![]() | ![]() | ![]() | ![]() | ![]() |
Severity: Medium
Description: SAS Event Stream Processing Studio might allow injection of malicious scripts into input fields or cause excessive consumption of CPU resources.
Potential Impact: Users might unknowingly execute malicious code.
Click the Hot Fix tab in this note to access the hot fix for this issue.
Product Family | Product | System | Product Release | SAS Release | ||
Reported | Fixed* | Reported | Fixed* | |||
SAS System | SAS Event Stream Processing Engine | Linux for x64 | 5.1 | 5.1 | ||
Microsoft® Windows® for x64 | 5.1 | 5.1 |