An input validation vulnerability in the flow.arange() component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted input.
References
| Link | Resource |
|---|---|
| https://github.com/Daisy2ang | Not Applicable |
| https://github.com/Oneflow-Inc/oneflow/issues/10656 | Exploit Issue Tracking Vendor Advisory |
Configurations
History
03 Feb 2026, 16:54
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:oneflow:oneflow:0.9.0:*:*:*:*:*:*:* | |
| References | () https://github.com/Daisy2ang - Not Applicable | |
| References | () https://github.com/Oneflow-Inc/oneflow/issues/10656 - Exploit, Issue Tracking, Vendor Advisory | |
| First Time |
Oneflow
Oneflow oneflow |
Information
Published : 2026-01-28 21:16
Updated : 2026-02-03 16:54
NVD link : CVE-2025-71003
Mitre link : CVE-2025-71003
CVE.ORG link : CVE-2025-71003
JSON object : View
Products Affected
oneflow
- oneflow
CWE
CWE-20
Improper Input Validation
