Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

LabRedesCefetRJ — Vulnerabilities & Security Advisories 174

Browse all 174 CVE security advisories affecting LabRedesCefetRJ. AI-powered Chinese analysis, POCs, and references for each vulnerability.

LabRedesCefetRJ operates as a specialized academic laboratory focused on network research and development, primarily serving educational and experimental purposes within the CefetRJ institutional framework. Despite its non-commercial nature, the entity has accumulated a significant security footprint, with 168 Common Vulnerabilities and Exposures (CVEs) currently on record. Historical analysis reveals that these vulnerabilities predominantly stem from legacy web applications and network management interfaces, frequently involving remote code execution, cross-site scripting, and privilege escalation flaws. These issues often arise from outdated software dependencies and insufficient input validation in internal tools used for network simulation and testing. While no major public data breaches have been widely reported, the high volume of disclosed CVEs indicates persistent challenges in maintaining patch hygiene for experimental systems. The profile suggests a need for rigorous lifecycle management to mitigate risks associated with its research infrastructure.

Found 174 results / 174Clear Filters
Top products by LabRedesCefetRJ: WeGIA
CVE IDTitleCVSSSeverityPublished
CVE-2026-23731 WeGIA Clickjacking Vulnerability — WeGIACWE-1021 4.3 Medium2026-01-16
CVE-2026-23730 WeGIA has an Open Redirect Vulnerability in control.php Endpoint via nextPage Parameter (metodo=listarTodos, nomeClasse=ProdutoControle) — WeGIACWE-601 6.1 -2026-01-16
CVE-2026-23729 WeGIA has an Open Redirect Vulnerability in control.php Endpoint via nextPage Parameter (metodo=listarDescricao, nomeClasse=ProdutoControle) — WeGIACWE-601 6.1 -2026-01-16
CVE-2026-23728 WeGIA has an Open Redirect Vulnerability in control.php Endpoint via nextPage Parameter (metodo=listarTodos, nomeClasse=DestinoControle) — WeGIACWE-601 6.1 -2026-01-16
CVE-2026-23727 WeGIA has an Open Redirect Vulnerability in control.php Endpoint via nextPage Parameter (metodo=listarTodos, nomeClasse=TipoSaidaControle) — WeGIACWE-601 6.1 -2026-01-16
CVE-2026-23726 WeGIA has an Open Redirect Vulnerability in control.php Endpoint via nextPage Parameter (metodo=listarTodos, nomeClasse=TipoEntradaControle) — WeGIACWE-601 6.1 -2026-01-16
CVE-2026-23725 WeGIA Stored Cross-Site Scripting (XSS) – nome Parameter on Adopters Information Page — WeGIACWE-79 5.4 -2026-01-16
CVE-2026-23724 WeGIA Stored Cross-Site Scripting (XSS) – atendido_idatendido Parameter on Occurrence Registration Page — WeGIACWE-79 4.3 Medium2026-01-16
CVE-2026-23722 WeGIA has a Reflected Cross-Site Scripting (XSS) vulnerability allowing arbitrary code execution and UI redressing. — WeGIACWE-79 9.1 Critical2026-01-16
CVE-2026-23723 WeGIA has a Critical SQL Injection in Atendido_ocorrenciaControle via id_memorando parameter — WeGIACWE-89 7.2 High2026-01-16
CVE-2025-67501 WeGIA is vulnerable to SQL Injection via editar_categoria endpoint parameter — WeGIACWE-89 8.8AIHighAI2025-12-09
CVE-2025-67496 WeGia is Vulnerable to XSS through id_pessoa Parameter on Password Configuration Page — WeGIACWE-79 4.3 Medium2025-12-09
CVE-2025-62598 WeGIA Vulnerable to Reflected Cross-Site Scripting via Endpoint 'pessoa/editar_info_pessoal.php' Parameter 'action' — WeGIACWE-79 6.1AIMediumAI2025-10-21
CVE-2025-62597 WeGIA Vulnerable to Reflected Cross-Site Scripting via Endpoint 'pessoa/editar_info_pessoal.php' Parameter 'sql' — WeGIACWE-79 6.1AIMediumAI2025-10-21
CVE-2025-62361 WeGIA Open Redirect Vulnerability in `control.php` endpoint `nextPage` parameter (metodo=listarTodos nomeClasse=AlmoxarifeControle) — WeGIACWE-601 6.1AIMediumAI2025-10-13
CVE-2025-62360 WeGIA SQL Injection via 'id_dependente' param at endpoint `/html/funcionario/dependente_documento.php` — WeGIACWE-89 8.8AIHighAI2025-10-13
CVE-2025-62359 WeGIA Cross-Site Scripting (XSS) Reflected endpoint id_pet — WeGIACWE-79 6.1AIMediumAI2025-10-13
CVE-2025-62358 WeGIA Reflected XSS to Account TakeOver at /html/configuracao/configuracao_geral.php via log parameter — WeGIACWE-79 5.4 Medium2025-10-13
CVE-2025-62179 WeGIA SQL Injection via 'cpf' param at endpoint `/html/funcionario/cadastro_funcionario_pessoa_existente.php` — WeGIACWE-89 8.8AIHighAI2025-10-13
CVE-2025-62178 WeGIA Cross-Site Scripting (XSS) Reflected endpoint '/html/atendido/cadastro_atendido_parentesco_pessoa_nova.php' parameter 'idatendido' — WeGIACWE-79 3.5 Low2025-10-13
CVE-2025-62177 WeGIA vulnerable to SQL Injection via 'id_funcionario' param at endpoint `/html/funcionario/dependente_listar.php` — WeGIACWE-89 8.8AIHighAI2025-10-13
CVE-2025-61665 WeGIA: Broken Access Control in `get_relatorios_socios.php` Endpoint — WeGIACWE-287 7.5 -2025-10-02
CVE-2025-61606 WeGIA: Open Redirect Vulnerability in `control.php` endpoint — WeGIACWE-601 6.1 -2025-10-02
CVE-2025-61605 WeGIA: SQL Injection (Blind Time-Based) Vulnerability in /pet/profile_pet.php Endpoint — WeGIACWE-89 9.8 -2025-10-02
CVE-2025-61604 WeGIA: Cross-Site Request Forgery (CSRF) Vulnerability in `control.php` Endpoint — WeGIACWE-352 6.5 -2025-10-02
CVE-2025-61603 WeGIA: SQL Injection (Blind Time-Based) Vulnerability in API `descricao` Parameter — WeGIACWE-89 9.8 -2025-10-02
CVE-2025-59939 WeGIA vulnerable to SQL Injection into method `excluir` of the `ProdutoControle` class in the parameter `id_produto`. — WeGIACWE-89 8.8 High2025-09-27
CVE-2025-58745 WeGIA has a bypass for the fix for CVE-2025-22133 - Arbitrary File Upload leads to Remote Code Execution (RCE) — WeGIACWE-94 10.0 Critical2025-09-08
CVE-2025-58454 WeGIA vulnerable to Blind Time-Based SQL Injection in endpoint 'listar_despachos.php' parameter 'id_memorando' — WeGIACWE-89 6.5AIMediumAI2025-09-08
CVE-2025-58453 WeGIA vulnerable to Blind Time-Based SQL Injection in endpoint 'exibe_anexo.php' parameter 'id_anexo' — WeGIACWE-89 6.5AIMediumAI2025-09-08

This page lists every published CVE security advisory associated with LabRedesCefetRJ. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.