![]() | ![]() | ![]() | ![]() | ![]() |
Severity: High
Description: SAS Content Server contains a stored cross-site scripting vulnerability.
Potential Impact: A user might unknowingly execute malicious code. This exploit requires an authenticated, authorized user.
Click the Hot Fix tab in this note to access the hot fix for this issue.
Product Family | Product | System | Product Release | SAS Release | ||
Reported | Fixed* | Reported | Fixed* | |||
SAS System | SAS Web Infrastructure Platform | Microsoft® Windows® for x64 | 9.4_M7 | 9.4 TS1M7 | ||
64-bit Enabled AIX | 9.4_M7 | 9.4 TS1M7 | ||||
64-bit Enabled Solaris | 9.4_M7 | 9.4 TS1M7 | ||||
HP-UX IPF | 9.4_M7 | 9.4 TS1M7 | ||||
Linux for x64 | 9.4_M7 | 9.4 TS1M7 | ||||
Solaris for x64 | 9.4_M7 | 9.4 TS1M7 |