Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 30 Dec 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Meatmeet meatmeet
|
|
| CPEs | cpe:2.3:a:meatmeet:meatmeet:1.1.2.0:*:*:*:pro:android:*:* | |
| Vendors & Products |
Meatmeet meatmeet
|
Thu, 11 Dec 2025 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Meatmeet
Meatmeet meatmeet Pro |
|
| Vendors & Products |
Meatmeet
Meatmeet meatmeet Pro |
Thu, 11 Dec 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-319 | |
| Metrics |
cvssV3_1
|
Wed, 10 Dec 2025 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The mobile application is configured to allow clear text traffic to all domains and communicates with an API server over HTTP. As a result, an adversary located "upstream" can intercept the traffic, inspect its contents, and modify the requests in transit. TThis may result in a total compromise of the user's account if the attacker intercepts a request with active authentication tokens or cracks the MD5 hash sent on login. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-12-11T20:12:46.296Z
Reserved: 2025-11-18T00:00:00.000Z
Link: CVE-2025-65827
Updated: 2025-12-11T20:12:40.882Z
Status : Analyzed
Published: 2025-12-10T21:16:08.473
Modified: 2025-12-30T19:09:32.150
Link: CVE-2025-65827
No data.
OpenCVE Enrichment
Updated: 2025-12-11T21:37:39Z