Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

LabRedesCefetRJ — Vulnerabilities & Security Advisories 168

Browse all 168 CVE security advisories affecting LabRedesCefetRJ. AI-powered Chinese analysis, POCs, and references for each vulnerability.

LabRedesCefetRJ operates as a specialized academic laboratory focused on network research and development, primarily serving educational and experimental purposes within the CefetRJ institutional framework. Despite its non-commercial nature, the entity has accumulated a significant security footprint, with 168 Common Vulnerabilities and Exposures (CVEs) currently on record. Historical analysis reveals that these vulnerabilities predominantly stem from legacy web applications and network management interfaces, frequently involving remote code execution, cross-site scripting, and privilege escalation flaws. These issues often arise from outdated software dependencies and insufficient input validation in internal tools used for network simulation and testing. While no major public data breaches have been widely reported, the high volume of disclosed CVEs indicates persistent challenges in maintaining patch hygiene for experimental systems. The profile suggests a need for rigorous lifecycle management to mitigate risks associated with its research infrastructure.

Top products by LabRedesCefetRJ: WeGIA
CVE IDTitleCVSSSeverityPublished
CVE-2025-57761 WeGIA SQL Injection vulnerability via 'id_funcionario' param at endpoint `/html/funcionario/dependente_remover.php` — WeGIACWE-89 9.8AICriticalAI2025-08-21
CVE-2025-55171 WeGIA Anonymous Attacker can Delete Arbitrary Image file at endpoint `/html/personalizacao_remover.php` — WeGIACWE-287 7.5 High2025-08-12
CVE-2025-55170 WeGIA reflected XSS via `verificacao` and `redir_config` param at endpoint `/html/alterar_senha.php` — WeGIACWE-79 6.5 Medium2025-08-12
CVE-2025-55169 WeGIA Path Traversal at endpoint 'html/socio/sistema/download_remessa.php' via parameter 'file' — WeGIACWE-287 7.5AIHighAI2025-08-12
CVE-2025-55168 WeGIA SQL Injection via id_fichamedica at endpoint `GET /html/saude/aplicar_medicamento.php` — WeGIACWE-89 9.8AICriticalAI2025-08-12
CVE-2025-55167 WeGIA SQL Injection via id_fichamedica at endpoint `GET/html/funcionario/dependente_remover.php` — WeGIACWE-89 9.8AICriticalAI2025-08-12
CVE-2025-54079 WeGIA vulnerable to SQL Injection (Blind Time-Based) in endpoint 'Profile_Atendido.php' parameter 'idatendido' — WeGIACWE-89 6.5 -2025-07-18
CVE-2025-54078 WeGIA Reflected Cross-Site Scripting (XSS) vulnerability in endpoint 'personalizacao_imagem.php' parameter 'err' — WeGIACWE-79 6.5 Medium2025-07-18
CVE-2025-54077 WeGIA Reflected Cross-Site Scripting (XSS) vulnerability in endpoint 'personalizacao.php' parameter 'err' — WeGIACWE-79 6.5 Medium2025-07-18
CVE-2025-54076 WeGIA Reflected Cross-Site Scripting (XSS) vulnerability in endpoint 'pre_cadastro_atendido.php' parameter 'msg_e' — WeGIACWE-79 6.5 Medium2025-07-18
CVE-2025-54062 WeGIA SQL Injection (Blind Time-Based) Vulnerability in id_dependente Parameter on profile_dependente.php Endpoint — WeGIACWE-89 9.8AICriticalAI2025-07-17
