exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 6 of 6 RSS Feed

Files from Eyal Udassin

Email addresseyal.udassin at c4-security.com
First Active2008-01-26
Last Active2010-01-16
AB Micrologix Denial Of Service / Unauthorized Access
Posted Jan 16, 2010
Authored by Eyal Udassin | Site c4-security.com

Micrologix 1100 and 1400 controllers suffer from multiple vulnerabilities that allow unauthorized control of the PLC. Details of these vulnerabilities will be disclosed only to legitimate parties such as asset owners (utilities), after receiving the approval of the local CERT or any other local official entity.

tags | advisory, local, vulnerability
SHA-256 | 488ad569c5cecbf68d458ed4c08071d485ed70de51bbe59a8bd1260aa745c3cb
PI SystemT Encryption Weakness
Posted Sep 30, 2009
Authored by Eyal Udassin | Site c4-security.com

PI SystemT suffers from an encryption weakness in the default authentication process.

tags | advisory
SHA-256 | 66760cfdf156bb7fea9d0c1b3a2301e13f6007d57c16f6ac806c780ea156375c
E-TerraHabitat Privilege Escalation / DoS
Posted Feb 5, 2009
Authored by Eyal Udassin, Jonathan Afek | Site c4-security.com

C4 SCADA Security Advisory - Areva T+D E-TerraHabitat and E-TerraPlatform solutions suffer from denial of service and privilege escalation vulnerabilities.

tags | exploit, denial of service, vulnerability
advisories | CVE-2009-0211, CVE-2009-0212, CVE-2009-0213, CVE-2009-0214
SHA-256 | 313222dd8a72c861545fb4fffdbb7ca944ab74de61117f8bcd90eb111c777005
proficy-harvest.txt
Posted Jan 26, 2008
Authored by Eyal Udassin | Site c4-security.com

Proficy Information Portal version 2.6 passes a user's password base64 encoded on the wire, allowing for it to be easily intercepted and decoded.

tags | advisory
advisories | CVE-2008-0174
SHA-256 | 193987184fe40b9994e6689d7dd2c17f6e7439290c4cec09274c18a66ec26f1d
proficy-upload.txt
Posted Jan 26, 2008
Authored by Eyal Udassin | Site c4-security.com

Proficy Information Portal version 2.6 has a flaw that allows an authenticated attacker the ability to upload arbitrary code on the server.

tags | advisory, arbitrary, file upload
advisories | CVE-2008-0175
SHA-256 | 8fe8e4b4c25860812b02f54a0cb017e1b4fc3b6c4390039ca199adb32e1f2f6b
cimplicity-heap.txt
Posted Jan 26, 2008
Authored by Eyal Udassin, Gilad Bakas | Site c4-security.com

Cimplicity HMI version 6.1, 6.1 SP5, and 6.1 SP6 all suffer from an exploitable heap overflow vulnerability.

tags | advisory, overflow
advisories | CVE-2008-0176
SHA-256 | ca32e6e16dfac1360f0eada284bc6fe1d217d79e79aab976e43fe12f5359abb4
Page 1 of 1
Back1Next

File Archive:

January 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jan 1st
    0 Files
  • 2
    Jan 2nd
    13 Files
  • 3
    Jan 3rd
    5 Files
  • 4
    Jan 4th
    5 Files
  • 5
    Jan 5th
    9 Files
  • 6
    Jan 6th
    5 Files
  • 7
    Jan 7th
    0 Files
  • 8
    Jan 8th
    0 Files
  • 9
    Jan 9th
    18 Files
  • 10
    Jan 10th
    31 Files
  • 11
    Jan 11th
    30 Files
  • 12
    Jan 12th
    33 Files
  • 13
    Jan 13th
    25 Files
  • 14
    Jan 14th
    0 Files
  • 15
    Jan 15th
    0 Files
  • 16
    Jan 16th
    7 Files
  • 17
    Jan 17th
    25 Files
  • 18
    Jan 18th
    38 Files
  • 19
    Jan 19th
    6 Files
  • 20
    Jan 20th
    21 Files
  • 21
    Jan 21st
    0 Files
  • 22
    Jan 22nd
    0 Files
  • 23
    Jan 23rd
    24 Files
  • 24
    Jan 24th
    68 Files
  • 25
    Jan 25th
    22 Files
  • 26
    Jan 26th
    20 Files
  • 27
    Jan 27th
    0 Files
  • 28
    Jan 28th
    0 Files
  • 29
    Jan 29th
    0 Files
  • 30
    Jan 30th
    0 Files
  • 31
    Jan 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close