Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 03 Feb 2026 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:oneflow:oneflow:0.9.0:*:*:*:*:*:*:* |
Fri, 30 Jan 2026 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Oneflow
Oneflow oneflow |
|
| Vendors & Products |
Oneflow
Oneflow oneflow |
Thu, 29 Jan 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-20 | |
| Metrics |
cvssV3_1
|
Thu, 29 Jan 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An input validation vulnerability in the flow.Tensor.new_empty/flow.Tensor.new_ones/flow.Tensor.new_zeros component of OneFlow v0.9.0 allows attackers to cause a Denial of Service (DoS) via a crafted input. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-01-29T16:59:06.985Z
Reserved: 2026-01-09T00:00:00.000Z
Link: CVE-2025-71011
Updated: 2026-01-29T16:56:53.347Z
Status : Analyzed
Published: 2026-01-29T16:16:13.800
Modified: 2026-02-03T15:54:46.070
Link: CVE-2025-71011
No data.
OpenCVE Enrichment
Updated: 2026-01-30T08:43:48Z