Vulnerabilities > Google > Tensorflow > 2.3.1

DATE CVE VULNERABILITY TITLE RISK
2021-05-14 CVE-2021-29618 Improper Handling of Exceptional Conditions vulnerability in Google Tensorflow
TensorFlow is an end-to-end open source platform for machine learning.
local
low complexity
google CWE-755
2.1
2021-05-14 CVE-2021-29619 Improper Handling of Exceptional Conditions vulnerability in Google Tensorflow
TensorFlow is an end-to-end open source platform for machine learning.
local
low complexity
google CWE-755
2.1
2021-05-14 CVE-2021-29512 Out-of-bounds Write vulnerability in Google Tensorflow
TensorFlow is an end-to-end open source platform for machine learning.
local
low complexity
google CWE-787
4.6
2021-05-14 CVE-2021-29554 Divide By Zero vulnerability in Google Tensorflow
TensorFlow is an end-to-end open source platform for machine learning.
local
low complexity
google CWE-369
2.1
2020-12-10 CVE-2020-26267 Out-of-bounds Read vulnerability in Google Tensorflow
In affected versions of TensorFlow the tf.raw_ops.DataFormatVecPermute API does not validate the src_format and dst_format attributes.
local
low complexity
google CWE-125
4.3
2020-10-21 CVE-2020-15266 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Google Tensorflow
In Tensorflow before version 2.4.0, when the `boxes` argument of `tf.image.crop_and_resize` has a very large value, the CPU kernel implementation receives it as a C++ `nan` floating point value.
network
low complexity
google CWE-119
5.0
2020-10-21 CVE-2020-15265 Out-of-bounds Read vulnerability in Google Tensorflow
In Tensorflow before version 2.4.0, an attacker can pass an invalid `axis` value to `tf.quantization.quantize_and_dequantize`.
network
low complexity
google CWE-125
5.0