4 results (0.001 seconds)

CVSS: 5.5EPSS: 0%CPEs: 2EXPL: 1

30 Mar 2025 — A vulnerability, which was classified as problematic, has been found in PyTorch 2.6.0+cu124. Affected by this issue is the function torch.mkldnn_max_pool2d. The manipulation leads to denial of service. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. • https://github.com/pytorch/pytorch/issues/149274 • CWE-404: Improper Resource Shutdown or Release •

CVSS: 6.5EPSS: 0%CPEs: 3EXPL: 0

19 Apr 2024 — Pytorch before v2.2.0 has an Out-of-bounds Read vulnerability via the component torch/csrc/jit/mobile/flatbuffer_loader.cpp. Pytorch anterior a v2.2.0 tiene una vulnerabilidad de lectura fuera de los límites a través del componente torch/csrc/jit/mobile/flatbuffer_loader.cpp. • https://github.com/pytorch/pytorch/blob/v2.1.2/torch/csrc/jit/mobile/flatbuffer_loader.cpp#L305 • CWE-125: Out-of-bounds Read •

CVSS: 7.8EPSS: 0%CPEs: 3EXPL: 0

17 Apr 2024 — Pytorch before version v2.2.0 was discovered to contain a use-after-free vulnerability in torch/csrc/jit/mobile/interpreter.cpp. Se descubrió que Pytorch anterior a la versión v2.2.0 contenía una vulnerabilidad de use-after-free en torch/csrc/jit/mobile/interpreter.cpp. • https://gist.github.com/1047524396/43e19a41f2b36503a4a228c32cdbc176 • CWE-416: Use After Free •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 1

26 Nov 2022 — In PyTorch before trunk/89695, torch.jit.annotations.parse_type_line can cause arbitrary code execution because eval is used unsafely. En PyTorch anterior a trunk/89695, torch.jit.annotations.parse_type_line puede causar la ejecución de código arbitrario porque eval se usa de manera insegura. • https://github.com/pytorch/pytorch/commit/767f6aa49fe20a2766b9843d01e3b7f7793df6a3 • CWE-94: Improper Control of Generation of Code ('Code Injection') •