cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2024-46901,https://securityvulnerability.io/vulnerability/CVE-2024-46901,Invalid Filename Validation Vulnerability in Apache Subversion Repositories,"Insufficient validation of filenames against control characters in Apache Subversion repositories served via mod_dav_svn allows authenticated users with commit access to commit a corrupted revision, leading to disruption for users of the repository. All versions of Subversion up to and including Subversion 1.14.4 are affected if serving repositories via mod_dav_svn. Users are recommended to upgrade to version 1.14.5, which fixes this issue. Repositories served via other access methods are not affected.",Apache,Apache Subversion,3.1,LOW,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-12-09T09:36:52.445Z,0 CVE-2022-24070,https://securityvulnerability.io/vulnerability/CVE-2022-24070,Apache Subversion mod_dav_svn is vulnerable to memory corruption,"Subversion's mod_dav_svn is vulnerable to memory corruption. While looking up path-based authorization rules, mod_dav_svn servers may attempt to use memory which has already been freed. Affected Subversion mod_dav_svn servers 1.10.0 through 1.14.1 (inclusive). Servers that do not use mod_dav_svn are not affected.",Apache,Apache Subversion,7.5,HIGH,0.002580000087618828,false,,false,false,false,,,false,false,,2022-04-12T17:50:14.000Z,0 CVE-2021-28544,https://securityvulnerability.io/vulnerability/CVE-2021-28544,Apache Subversion SVN authz protected copyfrom paths regression,"Apache Subversion SVN authz protected copyfrom paths regression Subversion servers reveal 'copyfrom' paths that should be hidden according to configured path-based authorization (authz) rules. When a node has been copied from a protected location, users with access to the copy can see the 'copyfrom' path of the original. This also reveals the fact that the node was copied. Only the 'copyfrom' path is revealed; not its contents. Both httpd and svnserve servers are vulnerable.",Apache,Apache Subversion,4.3,MEDIUM,0.0038799999747425318,false,,false,false,false,,,false,false,,2022-04-12T17:50:13.000Z,0 CVE-2020-17525,https://securityvulnerability.io/vulnerability/CVE-2020-17525,Remote unauthenticated denial-of-service in Subversion mod_authz_svn,Subversion's mod_authz_svn module will crash if the server is using in-repository authz rules with the AuthzSVNReposRelativeAccessFile option and a client sends a request for a non-existing repository URL. This can lead to disruption for users of the service. This issue was fixed in mod_dav_svn+mod_authz_svn servers 1.14.1 and mod_dav_svn+mod_authz_svn servers 1.10.7,Apache,Apache Subversion,7.5,HIGH,0.002199999988079071,false,,false,false,false,,,false,false,,2021-03-17T09:20:14.000Z,0 CVE-2019-0203,https://securityvulnerability.io/vulnerability/CVE-2019-0203,,"In Apache Subversion versions up to and including 1.9.10, 1.10.4, 1.12.0, Subversion's svnserve server process may exit when a client sends certain sequences of protocol commands. This can lead to disruption for users of the server.",Apache,Apache Subversion,7.5,HIGH,0.0014299999456852674,false,,false,false,false,,,false,false,,2019-09-26T15:59:02.000Z,0 CVE-2018-11782,https://securityvulnerability.io/vulnerability/CVE-2018-11782,,"In Apache Subversion versions up to and including 1.9.10, 1.10.4, 1.12.0, Subversion's svnserve server process may exit when a well-formed read-only request produces a particular answer. This can lead to disruption for users of the server.",Apache,Apache Subversion,6.5,MEDIUM,0.0006099999882280827,false,,false,false,false,,,false,false,,2019-09-26T15:55:30.000Z,0 CVE-2018-11803,https://securityvulnerability.io/vulnerability/CVE-2018-11803,,Subversion's mod_dav_svn Apache HTTPD module versions 1.11.0 and 1.10.0 to 1.10.3 will crash after dereferencing an uninitialized pointer if the client omits the root path in a recursive directory listing operation.,Apache,Apache Subversion,7.5,HIGH,0.026599999517202377,false,,false,false,false,,,false,false,,2019-02-05T17:29:00.000Z,0 CVE-2013-4246,https://securityvulnerability.io/vulnerability/CVE-2013-4246,,libsvn_fs_fs/fs_fs.c in Apache Subversion 1.8.x before 1.8.2 might allow remote authenticated users with commit access to corrupt FSFS