special Use Permit Application | Open Energy Informatio...  

Open Energy Info (EERE)

to the CDOT UtilitySpecial Use Permit application. Author Colorado Department of Transportation Published Colorado Department of Transportation, 2007 DOI Not Provided Check for...

404

CDOT - State Highway Access Permit Application | Open Energy...  

Open Energy Info (EERE)

CDOT - State Highway Access Permit Application Author Colorado Department of Transportation Published Colorado Department of Transportation, 2010 DOI Not Provided Check for...

405

CDOT - Permit Standard Provisions Example | Open Energy Information  

Open Energy Info (EERE)

General: CDOT - Permit Standard Provisions Example Author Colorado Department of Transportation Published Colorado Department of Transportation, 2006 DOI Not Provided Check for...

406

Innovation and Success in Solar Permitting and Inspections  

Broader source: Energy.gov (indexed) [DOE]

Webinar 2: Innovation and Success in Solar Permitting and Inspections Transcript June 26, 2013 Speaker: Courtney Kendal Slide 1: Good afternoon. My name is Courtney Kendall,...

407

EPA - Construction General Permit webpage | Open Energy Information  

Open Energy Info (EERE)

webpage Jump to: navigation, search OpenEI Reference LibraryAdd to library Web Site: EPA - Construction General Permit webpage Abstract This is the Environmental Protection...

408

CDWR Well Permitting Forms and Associated Documents | Open Energy...  

Open Energy Info (EERE)

Associated Documents Jump to: navigation, search OpenEI Reference LibraryAdd to library Web Site: CDWR Well Permitting Forms and Associated Documents Abstract This webpage...

409

BLM - Information on Cultural Resource Use Permits webpage |...  

Open Energy Info (EERE)

Jump to: navigation, search OpenEI Reference LibraryAdd to library Web Site: BLM - Information on Cultural Resource Use Permits webpage Abstract This webpage provides information...

410

Application for Presidential Permit OE Docket No. PP-387 Soule...  

Broader source: Energy.gov (indexed) [DOE]

maintain electric transmission facilities at the U.S. - Canada Border. SOULE RIVER HYDROELECTRIC PROJECT More Documents & Publications Application for Presidential Permit OE...

411

Application for Presidential Permit OE Docket No. PP-387 Soule...  

Broader source: Energy.gov (indexed) [DOE]

Correction Application for Presidential Permit OE Docket No. PP-387 Soule River Hydroelectric Project; Federal Register Notice, Volume 78, No. 154 - Aug. 9, 2013: Correction...

412

Application for Presidential Permit OE Docket No. PP-387 Soule...  

Broader source: Energy.gov (indexed) [DOE]

July 30, 2013 Application for Presidential Permit OE Docket No. PP-387 Soule River Hydroelectric Project: Federal Register Notice, Volume 78, No. 146 - July 30, 2013 Application...

413

Regulatory and Permitting Information Desktop Toolkit (Fact Sheet)  

SciTech Connect (OSTI)

Overview of DOE's Regulatory and Permitting Information Desktop (RAPID) Toolkit project, providing information on where to go to view documents and who to contact to get involved.

Young, K.

2014-04-01T23:59:59.000Z

414

Property:ExplorationPermit-PreDrilling | Open Energy Information  

Open Energy Info (EERE)

Permit from the Hawaii Department of Land and Natural Resources Engineering Division to conduct any exploration activity on state or reserved lands for evidence of geothermal...

415

Hawaii Guidelines for NPDES Notice of General Permit Coverage...  

Open Energy Info (EERE)

an overview of the NPDES General Permit process. Author State of Hawaii Department of Health Published State of Hawaii, 92004 DOI Not Provided Check for DOI availability: http:...

416

Hawaii Application for Community Noise Permit (DOH Form CNP)...  

Open Energy Info (EERE)

Application for Community Noise Permit Organization State of Hawaii Department of Health Published Publisher Not Provided, 012008 DOI Not Provided Check for DOI availability:...

417

Hawaii Guide for Filing Community Noise Permit Applications ...  

Open Energy Info (EERE)

permit applications for construction activities. Author State of Hawaii Department of Health Published State of Hawaii, 2008 DOI Not Provided Check for DOI availability: http:...

418

Hawaii EIS-EA Permit Packet | Open Energy Information  

Open Energy Info (EERE)

PacketPermittingRegulatory GuidanceSupplemental Material Authors Hawaii Department of Health and Office of Environmental Quality Control Published State of Hawaii, 72014 DOI Not...

419

Appendix F. Permits AnnualSiteEnvironmentalRepor  

E-Print Network [OSTI]

/17/2003 DOE DOE BWXT CAA Depleted Uranium Forming and Heat Transfer (Construction Permit) 950266P 11/4/1998 7

Pennycook, Steve

420

Request for Information on Improving Performance of Federal Permitting...  

Broader source: Energy.gov (indexed) [DOE]

of Infrastructure Projects: Federal Register Notice Volume 78, No. 168 - August 29, 2013 Request for Information on Improving Performance of Federal Permitting and Review of...

Note: This page contains sample records for the topic "validation flaw permits" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Application for Presidential Permit OE Docket No. PP-299 Sea...  

Broader source: Energy.gov (indexed) [DOE]

99 Sea Breeze Pacific Regional Transmission System, INC Application for Presidential Permit OE Docket No. PP-299 Sea Breeze Pacific Regional Transmission System, INC TBDApplication...

422

WSDE Air Operating Permits Register Entries webpage | Open Energy...  

Open Energy Info (EERE)

takes on a facility's permit application. Author Washington State Department of Ecology Published Washington State Department of Ecology, Date Not Provided DOI Not Provided...

423

File:CDPHE Industrial Individual Wastewater Discharge Permit...  

Open Energy Info (EERE)

Industrial Individual Wastewater Discharge Permit Application.pdf Jump to: navigation, search File File history File usage Metadata File:CDPHE Industrial Individual Wastewater...

424

Nevada Sample Application for Permit Under Utility Environmental...  

Open Energy Info (EERE)

Collins. Initial Application of K Road Moapa Solar, LLC for a Permit to Construct A Transmission Line Under the Utility Environmental Protection Act. Retrieved from "http:...

425

Property:AirQualityPermitAgency | Open Energy Information  

Open Energy Info (EERE)

"AirQualityPermitAgency" Showing 1 page using this property. R RAPIDOverviewGeothermalAir QualityAlaska + Alaska Department of Environmental Conservation + Retrieved from...

426

UPDES Storm Water Permits: General Construction Website | Open...  

Open Energy Info (EERE)

Construction Website Jump to: navigation, search OpenEI Reference LibraryAdd to library Web Site: UPDES Storm Water Permits: General Construction Website Abstract this website...

427

Air Permit Program Information Page | Open Energy Information  

Open Energy Info (EERE)

Web Site: Air Permit Program Information Page Author Division of Air Quality Published Publisher Not Provided, Date Not Provided DOI Not Provided Check for DOI availability: http:...

