Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Blueimp | Blueimp jQuery-File-Upload | unspecified ~ 9.22.0 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | A Python PoC for CVE-2018-9206 | https://github.com/Den1al/CVE-2018-9206 | POC Details |
| 2 | A weaponized version of CVE-2018-9206 | https://github.com/Stahlz/JQShell | POC Details |
| 3 | cve-2018-9206 | https://github.com/cved-sources/cve-2018-9206 | POC Details |
| 4 | jquery file upload poc | https://github.com/mi-hood/CVE-2018-9206 | POC Details |
| 5 | Blueimp's jQuery File Upload | https://github.com/MikeyPPPPPPPP/CVE-2018-9206 | POC Details |
| 6 | None | https://github.com/liemkaka/CVE-2018-9206 | POC Details |
| 7 | None | https://github.com/flame-11/CVE-2018-9206-jquery-file-upload | POC Details |
| 8 | Blueimp jQuery-File-Upload v9.22.0 contains an unauthenticated arbitrary file upload caused by insufficient validation in the upload component, letting remote attackers upload malicious files, exploit requires no authentication. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2018/CVE-2018-9206.yaml | POC Details |
No public POC found.
Login to generate AI POCNo comments yet