repositories and cause a denial of service or obtain sensitive information by editing packed revision properties.,Apache,Subversion,8.8,HIGH,0.0010900000343099236,false,,false,false,false,,,false,false,,2017-10-30T14:00:00.000Z,0 CVE-2016-8734,https://securityvulnerability.io/vulnerability/CVE-2016-8734,,"Apache Subversion's mod_dontdothat module and HTTP clients 1.4.0 through 1.8.16, and 1.9.0 through 1.9.4 are vulnerable to a denial-of-service attack caused by exponential XML entity expansion. The attack can cause the targeted process to consume an excessive amount of CPU resources or memory.",Apache,Apache Subversion,6.5,MEDIUM,0.0027000000700354576,false,,false,false,false,,,false,false,,2017-10-16T13:29:00.000Z,0 CVE-2017-9800,https://securityvulnerability.io/vulnerability/CVE-2017-9800,,"A maliciously constructed svn+ssh:// URL would cause Subversion clients before 1.8.19, 1.9.x before 1.9.7, and 1.10.0.x through 1.10.0-alpha3 to run an arbitrary shell command. Such a URL could be generated by a malicious server, by a malicious user committing to a honest server (to attack another user of that server's repositories), or by a proxy server. The vulnerability affects all clients, including those that use file://, http://, and plain (untunneled) svn://.",Apache,Apache Subversion,9.8,CRITICAL,0.02848000079393387,false,,false,false,false,,,false,false,,2017-08-11T21:29:00.000Z,0 CVE-2016-2167,https://securityvulnerability.io/vulnerability/CVE-2016-2167,,"The canonicalize_username function in svnserve/cyrus_auth.c in Apache Subversion before 1.8.16 and 1.9.x before 1.9.4, when Cyrus SASL authentication is used, allows remote attackers to authenticate and bypass intended access restrictions via a realm string that is a prefix of an expected repository realm string.",Apache,Subversion,6.8,MEDIUM,0.001339999958872795,false,,false,false,false,,,false,false,,2016-05-05T18:00:00.000Z,0 CVE-2016-2168,https://securityvulnerability.io/vulnerability/CVE-2016-2168,,"The req_check_access function in the mod_authz_svn module in the httpd server in Apache Subversion before 1.8.16 and 1.9.x before 1.9.4 allows remote authenticated users to cause a denial of service (NULL pointer dereference and crash) via a crafted header in a (1) MOVE or (2) COPY request, involving an authorization check.",Apache,Subversion,6.5,MEDIUM,0.07270000129938126,false,,false,false,false,,,false,false,,2016-05-05T18:00:00.000Z,0 CVE-2015-5343,https://securityvulnerability.io/vulnerability/CVE-2015-5343,,"Integer overflow in util.c in mod_dav_svn in Apache Subversion 1.7.x, 1.8.x before 1.8.15, and 1.9.x before 1.9.3 allows remote authenticated users to cause a denial of service (subversion server crash or memory consumption) and possibly execute arbitrary code via a skel-encoded request body, which triggers an out-of-bounds read and heap-based buffer overflow.",Apache,Subversion,7.6,HIGH,0.1289599984884262,false,,false,false,false,,,false,false,,2016-04-14T14:00:00.000Z,0 CVE-2015-5259,https://securityvulnerability.io/vulnerability/CVE-2015-5259,,"Integer overflow in the read_string function in libsvn_ra_svn/marshal.c in Apache Subversion 1.9.x before 1.9.3 allows remote attackers to execute arbitrary code via an svn:// protocol string, which triggers a heap-based buffer overflow and an out-of-bounds read.",Apache,Subversion,8.6,HIGH,0.8506699800491333,false,,false,false,false,,,false,false,,2016-01-08T19:00:00.000Z,0 CVE-2015-3187,https://securityvulnerability.io/vulnerability/CVE-2015-3187,,"The svn_repos_trace_node_locations function in Apache Subversion before 1.7.21 and 1.8.x before 1.8.14, when path-based authorization is used, allows remote authenticated users to obtain sensitive path information by reading the history of a node that has been moved from a hidden path.",Apache,Subversion,,,0.0012000000569969416,false,,false,false,false,,,false,false,,2015-08-12T14:00:00.000Z,0 CVE-2015-0248,https://securityvulnerability.io/vulnerability/CVE-2015-0248,,The (1) mod_dav_svn and (2) svnserve servers in Subversion 1.6.0 through 1.7.19 and 1.8.0 through 1.8.11 allow remote attackers to cause a denial of service (assertion failure and abort) via crafted parameter combinations related to dynamically evaluated revision