![]() | ![]() | ![]() | ![]() | ![]() |
Severity: Medium
Description: URL parameters are not validated, which allows a reflected cross-site scripting (XSS) vulnerability to exist.
Potential Impact: HTML or JavaScript code could be injected into a web page.
Click the Hot Fix tab in this note to access the hot fix for this issue.
This security vulnerability is fixed in Hot Fix 4 (A5T005).
Product Family | Product | System | Product Release | SAS Release | ||
Reported | Fixed* | Reported | Fixed* | |||
SAS System | SAS Anti-Money Laundering | Microsoft® Windows® for x64 | 7.1 | |||
64-bit Enabled AIX | 7.1 | |||||
64-bit Enabled Solaris | 7.1 | |||||
Linux for x64 | 7.1 |