428

Title V Operation Permit Application Webpage | Open Energy Information  

Open Energy Info (EERE)

Application Webpage Jump to: navigation, search OpenEI Reference LibraryAdd to library Web Site: Title V Operation Permit Application Webpage Author Division of Air Quality...

429

Air Permit Program Application Forms | Open Energy Information  

Open Energy Info (EERE)

Web Site: Air Permit Program Application Forms Author Division of Air Quality Published Publisher Not Provided, Date Not Provided DOI Not Provided Check for DOI availability:...

430

Idaho Permit to Construct Application Webpage | Open Energy Informatio...  

Open Energy Info (EERE)

Application Webpage Jump to: navigation, search OpenEI Reference LibraryAdd to library Web Site: Idaho Permit to Construct Application Webpage Abstract This webpage provides access...

431

Alaska Division of Water Permit Fees | Open Energy Information  

Open Energy Info (EERE)

Web Site: Alaska Division of Water Permit Fees Author Alaska Division of Water Published Publisher Not Provided, Date Not Provided DOI Not Provided Check for DOI availability:...

432

Colorado Construction Air Permit Application | Open Energy Information  

Open Energy Info (EERE)

for a construction permit for construction of a commercial or industrial source of air pollution. Form Type ApplicationNotice Form Topic Air Pollution Control Division -...

433

Hawaii Air Pollution Control Permits Webpage | Open Energy Information  

Open Energy Info (EERE)

Jump to: navigation, search OpenEI Reference LibraryAdd to library Web Site: Hawaii Air Pollution Control Permits Webpage Abstract Information about Air Pollution Control...

434

Optimizing operational flexibility and enforcement liability in Title V permits  

SciTech Connect (OSTI)

Now that most states have interim or full approval of the portions of their state implementation plans (SIPs) implementing Title V (40 CFR Part 70) of the Clean Air Act Amendments (CAAA), most sources which require a Title V permit have submitted or are well on the way to submitting a Title V operating permit application. Numerous hours have been spent preparing applications to ensure the administrative completeness of the application and operational flexibility for the facility. Although much time and effort has been spent on Title V permit applications, the operating permit itself is the final goal. This paper outlines the major Federal requirements for Title V permits as given in the CAAA at 40 CFR 70.6, Permit Content. These Federal requirements and how they will effect final Title V permits and facilities will be discussed. This paper will provide information concerning the Federal requirements for Title V permits and suggestions on how to negotiate a Title V permit to maximize operational flexibility and minimize enforcement liability.

McCann, G.T. [Rust Environment and Infrastructure Inc., Greenville, SC (United States)

1997-12-31T23:59:59.000Z

435

Application for Presidential Permit OE Docket No. PP-398 Minnesota...  

Broader source: Energy.gov (indexed) [DOE]

Application for Presidential Permit OE Docket No. PP-398 Minnesota Power - Great Northern Transmission Line: Notice of Intent to Prepare an Environmental Impact Statement: Federal...

436

Application for Presidential Permit OE Docket No. PP-398 Minnesota...  

Broader source: Energy.gov (indexed) [DOE]

Application for Presidential Permit OE Docket No. PP-398 Minnesota Power - Great Northern Transmission Line: Federal Register Notice, Vol. 79, No. 93 - May 14, 2014 Application...

437

Application for Presidential Permit OE Docket No. PP-362 Champlain...  

Broader source: Energy.gov (indexed) [DOE]

: Record of Decision for Issuing a Presidential Permit for the CHPE Transmission Line Project: Federal Register Notice, Volume 79, No. 190 - Oct. 1, 2014 Application for...

438

Application for Presidential Permit OE Docket No. PP-398 Minnesota...  

Broader source: Energy.gov (indexed) [DOE]

Application for Presidential Permit OE Docket No. PP-398 Minnesota Power - Great Northern Transmission Line Application from Great Northern (GNTL) to construct, operate and...

439

Application for a Colorado State Permit for Achaeological or...  

Open Energy Info (EERE)

Form: Application for a Colorado State Permit for Achaeological or Paleontological Work Abstract This application must be submitted and approved prior to commencing...

440

Permitting of Consumptive Uses of Water (Florida) | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Permitting of Consumptive Uses of Water (Florida) Permitting of Consumptive Uses of Water (Florida) Permitting of Consumptive Uses of Water (Florida) < Back Eligibility Agricultural Commercial Construction Developer Fed. Government Fuel Distributor General Public/Consumer Industrial Installer/Contractor Institutional Investor-Owned Utility Local Government Low-Income Residential Multi-Family Residential Municipal/Public Utility Nonprofit Residential Retail Supplier Rural Electric Cooperative Schools State/Provincial Govt Systems Integrator Transportation Tribal Government Utility Savings Category Water Buying & Making Electricity Home Weatherization Program Info State Florida Program Type Siting and Permitting Provider Florida Department of Environmental Protection Local water management districts are required to establish programs and

Note: This page contains sample records for the topic "validation flaw permits" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Montana Disinfected Water and Hydrostatic Testing General Permit...  

Open Energy Info (EERE)

Montana Disinfected Water and Hydrostatic Testing General Permit Jump to: navigation, search OpenEI Reference LibraryAdd to library Form: Montana Disinfected Water and Hydrostatic...

442

Application for presidential permit OE Docket No. PP-371 Northern...  

Broader source: Energy.gov (indexed) [DOE]

for a Presidential Permit to construct a 1,200 MW high voltage direct current ("HVDC") transmission line (the "Application") from the Des Cantons substation in Quebec, to...

443

Geothermal: Sponsored by OSTI -- Regulatory and Permitting Information...  

Office of Scientific and Technical Information (OSTI)

Regulatory and Permitting Information Desktop (RAPID) Toolkit (Poster) Geothermal Technologies Legacy Collection HelpFAQ | Site Map | Contact Us | Admin Log On HomeBasic Search...

444

Progress in evaluation and improvement in nondestructive examination reliability for inservice inspection of Light Water Reactors (LWRs) and characterize fabrication flaws in reactor pressure vessels  

SciTech Connect (OSTI)

This paper is a review of the work conducted under two programs. One (NDE Reliability Program) is a multi-year program addressing the reliability of nondestructive evaluation (NDE) for the inservice inspection (ISI) of light water reactor components. This program examines the reliability of current NDE, the effectiveness of evolving technologies, and provides assessments and recommendations to ensure that the NDE is applied at the right time, in the right place with sufficient effectiveness that defects of importance to structural integrity will be reliably detected and accurately characterized. The second program (Characterizing Fabrication Flaws in Reactor Pressure Vessels) is assembling a data base to quantify the distribution of fabrication flaws that exist in US nuclear reactor pressure vessels with respect to density, size, type, and location. These programs will be discussed as two separate sections in this report. 4 refs., 7 figs.

