Here is a sample.
============================================================================
2. Cross-site scripting (reflected)
Summary
Severity: High
Confidence: Certain
Host: https://www.xxx.com
Path: /atlas/Telerik.Web.UI.WebResource.axd
Issue detail
The value of the _TSM_HiddenField_ request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 50c33'%3balert(1)//8f999a4adfd was submitted in the _TSM_HiddenField_ parameter. This input was echoed as 50c33';alert(1)//8f999a4adfd in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
=========================================================================================
I have searched release notes and I have not been able to find a fix for this issue.