Логотип exploitDog
bind:CVE-2025-59410
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-59410

Количество 2

Количество 2

nvd логотип

CVE-2025-59410

5 месяцев назад

Dragonfly is an open source P2P-based file distribution and image acceleration system. Prior to 2.1.0, the code in the scheduler for downloading a tiny file is hard coded to use the HTTP protocol, rather than HTTPS. This means that an attacker could perform a Man-in-the-Middle attack, changing the network request so that a different piece of data gets downloaded. This vulnerability is fixed in 2.1.0.

CVSS3: 3.7
EPSS: Низкий
github логотип

GHSA-mcvp-rpgg-9273

5 месяцев назад

DragonFly's tiny file download uses hard coded HTTP protocol

CVSS3: 3.7
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-59410

Dragonfly is an open source P2P-based file distribution and image acceleration system. Prior to 2.1.0, the code in the scheduler for downloading a tiny file is hard coded to use the HTTP protocol, rather than HTTPS. This means that an attacker could perform a Man-in-the-Middle attack, changing the network request so that a different piece of data gets downloaded. This vulnerability is fixed in 2.1.0.

CVSS3: 3.7
0%
Низкий
5 месяцев назад
github логотип
GHSA-mcvp-rpgg-9273

DragonFly's tiny file download uses hard coded HTTP protocol

CVSS3: 3.7
0%
Низкий
5 месяцев назад

Уязвимостей на страницу