Doctor, S.R.; Bowey, R.E.; Good, M.S.; Friley, J.R.; Kurtz, R.J.; Simonen, F.A.; Taylor, T.T.; Heasler, P.G.; Andersen, E.S.; Diaz, A.A.; Greenwood, M.S.; Hockey, R.L.; Schuster, G.J.; Spanner, J.C.; Vo, T.V.

1991-10-01T23:59:59.000Z

445

Final Assessment of Manual Ultrasonic Examinations Applied to Detect Flaws in Primary System Dissimilar Metal Welds at North Anna Power Station  

SciTech Connect (OSTI)

PNNL conducted a technical assessment of the NDE issues and protocols that led to missed detections of several axially oriented flaws in a steam generator primary inlet dissimilar metal weld at North Anna Power Station, Unit 1 (NAPS-1). This particular component design exhibits a significant outside-diameter (OD) taper that is not included as a blind performance demonstration mock-up within the industryís Performance Demonstration Initiative, administered by EPRI. For this reason, the licensee engaged EPRI to assist in the development of a technical justification to support the basis for a site-specific qualification. The service-induced flaws at NAPS-1 were eventually detected as a result of OD surface machining in preparation for a full structural weld overlay. The machining operation uncovered the existence of two through-wall flaws, based on the observance of primary water leaking from the dissimilar metal weld. A total of five axially oriented flaws were detected in varied locations around the weld circumference. The field volumetric examination that was conducted at NAPS-1 was a non-encoded, real-time manual ultrasonic examination. PNNL conducted both an initial assessment, and subsequently, a more rigorous technical evaluation (reported here), which has identified an array of NDE issues that may have led to the subject missed detections. These evaluations were performed through technical reviews and discussions with NRC staff, EPRI NDE Center personnel, industry and ISI vendor personnel, and ultrasonic transducer manufacturers, and laboratory tests, to better understand the underlying issues at North Anna.

Anderson, Michael T.; Diaz, Aaron A.; Cinson, Anthony D.; Crawford, Susan L.; Prowant, Matthew S.; Doctor, Steven R.

2014-03-24T23:59:59.000Z

446

A FRAMEWORK TO DEVELOP FLAW ACCEPTANCE CRITERIA FOR STRUCTURAL INTEGRITY ASSESSMENT OF MULTIPURPOSE CANISTERS FOR EXTENDED STORAGE OF USED NUCLEAR FUEL  

SciTech Connect (OSTI)

A multipurpose canister (MPC) made of austenitic stainless steel is loaded with used nuclear fuel assemblies and is part of the transfer cask system to move the fuel from the spent fuel pool to prepare for storage, and is part of the storage cask system for on-site dry storage. This weld-sealed canister is also expected to be part of the transportation package following storage. The canister may be subject to service-induced degradation especially if exposed to aggressive environments during possible very long-term storage period if the permanent repository is yet to be identified and readied. Stress corrosion cracking may be initiated on the canister surface in the welds or in the heat affected zone because the construction of MPC does not require heat treatment for stress relief. An acceptance criteria methodology is being developed for flaw disposition should the crack-like defects be detected by periodic Inservice Inspection. The external loading cases include thermal accident scenarios and cask drop conditions with the contribution from the welding residual stresses. The determination of acceptable flaw size is based on the procedure to evaluate flaw stability provided by American Petroleum Institute (API) 579 Fitness-for-Service (Second Edition). The material mechanical and fracture properties for base and weld metals and the stress analysis results are obtained from the open literature such as NUREG-1864. Subcritical crack growth from stress corrosion cracking (SCC), and its impact on inspection intervals and acceptance criteria, is not addressed.

Lam, P.; Sindelar, R.; Duncan, A.; Adams, T.

2014-04-07T23:59:59.000Z

447

Determining the flaw type from images obtained by the C-SAFT method with account for transformations of wave types upon reflections of ultrasonic pulses from the irregular boundaries of a test object  

Science Journals Connector (OSTI)

The application of antenna arrays (AAs) for obtaining flaw images during automated non-destructive testing is considered. The conventional technique of using an AA as a phased AA has a number of drawbacks. An alt...

E. G. Bazulin

2011-01-01T23:59:59.000Z

448

Model Validation Status Review  

SciTech Connect (OSTI)

The primary objective for the Model Validation Status Review was to perform a one-time evaluation of model validation associated with the analysis/model reports (AMRs) containing model input to total-system performance assessment (TSPA) for the Yucca Mountain site recommendation (SR). This review was performed in response to Corrective Action Request BSC-01-C-01 (Clark 2001, Krisha 2001) pursuant to Quality Assurance review findings of an adverse trend in model validation deficiency. The review findings in this report provide the following information which defines the extent of model validation deficiency and the corrective action needed: (1) AMRs that contain or support models are identified, and conversely, for each model the supporting documentation is identified. (2) The use for each model is determined based on whether the output is used directly for TSPA-SR, or for screening (exclusion) of features, events, and processes (FEPs), and the nature of the model output. (3) Two approaches are used to evaluate the extent to which the validation for each model is compliant with AP-3.10Q (Analyses and Models). The approaches differ in regard to whether model validation is achieved within individual AMRs as originally intended, or whether model validation could be readily achieved by incorporating information from other sources. (4) Recommendations are presented for changes to the AMRs, and additional model development activities or data collection, that will remedy model validation review findings, in support of licensing activities. The Model Validation Status Review emphasized those AMRs that support TSPA-SR (CRWMS M&O 2000bl and 2000bm). A series of workshops and teleconferences was held to discuss and integrate the review findings. The review encompassed 125 AMRs (Table 1) plus certain other supporting documents and data needed to assess model validity. The AMRs were grouped in 21 model areas representing the modeling of processes affecting the natural and engineered barriers, plus the TSPA model itself Description of the model areas is provided in Section 3, and the documents reviewed are described in Section 4. The responsible manager for the Model Validation Status Review was the Chief Science Officer (CSO) for Bechtel-SAIC Co. (BSC). The team lead was assigned by the CSO. A total of 32 technical specialists were engaged to evaluate model validation status in the 21 model areas. The technical specialists were generally independent of the work reviewed, meeting technical qualifications as discussed in Section 5.

E.L. Hardin

2001-11-28T23:59:59.000Z

449

Waste Feed Delivery Environmental Permits and Approvals Plan  

SciTech Connect (OSTI)

This plan describes the environmental permits approvals, and other requirements that may affect establishment of a waste feed delivery system for the Hanford Site's River Protection Project. This plan identifies and screens environmental standards for potential applicability, outlines alternatives for satisfying applicable standards, and describes preferred permitting and approval approaches.

TOLLEFSON, K.S.

