Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2025-59410


Dragonfly is an open source P2P-based file distribution and image acceleration system. Prior to 2.1.0, the code in the scheduler for downloading a tiny file is hard coded to use the HTTP protocol, rather than HTTPS. This means that an attacker could perform a Man-in-the-Middle attack, changing the network request so that a different piece of data gets downloaded. This vulnerability is fixed in 2.1.0.


Published

2025-09-17T20:15:38.293

Last Modified

2025-09-18T16:54:11.567

Status

Analyzed

Source

[email protected]

Severity

CVSSv3.1: 3.7 (LOW)

Weaknesses
  • Type: Primary
    CWE-311

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application linuxfoundation dragonfly < 2.1.0 Yes

References