Stealth Entry

Stealth Entry was founded with one thing in mind – Cyber Security. We bring more than 30 years of combined experience in Cyber Security and Network Engineering in government, private industry, healthcare, and financial services.

  • Your Trusted Security Partner

    Stealth Entry is uniquely qualified to act as your trusted security partner. We work as a part of your team to deliver exceptional results.

  • A Wide Range of Solutions

    We offer highly specialized information security services to Government and Enterprise clients, from network architecture to vulnerability and risk management.

  • Call Us Today – 614-423-9334

    Let us help your business down the path towards complete network security. Call Stealth Entry for a consultation today.

View Stealth Entry LLC, Cyber Security Solutions profile on Ariba Discovery

RSS CVE’s With Public Exploits

  • CVE-2015-2790 March 30, 2015
    Foxit Reader, Enterprise Reader, and PhantomPDF before 7.1 allow remote attackers to cause a denial of service (memory corruption and crash) via a crafted (1) Ubyte Size in a DataSubBlock structure or (2) LZWMinimumCodeSize in a GIF image. (CVSS:4.3) (Last Update:2016-12-02)
  • CVE-2015-2789 March 30, 2015
    Unquoted Windows search path vulnerability in the Foxit Cloud Safe Update Service in the Cloud plugin in Foxit Reader 6.1 through 7.0.6.1126 allows local users to gain privileges via a Trojan horse program in the %SYSTEMDRIVE% folder. (CVSS:4.4) (Last Update:2016-12-02)
  • CVE-2015-2701 March 25, 2015
    Cross-site request forgery (CSRF) vulnerability in CS-Cart 4.2.4 allows remote attackers to hijack the authentication of users for requests that change a user password via a request to profiles-update/. (CVSS:6.8) (Last Update:2016-12-02)

RSS Infosec Island

RSS Packetstorm

  • NewMark CMS 2.1 SQL Injection June 21, 2018
    NewMark CMS version 2.1 suffers from a remote SQL injection vulnerability.
  • LFCMS 3.7.0 Cross Site Request Forgery June 21, 2018
    LFCMS version 3.7.0 suffers from an add user cross site request forgery vulnerability.
  • IPConfigure Orchid VMS 2.0.5 Directory Traversal / Information Disclosure June 21, 2018
    Orchid Core VMS is vulnerable to a directory traversal attack. This affects Linux and Windows operating systems. This allows a remote, unauthenticated attacker to send crafted GET requests to the application, which results in the ability to read arbitrary files outside of the applications web directory. This issue is further compounded as the Linux version […]

Contact Us

Get in touch with an associate from Stealth Entry to learn more about our capabilities.

ADDRESS
1900 Polaris Pkwy, Suite 450-023
Columbus, Ohio 43240