2000-01-18T23:59:59.000Z

450

The Initial Allocation of Carbon Permits: Choices and Implications  

E-Print Network [OSTI]

the playing field, and we need other nations to cut emissions. 3. Permit value to R&D, renewable energy Cost MC + carbon tax Demand Fixed pollution per unit output (tons carbon per Kwh). The "demandThe Initial Allocation of Carbon Permits: Choices and Implications Prof. Don Fullerton University

451

Validated SCR Concept Development  

Broader source: Energy.gov (indexed) [DOE]

Validated SCR Concept Development 2007 DEER Conference, Detroit, MI Dr. Michael Traver, IAV Inc James Ireton, IAV Inc Dr. Lutz Krmer, IAV GmbH Jrgen Manns, IAV GmbH Poster...

452

Validating Energy Measures  

E-Print Network [OSTI]

Energy measurements play a very important role in a detailed energy analysis. The role is more important in industrial processes where wide variations of process conditions exist. Valid energy measurements make the decision making process easier...

Chari, S.; Thomas, D.

453

Verification and validation benchmarks.  

SciTech Connect (OSTI)

Verification and validation (V&V) are the primary means to assess the accuracy and reliability of computational simulations. V&V methods and procedures have fundamentally improved the credibility of simulations in several high-consequence fields, such as nuclear reactor safety, underground nuclear waste storage, and nuclear weapon safety. Although the terminology is not uniform across engineering disciplines, code verification deals with assessing the reliability of the software coding, and solution verification deals with assessing the numerical accuracy of the solution to a computational model. Validation addresses the physics modeling accuracy of a computational simulation by comparing the computational results with experimental data. Code verification benchmarks and validation benchmarks have been constructed for a number of years in every field of computational simulation. However, no comprehensive guidelines have been proposed for the construction and use of V&V benchmarks. For example, the field of nuclear reactor safety has not focused on code verification benchmarks, but it has placed great emphasis on developing validation benchmarks. Many of these validation benchmarks are closely related to the operations of actual reactors at near-safety-critical conditions, as opposed to being more fundamental-physics benchmarks. This paper presents recommendations for the effective design and use of code verification benchmarks based on manufactured solutions, classical analytical solutions, and highly accurate numerical solutions. In addition, this paper presents recommendations for the design and use of validation benchmarks, highlighting the careful design of building-block experiments, the estimation of experimental measurement uncertainty for both inputs and outputs to the code, validation metrics, and the role of model calibration in validation. It is argued that the understanding of predictive capability of a computational model is built on the level of achievement in V&V activities, how closely related the V&V benchmarks are to the actual application of interest, and the quantification of uncertainties related to the application of interest.

Oberkampf, William Louis; Trucano, Timothy Guy

2007-02-01T23:59:59.000Z

454

DOE Environmental Assessment EA-1391 for Presidential Permit Applications  

Broader source: Energy.gov (indexed) [DOE]

DOE Environmental Assessment EA-1391 for Presidential Permit DOE Environmental Assessment EA-1391 for Presidential Permit Applications for Baja California Power Inc and Sempra Energy Resources PP-234 and PP-235: Finding of No Significant Impact DOE Environmental Assessment EA-1391 for Presidential Permit Applications for Baja California Power Inc and Sempra Energy Resources PP-234 and PP-235: Finding of No Significant Impact The Department of Energy has determined in its Environmental Assessment EA-1391 for Presidential Permit Applications for Baja California Power Inc and Sempra Energy Resources PP-234 and PP-235 a finding of no significant impact Finding of No Significant Impact: DOE Enviornmental Assessment EA-1391 More Documents & Publications Environmental assessment for presidential permit applications for Baja

455

Air Permits, Licenses, Certifications (Maine) | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Air Permits, Licenses, Certifications (Maine) Air Permits, Licenses, Certifications (Maine) Air Permits, Licenses, Certifications (Maine) < Back Eligibility Agricultural Commercial Construction Fed. Government Fuel Distributor General Public/Consumer Industrial Installer/Contractor Institutional Investor-Owned Utility Local Government Low-Income Residential Multi-Family Residential Municipal/Public Utility Nonprofit Residential Retail Supplier Rural Electric Cooperative Schools State/Provincial Govt Systems Integrator Transportation Tribal Government Utility Program Info State Maine Program Type Siting and Permitting Provider Department of Environmental Protection This program regulates and limits air emissions from a variety of sources within Maine through a statewide permitting program. Separate regulations exist for limiting emissions of nitrogen oxides (NOx), sulfur dioxide

456

City of Asheville - Building Permit Fee Waiver | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

City of Asheville - Building Permit Fee Waiver City of Asheville - Building Permit Fee Waiver City of Asheville - Building Permit Fee Waiver < Back Eligibility Commercial Residential Savings Category Solar Buying & Making Electricity Heating & Cooling Water Heating Wind Program Info Start Date 7/01/2009 State North Carolina Program Type Green Building Incentive Provider Building Safety Department The City of Asheville waives fees for building permits and plan reviews for certain renewable energy technologies and green building certifications for homes and mixed-use commercial buildings. Waivers for building permit fees may apply to residences with the following designations (the regular fee is in parentheses): * HealthyBuilt Home Certification* ($100) * Energy Star Rating ($100) * Geothermal heat pumps ($50)

457

City of Portland - Streamlined Building Permits for Residential Solar  

Broader source: Energy.gov (indexed) [DOE]

Residential Residential Savings Category Solar Buying & Making Electricity Heating & Cooling Water Heating Program Info State Oregon Program Type Green Building Incentive Provider City of Portland The City of Portland's Bureau of Development Services (BDS) developed an electronic permitting process for residential solar energy system installations. With this streamlined, expedited process, solar contractors can submit the project plans and permit application online for residential installations. In order to file the online application, the contractor must first be trained. The City of Portland has staff at the permitting desk trained as solar experts to assist solar contractors who need help filing their permits in person. This process has a turnaround time of approximately 2-3 business days for building permits.

458

Presidential Permits and Export Authorizations - About the Program |  

Broader source: Energy.gov (indexed) [DOE]

Presidential Permits and Export Presidential Permits and Export Authorizations - About the Program Presidential Permits and Export Authorizations - About the Program The Federal international electricity program consists of two elements: 1.Granting Presidential permits for the construction, connection, operation and/or maintenance of electric transmission lines which cross the U.S. international border; and 2.Authorizing exports of electric energy to foreign countries. The authority to grant Presidential permits is derived from the constitutional power of the President to protect the territorial integrity of the United States. The authority to regulate the export of electric energy is based on the statutory authority contained in section 202(e) of the Federal Power Act (FPA). Executive Order 8202, issued by President Roosevelt in 1939, prohibited

459

State Water Permit Regulation (Arkansas) | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Permit Regulation (Arkansas) Permit Regulation (Arkansas) State Water Permit Regulation (Arkansas) < Back Eligibility Fuel Distributor Industrial Utility Program Info State Arkansas Program Type Environmental Regulations Siting and Permitting Provider Department of Environmental Quality It is the purpose of this regulation to adopt standards applicable to the storage, discharge, or disposal of any waste which, if unregulated, will cause pollution of waters of the state or result in wastes being placed in a location where it is likely to cause pollution of the waters of the state. These standards are intended to protect public health and the environment, and prevent, control, or abate pollution. The State Water Permit Regulation is implemented to adopt standards applicable to the storage, discharge, or disposal of any waste that, if

