Steven Seeley

Steven Seeley has years of experience in application security, reverse engineering and exploit development. Currently he is a Content Developer & Security Researcher for Offensive Security. Previously, Steven has been a member of the (in)famous Corelan Security Team and has taught advanced PHP vulnerability analysis and exploitation in Mexico at the Instituto Polit├ęcnico Nacional University. Steven continues to push to boundaries of application security research and enjoys collaborating research efforts with likeminded individuals.




PoC Exploits by Steven Seeley


CVEs Disclosed by Steven Seeley

09/11 CVE-2020-16875

A remote code execution vulnerability exists in Microsoft Exchange server due to improper validation of cmdlet...

7.2 HIGH
09/11 CVE-2020-1523

A tampering vulnerability exists when Microsoft SharePoint Server fails to properly handle profile data, aka 'Microsoft...

4.3 MEDIUM
09/11 CVE-2020-1440

A tampering vulnerability exists when Microsoft SharePoint Server fails to properly handle profile data, aka 'Microsoft...

4.3 MEDIUM
07/20 CVE-2020-12027

All versions of FactoryTalk View SE disclose the hostnames and file paths for certain files within the system. A remote,...

4.3 MEDIUM
07/16 CVE-2020-12015

A specially crafted communication packet sent to the affected systems could cause a denial-of-service condition due to...

7.5 HIGH
07/14 CVE-2020-12025

Rockwell Automation Logix Designer Studio 5000 Versions 32.00, 32.01, and 32.02 vulnerable to an xml external entity...

3.3 LOW
06/16 CVE-2020-7493

A CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability exists in...

7.8 HIGH
06/15 CVE-2020-12001

FactoryTalk Linx versions 6.00, 6.10, and 6.11, RSLinx Classic v4.11.00 and prior,Connected Components Workbench:...

9.8 CRITICAL
06/09 CVE-2020-12000

The affected product is vulnerable to the handling of serialized data. The issue results from the lack of proper...

7.5 HIGH
04/22 CVE-2020-8867

This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of OPC...

7.5 HIGH

This page is open source. Noticed a typo? Or something missing?

Improve this page