subversion-ruby vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the subversion-ruby package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Reachable Assertion

<0:1.7.14-16.el7
  • H
Improper Input Validation

<0:1.7.14-11.el7_4
  • M
Information Exposure

<0:1.7.14-7.el7_1.1
  • M
Improper Authorization

<0:1.7.14-7.el7_1.1
  • M
Use of Less Trusted Source

<0:1.7.14-7.el7_1.1
  • M
Reachable Assertion

<0:1.7.14-7.el7_1.1
  • M
NULL Pointer Dereference

<0:1.7.14-7.el7_0
  • M
NULL Pointer Dereference

<0:1.7.14-7.el7_0
  • M
Use of a Broken or Risky Cryptographic Algorithm

<0:1.7.14-7.el7_0
  • L
Improper Cross-boundary Removal of Sensitive Data

*
  • M
Information Exposure

<0:1.7.14-7.el7_1.1
  • M
Information Exposure

<0:1.7.14-7.el7_1.1
  • M
Information Exposure

<0:1.7.14-7.el7_1.1
  • M
Information Exposure

<0:1.7.14-7.el7_1.1
  • M
Information Exposure

<0:1.7.14-7.el7_1.1
  • M
Information Exposure

<0:1.7.14-7.el7_1.1
  • M
Information Exposure

<0:1.7.14-7.el7_1.1
  • M
Information Exposure

<0:1.7.14-7.el7_1.1
  • M
Information Exposure

<0:1.7.14-7.el7_1.1
  • M
Information Exposure

<0:1.7.14-7.el7_1.1
  • M
Information Exposure

<0:1.7.14-7.el7_1.1
  • M
Information Exposure

<0:1.7.14-7.el7_1.1
  • M
Information Exposure

<0:1.7.14-7.el7_1.1
  • M
Information Exposure

<0:1.7.14-7.el7_1.1
  • M
Information Exposure

<0:1.7.14-7.el7_1.1
  • M
Information Exposure

<0:1.7.14-7.el7_1.1
  • M
Information Exposure

<0:1.7.14-7.el7_1.1
  • M
Information Exposure

<0:1.7.14-7.el7_1.1
  • M
Information Exposure

<0:1.7.14-7.el7_1.1
  • M
Information Exposure

<0:1.7.14-7.el7_1.1
  • M
Information Exposure

<0:1.7.14-7.el7_1.1
  • M
Information Exposure

<0:1.7.14-7.el7_1.1
  • M
Information Exposure

<0:1.7.14-7.el7_1.1
  • M
Use of Less Trusted Source

<0:1.7.14-7.el7_1.1
  • M
Use of Less Trusted Source

<0:1.7.14-7.el7_1.1
  • M
Use of Less Trusted Source

<0:1.7.14-7.el7_1.1
  • M
Use of Less Trusted Source

<0:1.7.14-7.el7_1.1
  • M
Use of Less Trusted Source

<0:1.7.14-7.el7_1.1
  • M
Use of Less Trusted Source

<0:1.7.14-7.el7_1.1
  • M
Use of Less Trusted Source

<0:1.7.14-7.el7_1.1
  • M
Use of Less Trusted Source

<0:1.7.14-7.el7_1.1
  • M
Use of Less Trusted Source

<0:1.7.14-7.el7_1.1
  • M
Use of Less Trusted Source

<0:1.7.14-7.el7_1.1
  • M
Use of Less Trusted Source

<0:1.7.14-7.el7_1.1
  • M
Use of Less Trusted Source

<0:1.7.14-7.el7_1.1
  • M
Use of Less Trusted Source

<0:1.7.14-7.el7_1.1
  • M
Use of Less Trusted Source

<0:1.7.14-7.el7_1.1
  • M
Use of Less Trusted Source

<0:1.7.14-7.el7_1.1
  • M
Use of Less Trusted Source

<0:1.7.14-7.el7_1.1
  • M
Use of Less Trusted Source

<0:1.7.14-7.el7_1.1
  • M
Use of Less Trusted Source

<0:1.7.14-7.el7_1.1
  • M
Use of Less Trusted Source

<0:1.7.14-7.el7_1.1
  • M
Use of Less Trusted Source

<0:1.7.14-7.el7_1.1
  • M
Use of Less Trusted Source

<0:1.7.14-7.el7_1.1
  • M
Use of Less Trusted Source

<0:1.7.14-7.el7_1.1
  • M
Use of Less Trusted Source

<0:1.7.14-7.el7_1.1
  • M
Reachable Assertion

<0:1.7.14-7.el7_1.1
  • M
Reachable Assertion

<0:1.7.14-7.el7_1.1
  • M
Reachable Assertion

<0:1.7.14-7.el7_1.1
  • M
Reachable Assertion

<0:1.7.14-7.el7_1.1
  • M
Reachable Assertion

<0:1.7.14-7.el7_1.1
  • M
Reachable Assertion

<0:1.7.14-7.el7_1.1
  • M
Reachable Assertion

<0:1.7.14-7.el7_1.1
  • M
Reachable Assertion

<0:1.7.14-7.el7_1.1
  • M