460

Environment/Health/Safety (EHS): Operating Permits for LBNL Activities  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Operating Permits for LBNL Activities Operating Permits for LBNL Activities LBNL Main Site Agency Expiration Date Certified Unified Program Agency Permit and Registration Hazardous Materials Release Response Plan (Hazardous Materials Business Plan) Aboveground Petroleum Storage Tanks, Spill Prevention Control and Countermeasures Plan Underground Storage Tank Program Hazardous Waste Generator Program Tiered Permit Program for Onsite Treatment of Hazardous Wastes City of Berkeley March 1, 2014 Fuel Dispensing Sources at Building 76: E85 Unleaded Bay Area Air Quality Management District July 1, 2014 Stationary Air Emission Sources (28 permits): Diesel-powered Emergency Standby Generators: Buildings 2, 31, 37(2), 48, 50A, 50B, 55, 62, 64(2), 66, 67, 68, 70, 70A, 72, 74, 77, 84B, 85 and three (3) portable units

Note: This page contains sample records for the topic "validation flaw permits" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Technology Validation | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Technology Validation Technology Validation 2009 DOE Hydrogen Program and Vehicle Technologies Program Annual Merit Review and Peer Evaluation Meeting, May 18-22, 2009 --...

462

Wetlands Standard Dredge and Fill Permit (New Hampshire) | Department of  

Broader source: Energy.gov (indexed) [DOE]

Standard Dredge and Fill Permit (New Hampshire) Standard Dredge and Fill Permit (New Hampshire) Wetlands Standard Dredge and Fill Permit (New Hampshire) < Back Eligibility Agricultural Commercial Construction Fed. Government Fuel Distributor General Public/Consumer Industrial Installer/Contractor Institutional Investor-Owned Utility Local Government Low-Income Residential Multi-Family Residential Municipal/Public Utility Nonprofit Residential Retail Supplier Rural Electric Cooperative Schools State/Provincial Govt Systems Integrator Transportation Tribal Government Utility Savings Category Alternative Fuel Vehicles Hydrogen & Fuel Cells Buying & Making Electricity Water Home Weatherization Solar Wind Program Info State New Hampshire Program Type Environmental Regulations Provider Department of Environmental Services

463

City of Santa Monica - Expedited Permitting for Green Buildings |  

Broader source: Energy.gov (indexed) [DOE]

Expedited Permitting for Green Buildings Expedited Permitting for Green Buildings City of Santa Monica - Expedited Permitting for Green Buildings < Back Eligibility Commercial Residential Savings Category Heating & Cooling Home Weatherization Construction Commercial Weatherization Commercial Heating & Cooling Design & Remodeling Bioenergy Solar Lighting Windows, Doors, & Skylights Heating Buying & Making Electricity Water Water Heating Wind Program Info State California Program Type Green Building Incentive Provider City of Santa Monica The City of Santa Monica allows for priority plan check processing for building projects that are registered with the United States Green Building Council for certification under the Leadership in Energy and Environmental Design (LEED) Green Building Rating System. The priority status applies to

464

Model Validation Bernie Lesieutre  

Broader source: Energy.gov (indexed) [DOE]

Model Validation Model Validation Bernie Lesieutre University of Wisconsin lesieutre@wisc.edu 27 June 2013 Washington, DC DOE/OE Transmission Reliability Program 2 Project Objectives To Develop techniques and tools for PMU- and feature-based power system model validation. Background: Our prior proof-of-concept research demonstrated that feature-based sensitivity models can be used to calibrate power system dynamic models. This was applied to the WECC composite load model for oscillatory and FIDVR events. 3 Project Objectives PSLF simulation features features Sensitivity Model (parameters) Measured Data Simulated Data Features Error Adjust Parameters Technical Approach 4 Project Objectives Current Research: Use PMU data to calibrate power plant models. Four Tasks:

465

validation | OpenEI  

Open Energy Info (EERE)

validation validation Dataset Summary Description (Abstract): 31Conclusiones y recomendacionesEl m√©todo de c√°lculo de la radiaci√≥n solar global desarrollado ha obtenido resultadoscomparables a otros m√©todos revisados en la bibliograf√≠a. A diferencia de muchos deestos m√©todos, que han sido ajustados y refinados por sus autores a lo largo de variosa√Īos de trabajo, este es completamente nuevo y parte de un enfoque diferente, por loque tiene un gran potencial de ajuste y sintonizaci√≥n.Algunos cambios que pueden sugerirse son tomar distribuciones espaciales ytemporales Source Instituto de Meteorolog√≠a de Cuba Date Released November 30th, 2005 (9 years ago) Date Updated November 07th, 2007 (7 years ago) Keywords Am√©rica Latina Cuba documentation solar SWERA validation

466

Accelerated Testing Validation  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Testing Validation Testing Validation Rangachary Mukundan (PI), Rodney Borup, John Davey, Roger Lujan Los Alamos National Laboratory Adam Z. Weber Lawrence Berkeley National Laboratory Greg James Ballard Power Systems, Inc Mike Brady Oak Ridge National Laboratory Steve Grot Ion Power, Inc This presentation does not contain any proprietary or confidential information Objective/Barrier/Target The objectives of this project are 3-fold 1. Correlation of the component lifetimes measured in an AST to real-world behavior of that component. 2. Validation of existing ASTs for Catalyst layers and Membranes 3. Development of new ASTs for GDLs, bipolar plates and interfaces Technical Barrier Addressed: A. Durability * Durability of fuel cell systems operating over automotive drive cycles has not

467

Aneuploidy: Cancer's Fatal Flaw?  

E-Print Network [OSTI]

Aneuploidy is a characteristic of cancer, with greater than 90% of all solid tumors in humans carrying an aberrant karyotype. Yet, whether or how this condition contributes to tumorigenesis is not understood. Here we ...

Williams, Bret R.

468

EIS-0414: Presidential Permit Application, Energia Sierra Juarez  

Broader source: Energy.gov (indexed) [DOE]

14: Presidential Permit Application, Energia Sierra Juarez 14: Presidential Permit Application, Energia Sierra Juarez Transmission Line, California EIS-0414: Presidential Permit Application, Energia Sierra Juarez Transmission Line, California Summary This EIS evaluates the potential environmental impacts from DOE's proposed Federal action of granting a Presidential permit to Energia Sierra Juarez U.S. Tranmssion, LLC (ESJ-U.S.), a subsidiary of Sempra Generation, to construct, operate, maintain, and connect a 1.7-mile transmission line (0.65 miles in the U.S.) across the international border between the U.S. and Mexico, near the town of Jacumba, California. The County of San Diego is a cooperating agency in the preparation of this EIS. Public Comment Opportunities No public comment opportunities available at this time.

