Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 31 Dec 2025 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:oneflow:oneflow:0.9.0:*:*:*:*:*:*:* |
Wed, 12 Nov 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-20 | |
| Metrics |
cvssV3_1
|
Wed, 12 Nov 2025 13:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Oneflow
Oneflow oneflow |
|
| Vendors & Products |
Oneflow
Oneflow oneflow |
Mon, 10 Nov 2025 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Improper input validation in OneFlow v0.9.0 allows attackers to cause a segmentation fault via adding a Python sequence to the native code during broadcasting/type conversion. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-11-12T20:29:15.686Z
Reserved: 2025-10-27T00:00:00.000Z
Link: CVE-2025-63397
Updated: 2025-11-12T20:29:03.199Z
Status : Analyzed
Published: 2025-11-10T22:15:36.390
Modified: 2025-12-31T18:26:04.333
Link: CVE-2025-63397
No data.
OpenCVE Enrichment
Updated: 2025-11-12T12:49:47Z