Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | CVE-2019-16097 PoC | https://github.com/evilAdan0s/CVE-2019-16097 | POC Details |
| 2 | CVE-2019-16097-batch | https://github.com/rockmelodies/CVE-2019-16097-batch | POC Details |
| 3 | None | https://github.com/ianxtianxt/CVE-2019-16097 | POC Details |
| 4 | cve-2019-1609 | https://github.com/dacade/cve-2019-16097 | POC Details |
| 5 | harbor(<1.7.6/1.8.3) privilege escalation (CVE-2019-16097) | https://github.com/theLSA/harbor-give-me-admin | POC Details |
| 6 | Harbor 未授权创建管理员漏洞原理 docker及poc[基于pocsuite框架] | https://github.com/luckybool1020/CVE-2019-16097 | POC Details |
| 7 | A simple workflow that runs all Harbor related nuclei templates on a given target. | https://github.com/projectdiscovery/nuclei-templates/blob/main/workflows/harbor-workflow.yaml | POC Details |
| 8 | Harbor 1.7.0 through 1.8.2 is susceptible to privilege escalation via core/api/user.go, which allows allows non-admin users to create admin accounts via the POST /api/users API when Harbor is setup with DB as an authentication backend and allows user to do self-registration. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2019/CVE-2019-16097.yaml | POC Details |
| 9 | None | https://github.com/Threekiii/Awesome-POC/blob/master/Web%E5%BA%94%E7%94%A8%E6%BC%8F%E6%B4%9E/Harbor%20%E6%9C%AA%E6%8E%88%E6%9D%83%E5%88%9B%E5%BB%BA%E7%AE%A1%E7%90%86%E5%91%98%E6%BC%8F%E6%B4%9E%20CVE-2019-16097.md | POC Details |
No public POC found.
Login to generate AI POCNo comments yet