Vulnerabilities
Vulnerable Software
Linuxfoundation:  Security Vulnerabilities
pytorch v2.8.0 was discovered to contain an integer overflow in the component torch.nan_to_num-.long().
CVSS Score
5.3
EPSS Score
0.001
Published
2025-09-25
A Name Error occurs in pytorch v2.7.0 when a PyTorch model consists of torch.cummin and is compiled by Inductor, leading to a Denial of Service (DoS).
CVSS Score
7.5
EPSS Score
0.001
Published
2025-09-25
A buffer overflow occurs in pytorch v2.7.0 when a PyTorch model consists of torch.nn.Conv2d, torch.nn.functional.hardshrink, and torch.Tensor.view-torch.mv() and is compiled by Inductor, leading to a Denial of Service (DoS).
CVSS Score
7.5
EPSS Score
0.001
Published
2025-09-25
In PyTorch through 2.6.0, when eager is used, nn.PairwiseDistance(p=2) produces incorrect results.
CVSS Score
5.3
EPSS Score
0.0
Published
2025-09-25
In PyTorch before 2.7.0, when inductor is used, nn.Fold has an assertion error.
CVSS Score
5.3
EPSS Score
0.0
Published
2025-09-25
In PyTorch before 2.7.0, when torch.compile is used, FractionalMaxPool2d has inconsistent results.
CVSS Score
5.3
EPSS Score
0.0
Published
2025-09-25
In PyTorch before 2.7.0, bitwise_right_shift produces incorrect output for certain out-of-bounds values of the "other" argument.
CVSS Score
5.3
EPSS Score
0.001
Published
2025-09-25
PyTorch before 3.7.0 has a bernoulli_p decompose function in decompositions.py even though it lacks full consistency with the eager CPU implementation, negatively affecting nn.Dropout1d, nn.Dropout2d, and nn.Dropout3d for fallback_random=True.
CVSS Score
5.3
EPSS Score
0.0
Published
2025-09-25
An issue in the component torch.linalg.lu of pytorch v2.8.0 allows attackers to cause a Denial of Service (DoS) when performing a slice operation.
CVSS Score
7.5
EPSS Score
0.001
Published
2025-09-25
Dragonfly is an open source P2P-based file distribution and image acceleration system. Prior to 2.1.0, the DragonFly2 uses a variety of hash functions, including the MD5 hash, for downloaded files. This allows attackers to replace files with malicious ones that have a colliding hash. This vulnerability is fixed in 2.1.0.
CVSS Score
5.3
EPSS Score
0.0
Published
2025-09-17


Contact Us

Shodan ® - All rights reserved