| F6R016 |
| SAS Fraud Management 6.1 |
| Issue(s) Addressed: | Introduced: |
| 65129 | Hot Fix 1 for SAS® Fraud Management 6.1_M0 has been released |
F6R001 |
| 65421 | Hot Fix 2 for SAS® Fraud Management 6.1_M0 has been released |
F6R002 |
| 66067 | SAS® Fraud Management contains a cross-site scripting vulnerability |
F6R003 |
| 66326 | Hot Fix 3 for SAS® Fraud Management 6.1_M0 has been released |
F6R003 |
| 66713 | Hot Fix 4 for SAS® Fraud Management 6.1_M0 has been released |
F6R004 |
| 67228 | Hot Fix 5 for SAS® Fraud Management 6.1_M0 has been released |
F6R005 |
| 67865 | Hot Fix 6 for SAS® Fraud Management 6.1_M0 has been released |
F6R006 |
| 68078 | Hot Fix 7 for SAS® Fraud Management 6.1_M0 has been released |
F6R007 |
| 68386 | Hot Fix 8 for SAS® Fraud Management 6.1_M0 has been released |
F6R008 |
| 69073 | Hot Fix 9 for SAS® Fraud Management 6.1_M0 has been released |
F6R009 |
| 69136 | The HTML Commons component in SAS® 9.4 Web Infrastructure Platform contains a cross-site scripting vulnerability |
F6R010 |
| 69500 | Hot Fix 10 for SAS® Fraud Management 6.1_M0 has been released |
F6R010 |
| 69634 | Hot Fix 11 for SAS® Fraud Management 6.1_M0 has been released |
F6R011 |
| 69745 | Hot Fix 12 for SAS® Fraud Management 6.1_M0 has been released |
F6R012 |
| 70420 | Hot Fix 13 for SAS® Fraud Management 6.1_M0 has been released |
F6R013 |
| 69569 | Python signatures do not persist after running the "ose.sh redeploy" command in SAS® Fraud Management 6.1 |
F6R014 |
| 70691 | Hot Fix 14 for SAS® Fraud Management 6.1_M0 has been released |
F6R014 |
| 71048 | Hot Fix 15 for SAS® Fraud Management 6.1_M0 has been released |
F6R015 |
| 71052 | SAS® Fraud Management contains a remote code execution vulnerability |
F6R015 |
| 71053 | SAS® Fraud Management contains path traversal vulnerabilities |
F6R015 |
| 71054 | SAS® Fraud Management contains regular expression injection vulnerabilities |
F6R015 |
| 71055 | SAS® Fraud Management contains a command injection vulnerability |
F6R015 |
| 71056 | SAS® Fraud Management contains cross-site scripting vulnerabilities |
F6R015 |
| 71057 | SAS® Fraud Management contains vulnerabilities that allow cleartext transmission of sensitive information |
F6R015 |
| 71058 | SAS® Fraud Management contains open redirect vulnerabilities |
F6R015 |
| 71059 | SAS® Fraud Management contains vulnerabilities that allow improper neutralization of CRLF sequences in HTTP headers |
F6R015 |
| 71060 | SAS® Fraud Management contains XML external entity injection vulnerabilities |
F6R015 |
| KB0041232 | Errors occur with the demographic loader job 3008 in SAS® Fraud Management |
F6R016 |
| KB0041348 | SAS® OnDemand Decision Engine stops responding or the Java Virtual Machine (JVM) crashes with a signal segmentation violation (SIGSEGV) |
F6R016 |
| KB0042040 | Incorrect behavior occurs when you set the deploy_testing_rules_ind property to true |
F6R016 |
| KB0042046 | A deployed testing rule that calls the %SHIFTHISTORYARRAY macro will update user-defined variables |
F6R016 |
| KB0042079 | A deployed testing rule that calls the %ACTION_IGNORE_RECOMMENDATION macro impacts the decision returned by a production rule |
F6R016 |
| KB0042080 | SAS® OnDemand Decision Engine reports "Can not updateLookupList: Redeploy or updating of a lookup list already in progress" during start-up |
F6R016 |
| KB0042081 | SAS® Fraud Management does not sufficiently sanitize untrusted input |
F6R016 |
| KB0042083 | You cannot add or change LIBNAME and SQL pass-through options that the rule test and estimation use |
F6R016 |
|
| D indicates that the Documentation has special pre-installation, post-installation or other unique instructions not commonly used for hot fix deployment. |