NVD Vulnerabilities

Severity Distribution

Publication Trend

Vulnerability Database

CVE ID Description Published Base Score Attack Vector Severity Actions
CVE-2025-67460 Protection Mechanism Failure of Software Downgrade in Zoom Rooms for Windows before 6.6.0 may allow an unauthenticated user to conduct an escalation o... 2025-12-10 7.8 LOCAL HIGH NVD
CVE-2025-65950 WBCE CMS is a content management system. In versions 1.6.4 and below, the user management module allows a low-privileged authenticated user with permi... 2025-12-10 9.4 NETWORK CRITICAL NVD
CVE-2025-65832 The mobile application insecurely handles information stored within memory. By performing a memory dump on the application after a user has logged out... 2025-12-10 4.6 PHYSICAL MEDIUM NVD
CVE-2025-65831 The application uses an insecure hashing algorithm (MD5) to hash passwords. If an attacker obtained a copy of these hashes, either through exploiting ... 2025-12-10 7.5 NETWORK HIGH NVD
CVE-2025-65830 Due to a lack of certificate validation, all traffic from the mobile application can be intercepted. As a result, an adversary located "upstream" can ... 2025-12-10 9.1 NETWORK CRITICAL NVD
CVE-2025-65829 The ESP32 system on a chip (SoC) that powers the Meatmeet basestation device was found to lack Secure Boot. The Secure Boot feature ensures that only ... 2025-12-10 6.8 PHYSICAL MEDIUM NVD
CVE-2025-65828 An unauthenticated attacker within proximity of the Meatmeet device can issue several commands over Bluetooth Low Energy (BLE) to these devices which ... 2025-12-10 N/A None None NVD
CVE-2025-65827 The mobile application is configured to allow clear text traffic to all domains and communicates with an API server over HTTP. As a result, an adversa... 2025-12-10 9.1 NETWORK CRITICAL NVD
CVE-2025-65826 The mobile application was found to contain stored credentials for the network it was developed on. If an attacker retrieved this, and found the physi... 2025-12-10 9.8 NETWORK CRITICAL NVD
CVE-2025-65825 The firmware on the basestation of the Meatmeet is not encrypted. An adversary with physical access to the Meatmeet device can disassemble the device,... 2025-12-10 4.6 PHYSICAL MEDIUM NVD
CVE-2025-65824 An unauthenticated attacker within proximity of the Meatmeet device can perform an unauthorized Over The Air (OTA) firmware upgrade using Bluetooth Lo... 2025-12-10 8.8 ADJACENT_NETWORK HIGH NVD
CVE-2025-65823 The Meatmeet Pro was found to be shipped with hardcoded Wi-Fi credentials in the firmware, for the test network it was developed on. If an attacker re... 2025-12-10 9.8 NETWORK CRITICAL NVD
CVE-2025-65822 The ESP32 system on a chip (SoC) that powers the Meatmeet Pro was found to have JTAG enabled. By leaving JTAG enabled on an ESP32 in a commercial prod... 2025-12-10 6.8 PHYSICAL MEDIUM NVD
CVE-2025-65821 As UART download mode is still enabled on the ESP32 chip on which the firmware runs, an adversary can dump the flash from the device and retrieve sens... 2025-12-10 7.5 NETWORK HIGH NVD
CVE-2025-65820 An issue was discovered in Meatmeet Android Mobile Application 1.1.2.0. An exported activity can be spawned with the mobile application which opens a ... 2025-12-10 9.8 NETWORK CRITICAL NVD