Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Akamai CloudTest before 60 2025.06.02 (12988) allows file inclusion via XML External Entity (XXE) injection. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-49493.yaml | POC Details |
| 2 | None | https://github.com/MuhammadWaseem29/CVE-2025-49493-Poc | POC Details |
| 3 | CVE-2025-49493 | https://github.com/B1ack4sh/Blackash-CVE-2025-49493 | POC Details |
| 4 | This is a Python-based exploit for **CVE-2025-49493**, which affects Akamai CloudTest versions before 60 2025.06.02 (12988). The vulnerability allows for XML External Entity (XXE) injection through the SOAP service endpoint. | https://github.com/SystemVll/CVE-2025-49493 | POC Details |
| 5 | 🛡️ Exploit Akamai's RepositoryService XXE vulnerability (CVE-2025-49493) with this testbed, aiding in secure coding practices and vulnerability assessments. | https://github.com/Soham-id/2025hvv | POC Details |
| 6 | CVE-2025-49493 | https://github.com/Ashwesker/Blackash-CVE-2025-49493 | POC Details |
| 7 | CVE-2025-49493 | https://github.com/Ashwesker/Ashwesker-CVE-2025-49493 | POC Details |
No public POC found.
Login to generate AI POCZaproxy alias impedit expedita quisquam pariatur exercitationem. Nemo rerum eveniet dolores rem quia dignissimos.