469

Solar Construction Permitting Standards (California) | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Standards (California) Standards (California) Solar Construction Permitting Standards (California) < Back Eligibility Commercial Industrial Local Government Residential Savings Category Solar Buying & Making Electricity Heating & Cooling Commercial Heating & Cooling Heating Water Heating Program Info State California Program Type Solar/Wind Permitting Standards Two bills signed in 2012 place limits on the fees that cities, counties, cities and counties, and charter cities can charge for a solar permit. AB 1801 specifies that a local government cannot base the fee for a solar permit on the value of the solar system or the value of the property on which the system will be installed. It also requires the local government to separately identify every fee charged on the invoice provided to the

470

File:03CACEncroachmentPermit.pdf | Open Energy Information  

Open Energy Info (EERE)

CACEncroachmentPermit.pdf CACEncroachmentPermit.pdf Jump to: navigation, search File File history File usage File:03CACEncroachmentPermit.pdf Size of this preview: 463 √ó 599 pixels. Other resolution: 464 √ó 600 pixels. Full resolution ‚Äé(1,275 √ó 1,650 pixels, file size: 34 KB, MIME type: application/pdf) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 12:45, 19 November 2012 Thumbnail for version as of 12:45, 19 November 2012 1,275 √ó 1,650 (34 KB) Alevine (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage The following 2 pages link to this file: GRR/Flowcharts GRR/Section 3-CA-c - Encroachment Permit

471

File:03UTFEncroachmentPermit.pdf | Open Energy Information  

Open Energy Info (EERE)

UTFEncroachmentPermit.pdf UTFEncroachmentPermit.pdf Jump to: navigation, search File File history File usage File:03UTFEncroachmentPermit.pdf Size of this preview: 463 √ó 599 pixels. Other resolution: 464 √ó 600 pixels. Full resolution ‚Äé(1,275 √ó 1,650 pixels, file size: 40 KB, MIME type: application/pdf) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 12:15, 30 August 2012 Thumbnail for version as of 12:15, 30 August 2012 1,275 √ó 1,650 (40 KB) Jnorris (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage The following 2 pages link to this file: GRR/Flowcharts GRR/Section 3-UT-f - Encroachment Permit

472

File:04AKBGeophysicalExplorationPermit.pdf | Open Energy Information  

Open Energy Info (EERE)

AKBGeophysicalExplorationPermit.pdf AKBGeophysicalExplorationPermit.pdf Jump to: navigation, search File File history File usage File:04AKBGeophysicalExplorationPermit.pdf Size of this preview: 463 √ó 599 pixels. Other resolution: 464 √ó 600 pixels. Full resolution ‚Äé(1,275 √ó 1,650 pixels, file size: 62 KB, MIME type: application/pdf) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 11:38, 6 August 2012 Thumbnail for version as of 11:38, 6 August 2012 1,275 √ó 1,650 (62 KB) Jnorris (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage The following 2 pages link to this file: GRR/Flowcharts GRR/Section 4-AK-b - Geophysical Exploration Permit

473

Property:Permit/License Buildout (MW) | Open Energy Information  

Open Energy Info (EERE)

Permit/License Buildout (MW) Permit/License Buildout (MW) Jump to: navigation, search Property Name Permit/License Buildout (MW) Property Type String Pages using the property "Permit/License Buildout (MW)" Showing 25 pages using this property. (previous 25) (next 25) M MHK Projects/40MW Lewis project + 40 + MHK Projects/Algiers Light Project + 20 + MHK Projects/Anconia Point Project + 15 + MHK Projects/Ashley Point Project + 148 + MHK Projects/Avalon Tidal + 30 + MHK Projects/Avondale Bend Project + 18 + MHK Projects/BW2 Tidal + 3 + MHK Projects/Bar Field Bend + 94 + MHK Projects/Barfield Point + 114 + MHK Projects/Bayou Latenache + 50 + MHK Projects/Bondurant Chute + 152 + MHK Projects/Breeze Point + 198 + MHK Projects/Brilliant Point Project + 56 + MHK Projects/Brough Head Wave Farm + 200 +

474

City of Riverhead - Energy Conservation Device Permitting Fees | Department  

Broader source: Energy.gov (indexed) [DOE]

City of Riverhead - Energy Conservation Device Permitting Fees City of Riverhead - Energy Conservation Device Permitting Fees City of Riverhead - Energy Conservation Device Permitting Fees < Back Eligibility Commercial Residential Savings Category Solar Buying & Making Electricity Heating & Cooling Water Heating Wind Program Info Start Date 07/01/2005 (retroactive) State New York Program Type Green Building Incentive Provider Building Department In 2006 the Town of Riverhead on Long Island enacted a special allowance in its building permit fee structure to provide a discount to people wishing to install energy conservation devices on residential or commercial buildings. The provision in the town code applies to any energy conservation device "installed in or on a structure which qualifies for any federal, state or local tax exemption, tax credit or tax rebate", but

475

Taxes, Permits, and the Adoption of Abatement Technology under Imperfect  

Open Energy Info (EERE)

Taxes, Permits, and the Adoption of Abatement Technology under Imperfect Taxes, Permits, and the Adoption of Abatement Technology under Imperfect Compliance Jump to: navigation, search Name Taxes, Permits, and the Adoption of Abatement Technology under Imperfect Compliance Agency/Company /Organization Resources for the Future Sector Energy Topics Market analysis, Technology characterizations Resource Type Publications Website http://www.rff.org/RFF/Documen References Taxes, Permits, and the Adoption of Abatement Technology under Imperfect Compliance[1] Abstract "This paper analyzes the effects of the choice between price-based and quantity-based emissions regulations on compliance incentives and social welfare in the presence of incomplete enforcement and technology adoption. We show that if the regulator does not adjust the level of the policies in

476

Policy for Permitting Low-Emitting Sources (West Virginia) | Department  

Broader source: Energy.gov (indexed) [DOE]

Policy for Permitting Low-Emitting Sources (West Virginia) Policy for Permitting Low-Emitting Sources (West Virginia) Policy for Permitting Low-Emitting Sources (West Virginia) < Back Eligibility Utility Fed. Government Commercial Agricultural Investor-Owned Utility State/Provincial Govt Industrial Construction Municipal/Public Utility Local Government Residential Installer/Contractor Rural Electric Cooperative Tribal Government Low-Income Residential Schools Retail Supplier Institutional Multi-Family Residential Systems Integrator Fuel Distributor Nonprofit General Public/Consumer Transportation Program Info State West Virginia Program Type Siting and Permitting While this policy alleviates some requirements on low-emitting emission sources, it does not change the policy of requiring applicants to submit reasonable information concerning all potential emission sources.

