Webpagetest project Vulnerabilities

Comprehensive security vulnerability database for Webpagetest project products

Last updated: Mar 8, 2017
Total CVEs

3

Critical

0

With Exploits

3

Last 30 Days

0

Severity Distribution

Critical0
0%
High0
0%
Medium3
100%
Low0
0%
DescriptionVendor / ProductExploit Status
CVE-2017-65416.1

An attacker can inject and run malicious scripts in a user's browser when they visit a specific page on the webpagetest site, potentially stealing sensitive information or manipulating the user's session. This occurs because the site does not properly filter user input, allowing harmful code to be executed if a user is tricked into clicking a specially crafted link.

webpagetest projectwebpagetest
Exploit Available
almost 9 years agoMar 8, 2017
CVE-2017-65376.1

An attacker can inject and run malicious scripts in a user's browser when they visit a specific page on a vulnerable webpagetest site. This happens because the site doesn't properly filter user input for a color setting, allowing the attacker to manipulate the page's content if they can trick someone into visiting a crafted link.

webpagetest projectwebpagetest
Exploit Available
almost 9 years agoMar 8, 2017
CVE-2017-63966.1

An attacker can inject malicious HTML and script code into a web page, which could then run in the browser of anyone visiting that page. This vulnerability occurs because the application does not properly filter the data provided by users, allowing the attacker to exploit it without needing special access.

webpagetest projectwebpagetest
Exploit Available
almost 9 years agoMar 2, 2017

About Webpagetest project Security

This page tracks all publicly disclosed security vulnerabilities (CVEs) affecting Webpagetest project products. Our database is updated in real-time from the National Vulnerability Database (NVD) and enriched with exploit information from GitHub and other security research sources.

Each CVE listing includes CVSS severity scores, exploit availability status, AI-powered vulnerability summaries, and links to official patches and security advisories.