News

To view live cyber attacks in real time, visit: norsecorp.com


RSS CVE’s With Public Exploits

  • CVE-2015-2790 March 30, 2015
    Foxit Reader, Enterprise Reader, and PhantomPDF before 7.1 allow remote attackers to cause a denial of service (memory corruption and crash) via a crafted (1) Ubyte Size in a DataSubBlock structure or (2) LZWMinimumCodeSize in a GIF image. (CVSS:4.3) (Last Update:2016-12-02)
  • CVE-2015-2789 March 30, 2015
    Unquoted Windows search path vulnerability in the Foxit Cloud Safe Update Service in the Cloud plugin in Foxit Reader 6.1 through 7.0.6.1126 allows local users to gain privileges via a Trojan horse program in the %SYSTEMDRIVE% folder. (CVSS:4.4) (Last Update:2016-12-02)
  • CVE-2015-2701 March 25, 2015
    Cross-site request forgery (CSRF) vulnerability in CS-Cart 4.2.4 allows remote attackers to hijack the authentication of users for requests that change a user password via a request to profiles-update/. (CVSS:6.8) (Last Update:2016-12-02)

RSS Infosec Island

RSS Packetstorm

  • Micro Focus VisiBroker C++ 8.5 SP2 Memory Corruption October 16, 2017
    Micro Focus VisiBroker C++ version 8.5 SP2 suffers from multiple memory corruption vulnerabilities.
  • Debian Security Advisory 3999-1 October 16, 2017
    Debian Linux Security Advisory 3999-1 – Mathy Vanhoef of the imec-DistriNet research group of KU Leuven discovered multiple vulnerabilities in the WPA protocol, used for authentication in wireless networks. Those vulnerabilities applies to both the access point (implemented in hostapd) and the station (implemented in wpa_supplicant).
  • Webmin 1.850 SSRF / CSRF / Cross Site Scripting October 16, 2017
    Webmin version 1.850 suffers from server side request forgery, cross site request forgery, and cross site scripting vulnerabilities.

Contact Us

Request More Information

Get in touch with an associate from Stealth Entry to learn more about our capabilities using the form below.

Contact Information

  • 614-423-9334
  • 1900 Polaris Pkwy

    Suite 450

    Columbus, Ohio 43240

Full Name*

Email*

Phone

Where did you hear about us?

If other, please explain?

Message*

Please leave this field empty.
OK!