Vulnerabilities > Google > Tensorflow > 2.3.1
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2021-05-14 | CVE-2021-29618 | Improper Handling of Exceptional Conditions vulnerability in Google Tensorflow TensorFlow is an end-to-end open source platform for machine learning. | 2.1 |
2021-05-14 | CVE-2021-29619 | Improper Handling of Exceptional Conditions vulnerability in Google Tensorflow TensorFlow is an end-to-end open source platform for machine learning. | 2.1 |
2021-05-14 | CVE-2021-29512 | Out-of-bounds Write vulnerability in Google Tensorflow TensorFlow is an end-to-end open source platform for machine learning. | 4.6 |
2021-05-14 | CVE-2021-29554 | Divide By Zero vulnerability in Google Tensorflow TensorFlow is an end-to-end open source platform for machine learning. | 2.1 |
2020-12-10 | CVE-2020-26267 | Out-of-bounds Read vulnerability in Google Tensorflow In affected versions of TensorFlow the tf.raw_ops.DataFormatVecPermute API does not validate the src_format and dst_format attributes. | 4.3 |
2020-10-21 | CVE-2020-15266 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Google Tensorflow In Tensorflow before version 2.4.0, when the `boxes` argument of `tf.image.crop_and_resize` has a very large value, the CPU kernel implementation receives it as a C++ `nan` floating point value. | 5.0 |
2020-10-21 | CVE-2020-15265 | Out-of-bounds Read vulnerability in Google Tensorflow In Tensorflow before version 2.4.0, an attacker can pass an invalid `axis` value to `tf.quantization.quantize_and_dequantize`. | 5.0 |