Jesse Hertz

3 exploits Active since Jul 2016
CVE-2016-4997 METASPLOIT HIGH ruby WORKING POC
Linux Kernel 4.6.3 Netfilter Privilege Escalation
The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel before 4.6.3 allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement.
CVSS 7.8
CVE-2016-4998 METASPLOIT HIGH ruby WORKING POC
Linux Kernel < 4.5.5 - Memory Corruption
The IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel before 4.6 allows local users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from kernel heap memory by leveraging in-container root access to provide a crafted offset value that leads to crossing a ruleset blob boundary.
CVSS 7.1
EIP-2026-118396 EXPLOITDB ruby WORKING POC
DarkComet Server - Arbitrary File Download (Metasploit)