Stealth Entry

Stealth Entry was founded with one thing in mind – Cyber Security. We bring more than 30 years of combined experience in Cyber Security and Network Engineering in government, private industry, healthcare, and financial services.

  • Your Trusted Security Partner

    Stealth Entry is uniquely qualified to act as your trusted security partner. We work as a part of your team to deliver exceptional results.

  • A Wide Range of Solutions

    We offer highly specialized information security services to Government and Enterprise clients, from network architecture to vulnerability and risk management.

  • Call Us Today – 614-423-9334

    Let us help your business down the path towards complete network security. Call Stealth Entry for a consultation today.

RSS CVE’s With Public Exploits

  • CVE-2015-2790 March 30, 2015
    Foxit Reader, Enterprise Reader, and PhantomPDF before 7.1 allow remote attackers to cause a denial of service (memory corruption and crash) via a crafted (1) Ubyte Size in a DataSubBlock structure or (2) LZWMinimumCodeSize in a GIF image. (CVSS:4.3) (Last Update:2016-12-02)
  • CVE-2015-2789 March 30, 2015
    Unquoted Windows search path vulnerability in the Foxit Cloud Safe Update Service in the Cloud plugin in Foxit Reader 6.1 through 7.0.6.1126 allows local users to gain privileges via a Trojan horse program in the %SYSTEMDRIVE% folder. (CVSS:4.4) (Last Update:2016-12-02)
  • CVE-2015-2701 March 25, 2015
    Cross-site request forgery (CSRF) vulnerability in CS-Cart 4.2.4 allows remote attackers to hijack the authentication of users for requests that change a user password via a request to profiles-update/. (CVSS:6.8) (Last Update:2016-12-02)

RSS Infosec Island

RSS Packetstorm

  • Micro Focus VisiBroker C++ 8.5 SP2 Memory Corruption October 16, 2017
    Micro Focus VisiBroker C++ version 8.5 SP2 suffers from multiple memory corruption vulnerabilities.
  • Debian Security Advisory 3999-1 October 16, 2017
    Debian Linux Security Advisory 3999-1 - Mathy Vanhoef of the imec-DistriNet research group of KU Leuven discovered multiple vulnerabilities in the WPA protocol, used for authentication in wireless networks. Those vulnerabilities applies to both the access point (implemented in hostapd) and the station (implemented in wpa_supplicant).
  • Webmin 1.850 SSRF / CSRF / Cross Site Scripting October 16, 2017
    Webmin version 1.850 suffers from server side request forgery, cross site request forgery, and cross site scripting vulnerabilities.

Contact Us

Get in touch with an associate from Stealth Entry to learn more about our capabilities.

Please leave this field empty.
OK!

ADDRESS
1900 Polaris Pkwy, Suite 450-023
Columbus, Ohio 43240