1n3

4 exploits Active since Jan 2015
CVE-2015-0235 NOMISEC WORKING POC
Exim GHOST (glibc gethostbyname) Buffer Overflow
Heap-based buffer overflow in the __nss_hostname_digits_dots function in glibc 2.2, and other 2.x versions before 2.18, allows context-dependent attackers to execute arbitrary code via vectors related to the (1) gethostbyname or (2) gethostbyname2 function, aka "GHOST."
4 stars
EIP-2026-114564 EXPLOITDB text WRITEUP
Zabbix 2.2.x/3.0.x - SQL Injection
CVE-2015-0235 EXPLOITDB python WORKING POC
Exim GHOST (glibc gethostbyname) Buffer Overflow
Heap-based buffer overflow in the __nss_hostname_digits_dots function in glibc 2.2, and other 2.x versions before 2.18, allows context-dependent attackers to execute arbitrary code via vectors related to the (1) gethostbyname or (2) gethostbyname2 function, aka "GHOST."
EIP-2026-100653 EXPLOITDB text WORKING POC
IPSwitch MOVEit 8.1 < 9.4 - Cross-Site Scripting