![]() | ![]() | ![]() | ![]() |
Severity: Medium
Description: The SAS documentation facility included with multiple web clients of SAS solutions contains a cross-site scripting vulnerability
Potential Impact: Users might unknowingly execute malicious code.
To obtain a fix for this issue, contact SAS Technical Support.
Product Family | Product | System | Product Release | SAS Release | ||
Reported | Fixed* | Reported | Fixed* | |||
SAS System | SAS Help Viewer for the Web | Solaris for x64 | 9.3 | 9.3 | 9.3 TS1M0 | 9.4 TS1M2 |
Linux for x64 | 9.3 | 9.3 | 9.3 TS1M0 | 9.4 TS1M2 | ||
HP-UX IPF | 9.3 | 9.3 | 9.3 TS1M0 | 9.4 TS1M2 | ||
64-bit Enabled Solaris | 9.3 | 9.3 | 9.3 TS1M0 | 9.4 TS1M2 | ||
64-bit Enabled AIX | 9.3 | 9.3 | 9.3 TS1M0 | 9.4 TS1M2 | ||
Microsoft® Windows® for x64 | 9.3 | 9.3 | 9.3 TS1M0 | 9.4 TS1M2 | ||
z/OS | 9.3 | 9.3 | 9.3 TS1M0 | 9.4 TS1M2 |