<?xml-stylesheet type="text/xsl" href="https://uat.community.rws.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:wfw="http://wellformedweb.org/CommentAPI/"><channel><title>SDL TMS 11.3.1 | CRQ-4775 | Cross-site scripting security vulnerability</title><link>/product-groups/translation_management/tms/b/sdl-tms-113---product-updates/posts/sdl-tms-11-3-1-crq-4775-cross-site-scripting-security-vulnerability</link><description>Symptoms: Pages in SDL TMS that use the returnUrl parameter were vulnerable to cross-site scripting attacks. 
 Explanation: The return URL was not being validated which allowed for injection of JavaScript code into the application resulting in a vulnerability</description><dc:language>en-US</dc:language><generator>Telligent Community 12 Non-Production</generator></channel></rss>