
KELLY FORSLUND INC
None



None

clé tile is a design company pushing creative boundaries of surfaces while honoring craft, heritage, and soul. We design, produce, and source artisan handcrafted tile from around the world, frequently collaborating with artists and makers whose artisan lineages often stretch back several centuries. We believe in using surface design to tell stories, add emotion and excitement into design, and bring more joy to life. Founded in 2013 by Deborah Osburn, clé tile brings unparalleled style and artisanal craftsmanship to spaces worldwide. For more information, please visit: www.clétile.com.
Security & Compliance Standards Overview












No incidents recorded for KELLY FORSLUND INC in 2026.
No incidents recorded for clé tile in 2026.
KELLY FORSLUND INC cyber incidents detection timeline including parent company and subsidiaries
clé tile cyber incidents detection timeline including parent company and subsidiaries
Last 3 Security & Risk Events by Company
Hirschmann EagleSDV version 05.4.01 prior to 05.4.02 contains a denial-of-service vulnerability that causes the device to crash during session establishment when using TLS 1.0 or TLS 1.1. Attackers can trigger a crash by initiating TLS connections with these protocol versions to disrupt service availability.
The stored API keys in temporary browser client is not marked as protected allowing for JavScript console or other errors to allow for extraction of the encryption credentials.
XSS vulnerability in cveInterface.js allows for inject HTML to be passed to display, as cveInterface trusts input from CVE API services
Multiple reflected cross-site scripting (XSS) vulnerabilities in the login.php endpoint of Interzen Consulting S.r.l ZenShare Suite v17.0 allows attackers to execute arbitrary Javascript in the context of the user's browser via a crafted URL injected into the codice_azienda and red_url parameters.
A reflected cross-site scripting (XSS) vulnerability in the login_newpwd.php endpoint of Interzen Consulting S.r.l ZenShare Suite v17.0 allows attackers to execute arbitrary Javascript in the context of the user's browser via a crafted URL injected into the codice_azienda parameter.