Reachable Assertion

<0:1.7.14-7.el7_1.1
  • M
Reachable Assertion

<0:1.7.14-7.el7_1.1
  • M
Reachable Assertion

<0:1.7.14-7.el7_1.1
  • M
Reachable Assertion

<0:1.7.14-7.el7_1.1
  • M
Reachable Assertion

<0:1.7.14-7.el7_1.1
  • M
Reachable Assertion

<0:1.7.14-7.el7_1.1
  • M
Reachable Assertion

<0:1.7.14-7.el7_1.1
  • M
Reachable Assertion

<0:1.7.14-7.el7_1.1
  • M
Reachable Assertion

<0:1.7.14-7.el7_1.1
  • M
Reachable Assertion

<0:1.7.14-7.el7_1.1
  • M
Reachable Assertion

<0:1.7.14-7.el7_1.1
  • M
Reachable Assertion

<0:1.7.14-7.el7_1.1
  • M
Reachable Assertion

<0:1.7.14-7.el7_1.1
  • M
Reachable Assertion

<0:1.7.14-7.el7_1.1
  • M
Reachable Assertion

<0:1.7.14-7.el7_1.1
  • M
Improper Authorization

<0:1.7.14-7.el7_1.1
  • M
Improper Authorization

<0:1.7.14-7.el7_1.1
  • M
Improper Authorization

<0:1.7.14-7.el7_1.1
  • M
Improper Authorization

<0:1.7.14-7.el7_1.1
  • M
Improper Authorization

<0:1.7.14-7.el7_1.1
  • M
Improper Authorization

<0:1.7.14-7.el7_1.1
  • M
Improper Authorization

<0:1.7.14-7.el7_1.1
  • M
Improper Authorization

<0:1.7.14-7.el7_1.1
  • M
Improper Authorization

<0:1.7.14-7.el7_1.1
  • M
Improper Authorization

<0:1.7.14-7.el7_1.1
  • M
Improper Authorization

<0:1.7.14-7.el7_1.1
  • M
Improper Authorization

<0:1.7.14-7.el7_1.1
  • M
Improper Authorization

<0:1.7.14-7.el7_1.1
  • M
Improper Authorization

<0:1.7.14-7.el7_1.1
  • M
Improper Authorization

<0:1.7.14-7.el7_1.1
  • M
Improper Authorization

<0:1.7.14-7.el7_1.1
  • M
Improper Authorization

<0:1.7.14-7.el7_1.1
  • M
Improper Authorization

<0:1.7.14-7.el7_1.1
  • M
Improper Authorization

<0:1.7.14-7.el7_1.1
  • M
Improper Authorization

<0:1.7.14-7.el7_1.1
  • M
Improper Authorization

<0:1.7.14-7.el7_1.1
  • M
Improper Authorization

<0:1.7.14-7.el7_1.1
  • M
Improper Authorization

<0:1.7.14-7.el7_1.1
  • M
NULL Pointer Dereference

<0:1.7.14-7.el7_0
  • M
NULL Pointer Dereference

<0:1.7.14-7.el7_0
  • M
NULL Pointer Dereference

<0:1.7.14-7.el7_0
  • M
NULL Pointer Dereference

<0:1.7.14-7.el7_0
  • M
NULL Pointer Dereference

<0:1.7.14-7.el7_0
  • M
NULL Pointer Dereference

<0:1.7.14-7.el7_0
  • M
NULL Pointer Dereference

<0:1.7.14-7.el7_0
  • M
NULL Pointer Dereference

<0:1.7.14-7.el7_0
  • M
NULL Pointer Dereference

<0:1.7.14-7.el7_0
  • M
NULL Pointer Dereference

<0:1.7.14-7.el7_0
  • M
NULL Pointer Dereference

<0:1.7.14-7.el7_0
  • M
NULL Pointer Dereference

<0:1.7.14-7.el7_0
  • M
NULL Pointer Dereference

<0:1.7.14-7.el7_0
  • M
NULL Pointer Dereference

<0:1.7.14-7.el7_0
  • M
NULL Pointer Dereference

<0:1.7.14-7.el7_0
  • M
NULL Pointer Dereference

<0:1.7.14-7.el7_0
  • M
NULL Pointer Dereference

<0:1.7.14-7.el7_0
  • M
NULL Pointer Dereference

<0:1.7.14-7.el7_0
  • M
NULL Pointer Dereference

<0:1.7.14-7.el7_0
  • M
NULL Pointer Dereference

<0:1.7.14-7.el7_0
  • M
NULL Pointer Dereference

<0:1.7.14-7.el7_0
  • M
NULL Pointer Dereference

<0:1.7.14-7.el7_0
  • M
NULL Pointer Dereference

<0:1.7.14-7.el7_0
  • M
Use of a Broken or Risky Cryptographic Algorithm

<0:1.7.14-7.el7_0
  • M
Use of a Broken or Risky Cryptographic Algorithm

<0:1.7.14-7.el7_0
  • M
Use of a Broken or Risky Cryptographic Algorithm

<0:1.7.14-7.el7_0
  • M
Use of a Broken or Risky Cryptographic Algorithm

<0:1.7.14-7.el7_0
  • M
Use of a Broken or Risky Cryptographic Algorithm

<0:1.7.14-7.el7_0
  • M