477

Permit by Rule for Small Renewable Energy Projects (Virginia) | Department  

Broader source: Energy.gov (indexed) [DOE]

Permit by Rule for Small Renewable Energy Projects (Virginia) Permit by Rule for Small Renewable Energy Projects (Virginia) Permit by Rule for Small Renewable Energy Projects (Virginia) < Back Eligibility Commercial Construction Developer Industrial Investor-Owned Utility Local Government Municipal/Public Utility Rural Electric Cooperative State/Provincial Govt Systems Integrator Tribal Government Utility Savings Category Alternative Fuel Vehicles Hydrogen & Fuel Cells Buying & Making Electricity Water Home Weatherization Solar Wind Program Info State Virginia Program Type Siting and Permitting Provider Virginia Department of Environmental Quality In 2009, the Virginia General Assembly enacted legislation directing the Virginia Department of Environmental Quality to develop regulations for the construction and operation of renewable energy projects of 100 megawatts

478

File:06IDCDrinkingWaterPermit.pdf | Open Energy Information  

Open Energy Info (EERE)

IDCDrinkingWaterPermit.pdf IDCDrinkingWaterPermit.pdf Jump to: navigation, search File File history File usage File:06IDCDrinkingWaterPermit.pdf Size of this preview: 463 √ó 599 pixels. Other resolution: 464 √ó 600 pixels. Full resolution ‚Äé(1,275 √ó 1,650 pixels, file size: 24 KB, MIME type: application/pdf) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 08:14, 29 October 2012 Thumbnail for version as of 08:14, 29 October 2012 1,275 √ó 1,650 (24 KB) Dklein2012 (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage The following page links to this file: GRR/Section 6-ID-c - Drinking Water Permit Retrieved from

479

Disclosure of Permitted Communication Concerning Fossil Fuel Energy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Disclosure of Permitted Communication Concerning Fossil Fuel Energy Disclosure of Permitted Communication Concerning Fossil Fuel Energy Consumption Reduction for New Construction and Major Renovations of Federal Buildings -- Docket No. EERE-2010-BT-STD-0031; RIN 1904-AB96 Disclosure of Permitted Communication Concerning Fossil Fuel Energy Consumption Reduction for New Construction and Major Renovations of Federal Buildings -- Docket No. EERE-2010-BT-STD-0031; RIN 1904-AB96 This memo provides an overview of communications made to DOE staff on the subject of the rulemaking referenced above. The communications occurred at a meeting held on February 13, 2013. DOE 433 ex parte memo.pdf More Documents & Publications Disclosure of Permitted Communication Concerning Regional Standards Enforcement Framework Document -- Docket No. EERE-2011-BT-CE-0077

480

File:06MTCDrinkingWaterPermit.pdf | Open Energy Information  

Open Energy Info (EERE)

MTCDrinkingWaterPermit.pdf MTCDrinkingWaterPermit.pdf Jump to: navigation, search File File history File usage File:06MTCDrinkingWaterPermit.pdf Size of this preview: 463 √ó 599 pixels. Other resolution: 464 √ó 600 pixels. Full resolution ‚Äé(1,275 √ó 1,650 pixels, file size: 11 KB, MIME type: application/pdf) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 11:11, 1 October 2012 Thumbnail for version as of 11:11, 1 October 2012 1,275 √ó 1,650 (11 KB) Dklein2012 (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage The following page links to this file: GRR/Section 6-MT-c - Drinking Water Permit Retrieved from

Note: This page contains sample records for the topic "validation flaw permits" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

DOE to Hold Public Information Meetings on Requested Permit Modifications  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Requested Permit Modifications Requested Permit Modifications CARLSBAD, N.M., March 15, 2001 -- The public is invited to comment on requested modifications to the Hazardous Waste Facility Permit for the Waste Isolation Pilot Plant (WIPP). Submittal of the proposed modification request to the New Mexico Environment Department (NMED) by the U.S. Department of Energy (DOE) begins a formal review process that includes a 60-day public comment period and public information meetings. In its submittal, DOE requests five permit changes to modify conditions at the facility. The proposed modifications conform to industry standards for the handling of hazardous materials and would continue to protect the safety of the facility, its employees, and the public. The first two requested changes would eliminate redundant and obsolete training

482

Comments on RFI on Permitting of Transmission Lines Available | Department  

Broader source: Energy.gov (indexed) [DOE]

Comments on RFI on Permitting of Transmission Lines Available Comments on RFI on Permitting of Transmission Lines Available Comments on RFI on Permitting of Transmission Lines Available April 3, 2012 - 2:12pm Addthis On October 5, 2011, the White House announced the creation of a Rapid Response Team for Transmission (RRTT). In support of the RRTT the Department of Energy's Office of Electricity Delivery and Energy Reliability released a Federal Register Notice seeking information on questions related to permitting of transmission lines. The Request for Information focused on making the development times for generation and transmission more commensurate with one another. Public comments received from the following organizations are now available for review and downloading. - Allegheny Highlands Alliance - American Electric Power

483

File:06NVCDrinkingWaterPermit.pdf | Open Energy Information  

Open Energy Info (EERE)

6NVCDrinkingWaterPermit.pdf 6NVCDrinkingWaterPermit.pdf Jump to: navigation, search File File history File usage File:06NVCDrinkingWaterPermit.pdf Size of this preview: 463 √ó 599 pixels. Other resolution: 464 √ó 600 pixels. Full resolution ‚Äé(1,275 √ó 1,650 pixels, file size: 45 KB, MIME type: application/pdf) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 15:59, 15 October 2012 Thumbnail for version as of 15:59, 15 October 2012 1,275 √ó 1,650 (45 KB) Dklein2012 (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage The following page links to this file: GRR/Section 6-NV-c - Drinking Water Permit Retrieved from

484

File:06ORCDrinkingWaterPermit.pdf | Open Energy Information  

Open Energy Info (EERE)

6ORCDrinkingWaterPermit.pdf 6ORCDrinkingWaterPermit.pdf Jump to: navigation, search File File history File usage File:06ORCDrinkingWaterPermit.pdf Size of this preview: 463 √ó 599 pixels. Other resolution: 464 √ó 600 pixels. Full resolution ‚Äé(1,275 √ó 1,650 pixels, file size: 11 KB, MIME type: application/pdf) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 12:09, 28 September 2012 Thumbnail for version as of 12:09, 28 September 2012 1,275 √ó 1,650 (11 KB) Dklein2012 (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage The following page links to this file: GRR/Section 6-OR-c - Drinking Water Permit Retrieved from

485

EIS-0463: Presidential Permit Application for Northern Pass Transmission,  

Broader source: Energy.gov (indexed) [DOE]

