Tensorflow
by Google
Standard maintenance is sufficient
Tensorflow has low exploitation rates. Attackers rarely target this software's known vulnerabilities.
What to do
- Keep automatic updates enabled
- No urgent action needed
- Review periodically as part of normal maintenance
What Attackers Target
Vulnerabilities with high exploit probability
0.0%
Confirmed actively exploited (CISA)
0.0%
Public exploit code available
0.0%
Based on 431 known vulnerabilities. Percentages show the proportion that are actively dangerous — a low percentage means most vulnerabilities in this product are not being exploited.
Most Dangerous Vulnerabilities
| CVE | CVSS | Exploit Probability | Confirmed |
|---|---|---|---|
| CVE-2023-25668 | 9.8 | 1.5% | — |
| CVE-2020-15207 | 8.7 | 1.4% | — |
| CVE-2022-41900 | 7.1 | 1.2% | — |
| CVE-2021-35958 | 9.1 | 1.1% | — |
| CVE-2022-21728 | 8.1 | 1.1% | — |
| CVE-2021-37678 | 9.3 | 1.0% | — |
| CVE-2022-23585 | 4.3 | 0.7% | — |
| CVE-2020-15205 | 9.0 | 0.5% | — |
| CVE-2022-23559 | 8.8 | 0.5% | — |
| CVE-2022-23570 | 6.5 | 0.5% | — |
| CVE-2022-23572 | 6.5 | 0.5% | — |
| CVE-2020-15202 | 9.0 | 0.5% | — |
| CVE-2022-23581 | 6.5 | 0.5% | — |
| CVE-2020-15206 | 9.0 | 0.5% | — |
| CVE-2022-41909 | 4.8 | 0.5% | — |
| CVE-2022-23567 | 6.5 | 0.4% | — |
| CVE-2022-35941 | 5.9 | 0.4% | — |
| CVE-2023-25674 | 7.5 | 0.4% | — |
| CVE-2022-23566 | 8.8 | 0.4% | — |
| CVE-2022-23558 | 7.6 | 0.4% | — |
0
/ 100
low-risk
Active Threat
0/50 · Minimal
Exploit Availability
0/50 · Minimal
Score uses Wilson score intervals to account for sample size. Products with few CVEs are scored conservatively.