An input validation vulnerability in the flow.scatter/flow.scatter_add component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted indices.
References
| Link | Resource |
|---|---|
| https://github.com/Daisy2ang | Not Applicable |
| https://github.com/Oneflow-Inc/oneflow/issues/10649 | Exploit Issue Tracking Vendor Advisory |
Configurations
History
03 Feb 2026, 15:55
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:oneflow:oneflow:0.9.0:*:*:*:*:*:*:* | |
| References | () https://github.com/Daisy2ang - Not Applicable | |
| References | () https://github.com/Oneflow-Inc/oneflow/issues/10649 - Exploit, Issue Tracking, Vendor Advisory | |
| First Time |
Oneflow
Oneflow oneflow |
Information
Published : 2026-01-29 15:16
Updated : 2026-02-03 15:55
NVD link : CVE-2025-71009
Mitre link : CVE-2025-71009
CVE.ORG link : CVE-2025-71009
JSON object : View
Products Affected
oneflow
- oneflow
CWE
CWE-20
Improper Input Validation