3: Presidential Permit Application for Northern Pass 3: Presidential Permit Application for Northern Pass Transmission, New Hampshire EIS-0463: Presidential Permit Application for Northern Pass Transmission, New Hampshire Summary This EIS will evaluate the potential environmental impacts from DOE's proposed Federal action of granting a Presidential permit to Northern Pass Transmission, LLC, to construct, operate, maintain, and connect a new electric transmission line across the U.S.-Canada border in northern New Hampshire. The U.S. Forest Service, White Mountain National Forest, and the U.S. Army Corps of Engineers, New England District, are cooperating agencies in the preparation of this EIS. Public Comment Opportunities None available at this time. Documents Available for Download September 18, 2013 EIS-0463: Notice of Public Meeting Location Change

486

Coordination of Federal Transmission Permitting on Federal Lands (216(h)) |  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Coordination of Federal Transmission Permitting on Federal Lands (216(h)) Coordination of Federal Transmission Permitting on Federal Lands (216(h)) Coordination of Federal Transmission Permitting on Federal Lands (216(h)) On October 23, 2009, the Department of Energy and eight other Federal agencies entered into a Memorandum of Understanding (MOU) to improve coordination among project applicants, federal agencies, states and tribes involved in the siting and permitting process for electric transmission facilities on Federal land. The MOU will improve uniformity, consistency, and transparency by describing each entity's role and responsibilities when project applicants wish to build electric transmission facilities. Additionally, the MOU designates a "Lead Agency" serving as the single point-of-contact for coordinating all federal environmental reviews

487

Clean Air Interstate Rule (CAIR) Budget Permits (Michigan) | Department  

Broader source: Energy.gov (indexed) [DOE]

Clean Air Interstate Rule (CAIR) Budget Permits (Michigan) Clean Air Interstate Rule (CAIR) Budget Permits (Michigan) Clean Air Interstate Rule (CAIR) Budget Permits (Michigan) < Back Eligibility Utility Fed. Government Commercial Agricultural Investor-Owned Utility State/Provincial Govt Industrial Construction Municipal/Public Utility Local Government Residential Installer/Contractor Rural Electric Cooperative Tribal Government Low-Income Residential Schools Retail Supplier Institutional Multi-Family Residential Systems Integrator Fuel Distributor Nonprofit General Public/Consumer Transportation Program Info State Michigan Program Type Siting and Permitting Michigan implements the federal requirements of the Clean Air Interstate Rule (CAIR) through state regulations. Michigan's Rule 821 requires subject sources to obtain and operate in compliance with a CAIR Annual NOx Budget

488

Microsoft Word - Permit Change 10-23-08  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

New Mexico Environment Department Approves Permit Change for WIPP CARLSBAD, N.M., October 23, 2008 - The New Mexico Environment Department (NMED) today approved a permit change to the U. S. Department of Energy's (DOE) Waste Isolation Pilot Plant (WIPP), which demonstrates that 15 WIPP site locations have been compliant with environmental protection requirements. The permit change eliminates continued sampling and analysis at these locations. Sampling data, collected by DOE over a 10-year period from the 15 locations, indicated that the areas posed no risk to human health or the environment. Last year, DOE submitted a Class 3 permit modification request to NMED to discontinue sampling of the areas, which included a number of mud pits constructed for exploratory boreholes, an evaporation pond and

489

FWS - Habitat Conservation Plans and Incidental Take Permits...  

Open Energy Info (EERE)

webpage outlines the requirements for incidental take permits from the United States Fish and Wildlife Service. Author U.S. Fish and Wildlife Service Published U.S. Fish and...

490

Subsistence Halibut Special Permits Application Page 1 of 8  

E-Print Network [OSTI]

___________________________________ BLOCK B -- SUBSISTENCE HALIBUT COMMUNITY HARVEST (CHP) PERMIT NOTE: Attach any previously issued CHP harvest logs 1. Name of Alaska Native Tribe or Community 2. Name of CHP Coordinator (First, Middle, Last

491

Hawaii Department of Health e-Permitting Portal Webpage | Open...  

Open Energy Info (EERE)

Portal Webpage Jump to: navigation, search OpenEI Reference LibraryAdd to library Web Site: Hawaii Department of Health e-Permitting Portal Webpage Author State of Hawaii...

492

Representing Forecast Error in a Convection-Permitting Ensemble System  

Science Journals Connector (OSTI)

Ensembles provide an opportunity to greatly improve short-term prediction of local weather hazards, yet generating reliable predictions remain a significant challenge. In particular, convection-permitting ensemble forecast systems (CPEFSs) have ...

Glen S. Romine; Craig S. Schwartz; Judith Berner; Kathryn R. Fossell; Chris Snyder; Jeff L. Anderson; Morris L. Weisman

2014-12-01T23:59:59.000Z

493

WAC - 173 - 226 - Waste Discharge General Permit Program | Open...  

Open Energy Info (EERE)

Reference LibraryAdd to library Legal Document- RegulationRegulation: WAC - 173 - 226 - Waste Discharge General Permit ProgramLegal Published NA Year Signed or Took Effect 2002...

494

RCRA Hazardous Waste Part A Permit Application: Instructions...  

Open Energy Info (EERE)

Jump to: navigation, search OpenEI Reference LibraryAdd to library Form: RCRA Hazardous Waste Part A Permit Application: Instructions and Form (EPA Form 8700-23) Abstract This...

495

Hazardous Waste Part A Permit Application | Open Energy Information  

Open Energy Info (EERE)

search OpenEI Reference LibraryAdd to library Legal Document- OtherOther: Hazardous Waste Part A Permit ApplicationLegal Abstract Detailed instructions for filing a RCRA...

496

On-Site Wastewater Treatment Systems: Selecting and Permitting  

E-Print Network [OSTI]

This publication explains factors to consider when choosing an on-site wastewater treatment system and lists the nine steps required to obtain a permit for one. It includes addresses and phone numbers of Texas Natural Resource Conservation...

Lesikar, Bruce J.

2005-04-30T23:59:59.000Z

497

Hawaii Application for Surface Water Use Permit for Proposed...  

Open Energy Info (EERE)

Use Permit for Proposed New Use in a Designated Surface Water Management Area (DLNR Form SWUPA-N) Jump to: navigation, search OpenEI Reference LibraryAdd to library Form: Hawaii...

498

Montana Stream Permitting Guide Webpage | Open Energy Information  

Open Energy Info (EERE)

Guide Webpage Jump to: navigation, search OpenEI Reference LibraryAdd to library Web Site: Montana Stream Permitting Guide Webpage Abstract Provides a guide to required stream...

499

Alaska Air Permit Program Webpage | Open Energy Information  

Open Energy Info (EERE)

Webpage Jump to: navigation, search OpenEI Reference LibraryAdd to library Web Site: Alaska Air Permit Program Webpage Author Division of Air Quality Published Publisher Not...

500

EPA - Permit Applications and Forms webpage | Open Energy Information  

Open Energy Info (EERE)

Forms webpage Jump to: navigation, search OpenEI Reference LibraryAdd to library Web Site: EPA - Permit Applications and Forms webpage Abstract This webpage provides the necessary...