icon

We found results for “

CVE-2025-59410

Good to know:

icon

Date: September 17, 2025

Dragonfly is an open source P2P-based file distribution and image acceleration system. Prior to 2.1.0, the code in the scheduler for downloading a tiny file is hard coded to use the HTTP protocol, rather than HTTPS. This means that an attacker could perform a Man-in-the-Middle attack, changing the network request so that a different piece of data gets downloaded. This vulnerability is fixed in 2.1.0.

Severity Score

Severity Score

Weakness Type (CWE)

Missing Encryption of Sensitive Data

CWE-311

Top Fix

icon

Upgrade Version

Upgrade to version github.com/dragonflyoss/dragonfly - v2.1.0;d7y.io/dragonfly/v2 - v2.1.0

Learn More

CVSS v3.1

Base Score:
Attack Vector (AV): NETWORK
Attack Complexity (AC): HIGH
Privileges Required (PR): NONE
User Interaction (UI): NONE
Scope (S): UNCHANGED
Confidentiality (C): NONE
Integrity (I): LOW
Availability (A): NONE

Do you need more information?

Contact Us