We found results for “”
CVE-2025-59354
Good to know:
Date: September 17, 2025
Dragonfly is an open source P2P-based file distribution and image acceleration system. Prior to 2.1.0, the DragonFly2 uses a variety of hash functions, including the MD5 hash, for downloaded files. This allows attackers to replace files with malicious ones that have a colliding hash. This vulnerability is fixed in 2.1.0.
Severity Score
Related Resources (6)
Severity Score
Weakness Type (CWE)
Use of Weak Hash
CWE-328Top Fix
Upgrade Version
Upgrade to version github.com/dragonflyoss/dragonfly - v2.1.0;d7y.io/dragonfly/v2 - v2.1.0
CVSS v3.1
| Base Score: |
|
|---|---|
| Attack Vector (AV): | NETWORK |
| Attack Complexity (AC): | LOW |
| Privileges Required (PR): | NONE |
| User Interaction (UI): | NONE |
| Scope (S): | UNCHANGED |
| Confidentiality (C): | NONE |
| Integrity (I): | LOW |
| Availability (A): | NONE |
Vulnerabilities
Projects
Contact Us


