CVE-2025-65820
- EPSS 0.06%
- Veröffentlicht 10.12.2025 00:00:00
- Zuletzt bearbeitet 17.12.2025 20:03:27
An issue was discovered in Meatmeet Android Mobile Application 1.1.2.0. An exported activity can be spawned with the mobile application which opens a hidden page. This page, which is not available through the normal flows of the application, contains...
CVE-2025-65826
- EPSS 0.03%
- Veröffentlicht 10.12.2025 00:00:00
- Zuletzt bearbeitet 30.12.2025 19:14:23
The mobile application was found to contain stored credentials for the network it was developed on. If an attacker retrieved this, and found the physical location of the Wi-Fi network, they could gain unauthorized access to the Wi-Fi network of the v...
CVE-2025-65827
- EPSS 0.04%
- Veröffentlicht 10.12.2025 00:00:00
- Zuletzt bearbeitet 30.12.2025 19:09:32
The mobile application is configured to allow clear text traffic to all domains and communicates with an API server over HTTP. As a result, an adversary located "upstream" can intercept the traffic, inspect its contents, and modify the requests in tr...
CVE-2025-65830
- EPSS 0.05%
- Veröffentlicht 10.12.2025 00:00:00
- Zuletzt bearbeitet 30.12.2025 18:46:13
Due to a lack of certificate validation, all traffic from the mobile application can be intercepted. As a result, an adversary located "upstream" can decrypt the TLS traffic, inspect its contents, and modify the requests in transit. This may result i...
CVE-2025-65831
- EPSS 0.02%
- Veröffentlicht 10.12.2025 00:00:00
- Zuletzt bearbeitet 30.12.2025 18:40:54
The application uses an insecure hashing algorithm (MD5) to hash passwords. If an attacker obtained a copy of these hashes, either through exploiting cloud services, performing TLS downgrade attacks on the traffic from a mobile device, or through ano...
CVE-2025-65832
- EPSS 0.02%
- Veröffentlicht 10.12.2025 00:00:00
- Zuletzt bearbeitet 06.01.2026 14:34:03
The mobile application insecurely handles information stored within memory. By performing a memory dump on the application after a user has logged out and terminated it, Wi-Fi credentials sent during the pairing process, JWTs used for authentication,...