Use of a Broken or Risky Cryptographic Algorithm

<0:1.7.14-7.el7_0
  • M
Use of a Broken or Risky Cryptographic Algorithm

<0:1.7.14-7.el7_0
  • M
Use of a Broken or Risky Cryptographic Algorithm

<0:1.7.14-7.el7_0
  • M
Use of a Broken or Risky Cryptographic Algorithm

<0:1.7.14-7.el7_0
  • M
Use of a Broken or Risky Cryptographic Algorithm

<0:1.7.14-7.el7_0
  • M
Use of a Broken or Risky Cryptographic Algorithm

<0:1.7.14-7.el7_0
  • M
Use of a Broken or Risky Cryptographic Algorithm

<0:1.7.14-7.el7_0
  • M
Use of a Broken or Risky Cryptographic Algorithm

<0:1.7.14-7.el7_0
  • M
Use of a Broken or Risky Cryptographic Algorithm

<0:1.7.14-7.el7_0
  • M
Use of a Broken or Risky Cryptographic Algorithm

<0:1.7.14-7.el7_0
  • M
Use of a Broken or Risky Cryptographic Algorithm

<0:1.7.14-7.el7_0
  • M
Use of a Broken or Risky Cryptographic Algorithm

<0:1.7.14-7.el7_0
  • M
Use of a Broken or Risky Cryptographic Algorithm

<0:1.7.14-7.el7_0
  • M
Use of a Broken or Risky Cryptographic Algorithm

<0:1.7.14-7.el7_0
  • M
Use of a Broken or Risky Cryptographic Algorithm

<0:1.7.14-7.el7_0
  • M
Use of a Broken or Risky Cryptographic Algorithm

<0:1.7.14-7.el7_0
  • M
Use of a Broken or Risky Cryptographic Algorithm

<0:1.7.14-7.el7_0
  • M
Use of a Broken or Risky Cryptographic Algorithm

<0:1.7.14-7.el7_0
  • M
NULL Pointer Dereference

<0:1.7.14-7.el7_0
  • M
NULL Pointer Dereference

<0:1.7.14-7.el7_0
  • M
NULL Pointer Dereference

<0:1.7.14-7.el7_0
  • M
NULL Pointer Dereference

<0:1.7.14-7.el7_0
  • M
NULL Pointer Dereference

<0:1.7.14-7.el7_0
  • M
NULL Pointer Dereference

<0:1.7.14-7.el7_0
  • M
NULL Pointer Dereference

<0:1.7.14-7.el7_0
  • M
NULL Pointer Dereference

<0:1.7.14-7.el7_0
  • M
NULL Pointer Dereference

<0:1.7.14-7.el7_0
  • M
NULL Pointer Dereference

<0:1.7.14-7.el7_0
  • M
NULL Pointer Dereference

<0:1.7.14-7.el7_0
  • M
NULL Pointer Dereference

<0:1.7.14-7.el7_0
  • M
NULL Pointer Dereference

<0:1.7.14-7.el7_0
  • M
NULL Pointer Dereference

<0:1.7.14-7.el7_0
  • M
NULL Pointer Dereference

<0:1.7.14-7.el7_0
  • M
NULL Pointer Dereference

<0:1.7.14-7.el7_0
  • M
NULL Pointer Dereference

<0:1.7.14-7.el7_0
  • M
NULL Pointer Dereference

<0:1.7.14-7.el7_0
  • M
NULL Pointer Dereference

<0:1.7.14-7.el7_0
  • M
NULL Pointer Dereference

<0:1.7.14-7.el7_0
  • M
NULL Pointer Dereference

<0:1.7.14-7.el7_0
  • M
NULL Pointer Dereference

<0:1.7.14-7.el7_0
  • M
NULL Pointer Dereference

<0:1.7.14-7.el7_0
  • M
Reachable Assertion

<0:1.7.14-16.el7
  • H
Improper Input Validation

<0:1.7.14-11.el7_4
  • H
Improper Input Validation

<0:1.7.14-11.el7_4
  • H
Improper Input Validation

<0:1.7.14-11.el7_4
  • H
Improper Input Validation

<0:1.7.14-11.el7_4
  • H
Improper Input Validation

<0:1.7.14-11.el7_4
  • H
Improper Input Validation

<0:1.7.14-11.el7_4
  • H
Improper Input Validation

<0:1.7.14-11.el7_4
  • H
Improper Input Validation

<0:1.7.14-11.el7_4
  • H
Improper Input Validation

<0:1.7.14-11.el7_4
  • H
Improper Input Validation

<0:1.7.14-11.el7_4
  • H
Improper Input Validation

<0:1.7.14-11.el7_4
  • H
Improper Input Validation

<0:1.7.14-11.el7_4
  • H
Improper Input Validation

<0:1.7.14-11.el7_4
  • H
Improper Input Validation

<0:1.7.14-11.el7_4
  • M
Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion')

*
  • M
Improper Input Validation

*
  • L
Improper Input Validation

*
  • M
Integer Overflow or Wraparound

*