Symantec Endpoint Protection Manager 11/12 SAP XML Parser xml external entity reference

A vulnerability classified as critical has been found in Symantec Endpoint Protection Manager 11/12 (Anti-Malware Software). This affects an unknown function of the component SAP XML Parser. Upgrading to version 11.0 RU7-MP4a (11.0.7405.1424) or 12.1 RU4a (12.1.4023.4080) eliminates this vulnerability. The upgrade is hosted for download at symantec.flexnetoperations.com.It is possible to mitigate the weakness by firewalling tcp/9090 (http) / tcp/8443 (https). The best possible mitigation is suggested to be upgrading to the latest version. Possible mitigation has been published immediately after the disclosure of the vulnerability. Furthermore, it is possible to detect and prevent this kind of attack with TippingPoint and the filter 13706.

Common Vulnerabilityies and Exposures

Contact us to get started

CVE-2025-23208 : ZOT UP TO 2.1.1 API SETUSERGROUPS PRIVILEGES MANAGEMENT

CVE-2025-23208 : ZOT UP TO 2.1.1 API SETUSERGROUPS PRIVILEGES MANAGEMENT

Description zot is a production-ready vendor-neutral OCI image registry. The group data stored for users in the boltdb database (meta.db)

CVE-2024-12867 : ARCTIC SECURITY ARCTIC HUB UP TO 5.5.1872 CONFIGURATION SERVER-SIDE REQUEST FORGERY

CVE-2024-12867 : ARCTIC SECURITY ARCTIC HUB UP TO 5.5.1872 CONFIGURATION SERVER-SIDE REQUEST FORGERY

Description Server-Side Request Forgery in URL Mapper in Arctic Security’s Arctic Hub versions 3.0.1764-5.6.1877 allows an unauthenticated remote attacker to

CVE-2024-12840 : RED HAT SATELLITE HTTP PROXY SERVER-SIDE REQUEST FORGERY

CVE-2024-12840 : RED HAT SATELLITE HTTP PROXY SERVER-SIDE REQUEST FORGERY

Description A server-side request forgery exists in Satellite. When a PUT HTTP request is made to /http_proxies/test_connection, when supplied with