In Progress MOVEit Transfer before 2020.1, a malicious user could craft and store a payload within the application. If a victim within the MOVEit Transfer instance interacts with the stored payload, it could invoke and execute arbitrary code within the context of the victim's browser (XSS).
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T16:40:59.958Z
Reserved: 2020-11-16T00:00:00
Link: CVE-2020-28647

No data.

Status : Modified
Published: 2020-11-17T14:15:11.417
Modified: 2024-11-21T05:23:06.047
Link: CVE-2020-28647

No data.