![]() | ![]() | ![]() | ![]() | ![]() |
Severity: Low
Description: The web application might allow injection of malicious scripts into an input field within the user management area of the application, which is accessible only to administrators and authorized users.
Potential Impact: A user with administrative rights might unknowingly execute malicious code.
Click the Hot Fix tab in this note to access the hot fix for this issue.
Product Family | Product | System | SAS Release | |
Reported | Fixed* | |||
SAS System | SAS Environment Manager | Microsoft® Windows® for x64 | 9.4 TS1M0 | 9.4 TS1M6 |
64-bit Enabled AIX | 9.4 TS1M0 | 9.4 TS1M6 | ||
64-bit Enabled Solaris | 9.4 TS1M0 | 9.4 TS1M6 | ||
HP-UX IPF | 9.4 TS1M0 | 9.4 TS1M6 | ||
Linux for x64 | 9.4 TS1M0 | 9.4 TS1M6 | ||
Solaris for x64 | 9.4 TS1M0 | 9.4 TS1M6 |