An issue in OneFlow-Inc. Oneflow v0.9.1 allows attackers to cause a Denial of Service (DoS) when an empty array is processed with oneflow.dot.
References
| Link | Resource |
|---|---|
| https://gist.github.com/Redmept1on/64aa53d37e99975725a7d3e2dc9d9761 | Broken Link |
| https://gist.github.com/Redmept1on/64aa53d37e99975725a7d3e2dc9d9761 | Broken Link |
Configurations
History
02 May 2025, 12:53
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Oneflow
Oneflow oneflow |
|
| References | () https://gist.github.com/Redmept1on/64aa53d37e99975725a7d3e2dc9d9761 - Broken Link | |
| CPE | cpe:2.3:a:oneflow:oneflow:0.9.1:*:*:*:*:*:*:* | |
| CWE | CWE-129 |
Information
Published : 2024-06-06 18:15
Updated : 2025-05-02 12:53
NVD link : CVE-2024-36743
Mitre link : CVE-2024-36743
CVE.ORG link : CVE-2024-36743
JSON object : View
Products Affected
oneflow
- oneflow
