Stealth Entry

Stealth Entry was founded with one thing in mind – Cyber Security. We bring more than 30 years of combined experience in Cyber Security and Network Engineering in government, private industry, healthcare, and financial services.

  • Your Trusted Security Partner

    Stealth Entry is uniquely qualified to act as your trusted security partner. We work as a part of your team to deliver exceptional results.

  • A Wide Range of Solutions

    We offer highly specialized information security services to Government and Enterprise clients, from network architecture to vulnerability and risk management.

  • Call Us Today – 614-423-9334

    Let us help your business down the path towards complete network security. Call Stealth Entry for a consultation today.

View Stealth Entry LLC, Cyber Security Solutions profile on Ariba Discovery

RSS CVE’s With Public Exploits

  • CVE-2015-2790 March 30, 2015
    Foxit Reader, Enterprise Reader, and PhantomPDF before 7.1 allow remote attackers to cause a denial of service (memory corruption and crash) via a crafted (1) Ubyte Size in a DataSubBlock structure or (2) LZWMinimumCodeSize in a GIF image. (CVSS:4.3) (Last Update:2016-12-02)
  • CVE-2015-2789 March 30, 2015
    Unquoted Windows search path vulnerability in the Foxit Cloud Safe Update Service in the Cloud plugin in Foxit Reader 6.1 through allows local users to gain privileges via a Trojan horse program in the %SYSTEMDRIVE% folder. (CVSS:4.4) (Last Update:2016-12-02)
  • CVE-2015-2701 March 25, 2015
    Cross-site request forgery (CSRF) vulnerability in CS-Cart 4.2.4 allows remote attackers to hijack the authentication of users for requests that change a user password via a request to profiles-update/. (CVSS:6.8) (Last Update:2016-12-02)

RSS Infosec Island

  • SOC Automation: Good or Evil? May 24, 2018
    The need for SOC automation is increasing in urgency since adversaries are also harnessing software and hardware to develop and carry out attacks.
  • Can Organisations Turn Back Time after a Cyber-Attack? May 23, 2018
    With the costs of breaches escalating, it’s more important than ever to have the capability to learn from incidents to avoid history repeating itself.
  • The AWS Bucket List for Security May 23, 2018
    Professor Avishai Wool, CTO and co-founder at AlgoSec, looks at how organizations can ensure network security is extended to AWS environments

RSS Packetstorm

  • TOR Virtual Network Tunneling Tool May 24, 2018
    Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks […]
  • D-Link DSL-2750B OS Command Injection May 24, 2018
    This Metasploit module exploits a remote command injection vulnerability in D-Link DSL-2750B devices. Vulnerability can be exploited through "cli" parameter that is directly used to invoke "ayecli" binary. Vulnerable firmwares are from 1.01 up to 1.03.
  • Ubuntu Security Notice USN-3598-2 May 24, 2018
    Ubuntu Security Notice 3598-2 - USN-3598-1 fixed a vulnerability in curl. This update provides the corresponding update for Ubuntu 12.04 ESM. Phan Thanh discovered that curl incorrectly handled certain FTP paths. An attacker could use this to cause a denial of service or possibly execute arbitrary code. Various other issues were also addressed.

Contact Us

Get in touch with an associate from Stealth Entry to learn more about our capabilities.

1900 Polaris Pkwy, Suite 450-023
Columbus, Ohio 43240