An issue in OneFlow-Inc. Oneflow v0.9.1 allows attackers to cause a Denial of Service (DoS) when an empty array is processed with oneflow.dot.
References
Link | Resource |
---|---|
https://gist.github.com/Redmept1on/64aa53d37e99975725a7d3e2dc9d9761 | Broken Link |
https://gist.github.com/Redmept1on/64aa53d37e99975725a7d3e2dc9d9761 | Broken Link |
Configurations
History
02 May 2025, 12:53
Type | Values Removed | Values Added |
---|---|---|
References | () https://gist.github.com/Redmept1on/64aa53d37e99975725a7d3e2dc9d9761 - Broken Link | |
CPE | cpe:2.3:a:oneflow:oneflow:0.9.1:*:*:*:*:*:*:* | |
CWE | CWE-129 | |
First Time |
Oneflow
Oneflow oneflow |
Information
Published : 2024-06-06 18:15
Updated : 2025-05-02 12:53
NVD link : CVE-2024-36743
Mitre link : CVE-2024-36743
CVE.ORG link : CVE-2024-36743
JSON object : View
Products Affected
oneflow
- oneflow