CVE-2025-54061 WeGIASQL Injection (Blind Time-Based) Vulnerability in idatendido_familiares Parameter on dependente_editarDoc.php Endpoint — WeGIACWE-89 8.1AIHighAI2025-07-17
CVE-2025-54060 WeGIA SQL Injection (Blind Time-Based) Vulnerability in idatendido_familiares Parameter on dependente_editarInfoPessoal.php Endpoint — WeGIACWE-89 8.1AIHighAI2025-07-17
CVE-2025-54058 WeGIA SQL Injection (Blind Time-Based) Vulnerability in idatendido_familiares Parameter on dependente_editarEndereco.php Endpoint — WeGIACWE-89 8.1AIHighAI2025-07-17
CVE-2025-53946 WeGIA vulnerable to SQL Injection in endpoint profile_paciente.php parameter id_fichamedica — WeGIACWE-89 9.1AICriticalAI2025-07-17
CVE-2025-53938 WeGIA vulnerable to Authentication Bypass due to Missing Session Validation in multiple endpoints — WeGIACWE-306 9.1AICriticalAI2025-07-16
CVE-2025-53937 WeGIA has SQL Injection (Blind Time-Based) Vulnerability in `cargo` Parameter on `control.php` Endpoint — WeGIACWE-89 8.8AIHighAI2025-07-16
CVE-2025-53936 WeGIA vulnerable to Reflected Cross-Site Scripting via endpoint `personalizacao_selecao.php` parameter `nome_car` — WeGIACWE-79 6.1AIMediumAI2025-07-16
CVE-2025-53935 WeGIA vulnerable to Reflected Cross-Site Scripting via endpoint `personalizacao_selecao.php` parameter `id` — WeGIACWE-79 6.1AIMediumAI2025-07-16
CVE-2025-53934 WeGIA vulnerable to Stored Cross-Site Scripting via endpoint 'control.php' parameter 'descricao_emergencia' — WeGIACWE-79 5.4AIMediumAI2025-07-16
CVE-2025-53933 WeGIA vulnerable to Stored Cross-Site Scripting via endpoint 'adicionar_enfermidade.php' parameter 'nome' — WeGIACWE-79 5.4AIMediumAI2025-07-16
CVE-2025-53932 WeGIA vulnerable to Reflected Cross-Site Scripting via endpoint 'cadastro_adotante.php' parameter 'cpf' — WeGIACWE-79 6.1AIMediumAI2025-07-16
CVE-2025-53931 WeGIA vulnerable to Stored Cross-Site Scripting via endpoint `adicionar_raca.php` parameter `raca` — WeGIACWE-79 5.4AIMediumAI2025-07-16
CVE-2025-53930 WeGIA vulnerable to Stored Cross-Site Scripting (XSS) via endpoint 'adicionar_especie.php' parameter 'especie' — WeGIACWE-79 5.4AIMediumAI2025-07-16
CVE-2025-53929 WeGIA vulnerable to Stored Cross-Site Scripting (XSS) via endpoint `adicionar_cor.php` parameter `cor` — WeGIACWE-79 5.4AIMediumAI2025-07-16
CVE-2025-53824 WeGIA ReflectedCross-Site Scripting (XSS) vulnerability in endpoint 'cadastro_pet.php' parameter 'msg' — WeGIACWE-79 6.1AIMediumAI2025-07-14
CVE-2025-53823 WeGIA vulnerable to SQL Injection (Blind Time-Based) in `processa_deletar_socio.php` parameter `id_socio` — WeGIACWE-89 9.8AICriticalAI2025-07-14
CVE-2025-53822 WeGIA vulnerable to Reflected Cross-Site Scripting in endpoint 'relatorio_geracao.php' parameter 'tipo_relatorio' — WeGIACWE-79 6.5 Medium2025-07-14
CVE-2025-53821 WeGIA vulnerable to Open Redirect in endpoint 'control.php' parameter 'nextPage' — WeGIACWE-601 4.7 Medium2025-07-14
CVE-2025-53820 WeGIA vulnerable to Cross-Site Scripting (XSS) Reflected via endpoint 'index.php' parameter 'erro' — WeGIACWE-79 6.5 Medium2025-07-14

This page lists every published CVE security advisory associated with LabRedesCefetRJ. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.