Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| dragonflyoss | dragonfly | < 2.1.0 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2025-59350 | Timing attacks against Proxy’s basic authentication are possible | |
| CVE-2025-59352 | Dragonfly allows arbitrary file read and write on a peer machine | |
| CVE-2025-59345 | Dragonfly did not enable authentication for some Manager’s endpoints | |
| CVE-2025-59348 | Dragonfly incorrectly handles a task structure’s usedTraffic field | |
| CVE-2025-59347 | Dragonfly Manager makes requests to external endpoints with disabled TLS authentication | |
| CVE-2025-59351 | Dragonfly possibly panics due to nil pointer dereference when using variables created alon | |
| CVE-2025-59346 | Dragonfly server-side request forgery vulnerability | |
| CVE-2025-59349 | Directories created via os.MkdirAll are not checked for permissions | |
| CVE-2025-59410 | Dragonfly tiny file download uses hard coded HTTP protocol | |
| CVE-2025-59354 | Dragonfly has weak integrity checks for downloaded files |
No comments yet