Known vulnerabilities in Progress Software Corporation MOVEit Transfer
Vendor:
Progress Software Corporation
Website:
https://www.progress.com/
Total Security Bulletins:
10
2023.1.16
2024.1.7
2025.0.3
2023.1.15
2023.1.14
2023.1.13
2023.1.12
2023.1.11
2023.1.10
2023.1.9
2023.1.8
2023.1.7
2024.1.6
2024.1.5
2024.1.4
2024.1.3
2024.1.2
2024.1.1
2024.1
2025.0.2
2025.0.1
2025.0
2024.0.2
2023.1.6
2023.0.11
2024.0.1
2024.0.0
2023.1.0
2023.1.5
2023.1.4
2023.1.3
2023.1.2
2023.1.1
2023.0.10
2023.0.9
2023.0.8
2023.0.7
2023.0.6
2023.0.5
2023.0.4
2022.1.8
2022.0.7
2021.1.7
2021.0.9
2020.1.11
2020.1.9
2020.1.8
2020.1.7
2020.1.6
2020.1.5
2020.1.4
2020.1.3
2020.1.2
2020.1.1
2020.1.10
2021.0.8
2021.1.6
2022.0.6
2022.1.7
2023.0.3
2023.0.2
2022.1.6
2022.0.5
2021.1.5
2021.0.7
2023.0.1
2022.1.5
2022.0.4
2021.1.4
2021.0.6
2023.0
2022.1.4
2022.1.3
2022.1.2
2022.1.1
2022.1
2022.0.3
2022.0.2
2022.0.1
2022.0
2021.1.3
2021.1.2
2021.1.1
2021.1
2021.0.5
2021.0.4
2021.0.3
2021.0.2
2021.0.1
2019.1.3
2019.0.4
2018.3
2020.1
2021.0
2019.1.4
2019.2.1
2019.2
2019.1
Security bulletins (10)
| Secuity bulletin | Severity | Status | Published |
|---|---|---|---|
| SB2025110343: Remote denial of service in Progress MOVEit Transfer | Medium | 03.11.2025 | |
| SB2024062616: Authentication bypass in MOVEit Transfer | Critical | 26.06.2024 | |
| SB2023071035: Multiple vulnerabilities in MOVEit Transfer | High | 10.07.2023 | |
| SB2023061603: Remote code execution in MOVEit Transfer | High | 16.06.2023 | |
| SB2023061231: SQL injection in MOVEit Transfer | High | 12.06.2023 | |
| SB2023060205: SQL injection in MOVEit Transfer | Critical | 02.06.2023 | |
| SB2021053003: SQL injection in Progress MOVEit Transfer | Medium | 30.05.2021 | |
| SB2020111736: Cross-site scripting in Progress MOVEit Transfer | Low | 17.11.2020 | |
| SB2020021917: Multiple vulnerabilities in Progress MOVEit Transfer | Medium | 19.02.2020 | |
| SB2019103128: Multiple vulnerabilities in Progress MOVEit Transfer | High | 31.10.2019 |