exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 6 of 6 RSS Feed

Files from Eyal Udassin

Email addresseyal.udassin at c4-security.com
First Active2008-01-26
Last Active2010-01-16
AB Micrologix Denial Of Service / Unauthorized Access
Posted Jan 16, 2010
Authored by Eyal Udassin | Site c4-security.com

Micrologix 1100 and 1400 controllers suffer from multiple vulnerabilities that allow unauthorized control of the PLC. Details of these vulnerabilities will be disclosed only to legitimate parties such as asset owners (utilities), after receiving the approval of the local CERT or any other local official entity.

tags | advisory, local, vulnerability
SHA-256 | 488ad569c5cecbf68d458ed4c08071d485ed70de51bbe59a8bd1260aa745c3cb
PI SystemT Encryption Weakness
Posted Sep 30, 2009
Authored by Eyal Udassin | Site c4-security.com

PI SystemT suffers from an encryption weakness in the default authentication process.

tags | advisory
SHA-256 | 66760cfdf156bb7fea9d0c1b3a2301e13f6007d57c16f6ac806c780ea156375c
E-TerraHabitat Privilege Escalation / DoS
Posted Feb 5, 2009
Authored by Eyal Udassin, Jonathan Afek | Site c4-security.com

C4 SCADA Security Advisory - Areva T+D E-TerraHabitat and E-TerraPlatform solutions suffer from denial of service and privilege escalation vulnerabilities.

tags | exploit, denial of service, vulnerability
advisories | CVE-2009-0211, CVE-2009-0212, CVE-2009-0213, CVE-2009-0214
SHA-256 | 313222dd8a72c861545fb4fffdbb7ca944ab74de61117f8bcd90eb111c777005
proficy-harvest.txt
Posted Jan 26, 2008
Authored by Eyal Udassin | Site c4-security.com

Proficy Information Portal version 2.6 passes a user's password base64 encoded on the wire, allowing for it to be easily intercepted and decoded.

tags | advisory
advisories | CVE-2008-0174
SHA-256 | 193987184fe40b9994e6689d7dd2c17f6e7439290c4cec09274c18a66ec26f1d
proficy-upload.txt
Posted Jan 26, 2008
Authored by Eyal Udassin | Site c4-security.com

Proficy Information Portal version 2.6 has a flaw that allows an authenticated attacker the ability to upload arbitrary code on the server.

tags | advisory, arbitrary, file upload
advisories | CVE-2008-0175
SHA-256 | 8fe8e4b4c25860812b02f54a0cb017e1b4fc3b6c4390039ca199adb32e1f2f6b
cimplicity-heap.txt
Posted Jan 26, 2008
Authored by Eyal Udassin, Gilad Bakas | Site c4-security.com

Cimplicity HMI version 6.1, 6.1 SP5, and 6.1 SP6 all suffer from an exploitable heap overflow vulnerability.

tags | advisory, overflow
advisories | CVE-2008-0176
SHA-256 | ca32e6e16dfac1360f0eada284bc6fe1d217d79e79aab976e43fe12f5359abb4
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close