subversion vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the https://archive.apache.org|subversion package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • L
Denial of Service (DoS)

[,1.14.5)
  • M
Command Injection

[,1.14.4)
  • H
Denial of Service (DoS)

[1.10.0,1.10.8)[1.14.0,1.14.2)
  • M
Information Exposure

[1.10.0,1.10.8)[1.14.0,1.14.2)
  • M
Improper Input Validation

[,1.7.16)
  • L
Resource Management Errors

[,1.6.15)
  • H
Out-of-Bounds

[0,1.9.3)
  • L
Improper Input Validation

[,1.7.14)[1.8.0,1.8.5)
  • H
Improper Input Validation

[,1.6.23)
  • M
Denial of Service (DoS)

[,1.6.16)
  • M
Improper Input Validation

[,1.9.10)[1.10.0,1.10.5)[1.11.0,1.12.0)
  • M
Denial of Service (DoS)

[,1.7.19)[1.8.0,1.8.11)
  • H
Access of Uninitialized Pointer

[1.10.0,1.10.4)
  • L
Access Restriction Bypass

[,1.7.14)[1.8.0,1.8.5)
  • H
Improper Access Control

[0,1.8.2)
  • M
Denial of Service (DoS)

[,1.8.17)[1.9.0,1.9.5)
  • M
Access Restriction Bypass

[,1.7.12)[1.8.0,1.8.3)
  • L
Symlink Attack

[0,1.8.3)
  • M
Access Restriction Bypass

[,1.6.17)
  • M
Out-of-Bounds

[,1.7.11)[1.8.0,1.8.1)
  • H
Resource Management Errors

[0,1.8.13)
  • M
Insufficiently Protected Credentials

[,1.7.18)[1.8.0,1.8.10)
  • H
Denial of Service (DoS)

[,1.6.23)
  • H
Out-of-Bounds

[1.7.0,1.7.20)[1.8.0,1.8.15)[1.9.0,1.9.3)
  • M
Denial of Service (DoS)

[,1.8.16)
  • L
Symlink Attack

[0,1.8.3)
  • M
Denial of Service (DoS)

[,1.7.19)[1.8.0,1.8.11)
  • M
Cross-site Scripting (XSS)

[,1.5.8)[1.6.0,1.6.13)
  • M
Denial of Service (DoS)

[,1.6.23)
  • M
Improper Access Control

[,1.8.16)
  • M
Denial of Service (DoS)

[,1.6.21)[1.7.0,1.7.9)
  • H
NULL Pointer Dereference

[1.9.0,1.10.7)[1.11.0,1.14.1)
  • M
Information Exposure

[,1.8.0)
  • M
Man-in-the-Middle (MitM)

[,1.7.18)[1.8.0,1.8.10)
  • M
Insufficient Verification of Data Authenticity

[,1.7.20)[1.8.0,1.8.13)
  • H
Improper Input Validation

[,1.9.10][1.10.0,1.10.5)[1.11.0,1.12.0)
  • C
Improper Input Validation

[,1.9.0)
  • L
Out-of-Bounds

[,1.6.21)[1.7.0,1.7.9)
  • M
Out-of-Bounds

[,1.6.21)
  • M
Resource Management Errors

[,1.6.15)
  • M
Denial of Service (DoS)

[,1.6.21)[1.7.0,1.7.9)
  • M
Out-of-Bounds

[0,1.7.9)
  • M
Resource Management Errors

[,1.7.20)[1.8.0,1.8.13)
  • M
Authentication Bypass

[,1.3.7)
  • C
Denial of Service (DoS)

[1.0,1.0.4]
  • M
Access Restriction Bypass

[1.0,1.0.5]
  • M
Information Exposure

[1.0,1.1.0_rc3]
  • M
Insufficiently Protected Credentials

[,1.54)
  • H
Arbitrary Code Execution

[1.0,1.0.2]
  • H
Denial of Service (DoS)

[,1.6.0)
  • M
Information Exposure

[,1.7.21)[1.8.0,1.8.14)
  • M
Denial of Service (DoS)

[1.5.0,1.5.8)[1.6.0,1.6.17)
  • M
NULL Pointer Dereference

[,1.6.17)