Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-29765 | DragonFly's tiny file download uses hard coded HTTP protocol |
Github GHSA |
GHSA-mcvp-rpgg-9273 | DragonFly's tiny file download uses hard coded HTTP protocol |
Thu, 18 Sep 2025 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Linuxfoundation
Linuxfoundation dragonfly |
|
| CPEs | cpe:2.3:a:linuxfoundation:dragonfly:*:*:*:*:*:go:*:* | |
| Vendors & Products |
Linuxfoundation
Linuxfoundation dragonfly |
|
| Metrics |
cvssV3_1
|
Thu, 18 Sep 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 18 Sep 2025 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Dragonflyoss
Dragonflyoss dragonfly2 |
|
| Vendors & Products |
Dragonflyoss
Dragonflyoss dragonfly2 |
Wed, 17 Sep 2025 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Dragonfly is an open source P2P-based file distribution and image acceleration system. Prior to 2.1.0, the code in the scheduler for downloading a tiny file is hard coded to use the HTTP protocol, rather than HTTPS. This means that an attacker could perform a Man-in-the-Middle attack, changing the network request so that a different piece of data gets downloaded. This vulnerability is fixed in 2.1.0. | |
| Title | Dragonfly tiny file download uses hard coded HTTP protocol | |
| Weaknesses | CWE-311 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-09-18T15:47:03.096Z
Reserved: 2025-09-15T19:13:16.903Z
Link: CVE-2025-59410
Updated: 2025-09-18T15:46:56.837Z
Status : Analyzed
Published: 2025-09-17T20:15:38.293
Modified: 2025-09-18T16:54:11.567
Link: CVE-2025-59410
No data.
OpenCVE Enrichment
Updated: 2025-09-18T11:58:50Z
EUVD
Github GHSA