numbers.,Apache,Subversion,,,0.07195000350475311,false,,false,false,false,,,false,false,,2015-04-08T18:00:00.000Z,0 CVE-2015-0202,https://securityvulnerability.io/vulnerability/CVE-2015-0202,,"The mod_dav_svn server in Subversion 1.8.0 through 1.8.11 allows remote attackers to cause a denial of service (memory consumption) via a large number of REPORT requests, which trigger the traversal of FSFS repository nodes.",Apache,Subversion,,,0.008129999972879887,false,,false,false,false,,,false,false,,2015-04-08T18:00:00.000Z,0 CVE-2015-0251,https://securityvulnerability.io/vulnerability/CVE-2015-0251,,The mod_dav_svn server in Subversion 1.5.0 through 1.7.19 and 1.8.0 through 1.8.11 allows remote authenticated users to spoof the svn:author property via a crafted v1 HTTP protocol request sequences.,Apache,Subversion,,,0.006120000034570694,false,,false,false,false,,,false,false,,2015-04-08T18:00:00.000Z,0 CVE-2014-3522,https://securityvulnerability.io/vulnerability/CVE-2014-3522,,"The Serf RA layer in Apache Subversion 1.4.0 through 1.7.x before 1.7.18 and 1.8.x before 1.8.10 does not properly handle wildcards in the Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof servers via a crafted certificate.",Apache,Subversion,,,0.0018899999558925629,false,,false,false,false,,,false,false,,2014-08-19T18:00:00.000Z,0 CVE-2014-3504,https://securityvulnerability.io/vulnerability/CVE-2014-3504,,"The (1) serf_ssl_cert_issuer, (2) serf_ssl_cert_subject, and (3) serf_ssl_cert_certificate functions in Serf 0.2.0 through 1.3.x before 1.3.7 does not properly handle a NUL byte in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.",Apache,Subversion,,,0.0010400000028312206,false,,false,false,false,,,false,false,,2014-08-19T18:00:00.000Z,0 CVE-2013-7393,https://securityvulnerability.io/vulnerability/CVE-2013-7393,,The daemonize.py module in Subversion 1.8.0 before 1.8.2 allows local users to gain privileges via a symlink attack on the pid file created for (1) svnwcsub.py or (2) irkerbridge.py when the --pidfile option is used. NOTE: this issue was SPLIT from CVE-2013-4262 based on different affected versions (ADT3).,Apache,Subversion,,,0.0004199999966658652,false,,false,false,false,,,false,false,,2014-07-28T19:00:00.000Z,0 CVE-2013-4262,https://securityvulnerability.io/vulnerability/CVE-2013-4262,,"svnwcsub.py in Subversion 1.8.0 before 1.8.3, when using the --pidfile option and running in foreground mode, allows local users to gain privileges via a symlink attack on the pid file. NOTE: this issue was SPLIT due to different affected versions (ADT3). The irkerbridge.py issue is covered by CVE-2013-7393.",Apache,Subversion,,,0.0004199999966658652,false,,false,false,false,,,false,false,,2014-07-28T19:00:00.000Z,0 CVE-2014-0032,https://securityvulnerability.io/vulnerability/CVE-2014-0032,,"The get_resource function in repos.c in the mod_dav_svn module in Apache Subversion before 1.7.15 and 1.8.x before 1.8.6, when SVNListParentPath is enabled, allows remote attackers to cause a denial of service (crash) via vectors related to the server root and request methods other than GET, as demonstrated by the ""svn ls http://svn.example.com"" command.",Apache,Subversion,,,0.2324800044298172,false,,false,false,false,,,false,false,,2014-02-14T15:00:00.000Z,0 CVE-2013-4505,https://securityvulnerability.io/vulnerability/CVE-2013-4505,,The is_this_legal function in mod_dontdothat for Apache Subversion 1.4.0 through 1.7.13 and 1.8.0 through 1.8.4 allows remote attackers to bypass intended access restrictions and possibly cause a denial of service (resource consumption) via a relative URL in a REPORT request.,Apache,"Mod Dontdothat,Subversion",,,0.004009999800473452,false,,false,false,false,,,false,false,,2013-12-07T20:00:00.000Z,0 CVE-2013-4558,https://securityvulnerability.io/vulnerability/CVE-2013-4558,,"The get_parent_resource function in repos.c in mod_dav_svn Apache HTTPD server module in Subversion 1.7.11 through 1.7.13 and 1.8.1 through 1.8.4, when built with assertions enabled and SVNAutoversioning is enabled, allows remote attackers to cause a denial of service (assertion failure and Apache process abort) via a non-canonical URL in a request, as demonstrated using a trailing /.",Apache,"Subversion,Mod Dav Svn",,,0.028219999745488167,false,,false,false,false,,,false,false,,2013-12-07T20:00:00.000Z,0