Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
apache subversion 1.8.4 vulnerabilities and exploits
(subscribe to this query)
312
VMScore
CVE-2013-4558
The get_parent_resource function in repos.c in mod_dav_svn Apache HTTPD server module in Subversion 1.7.11 up to and including 1.7.13 and 1.8.1 up to and including 1.8.4, when built with assertions enabled and SVNAutoversioning is enabled, allows remote malicious users to cause a...
Apache Subversion 1.8.2
Apache Subversion 1.7.11
Apache Subversion 1.8.1
Apache Subversion 1.7.12
Apache Mod Dav Svn -
Apache Subversion 1.7.13
Apache Subversion 1.8.4
Apache Subversion 1.8.3
694
VMScore
CVE-2015-0202
The mod_dav_svn server in Subversion 1.8.0 up to and including 1.8.11 allows remote malicious users to cause a denial of service (memory consumption) via a large number of REPORT requests, which trigger the traversal of FSFS repository nodes.
Apache Subversion 1.8.0
Apache Subversion 1.8.8
Apache Subversion 1.8.9
Apache Subversion 1.8.3
Apache Subversion 1.8.4
Apache Subversion 1.8.5
Apache Subversion 1.8.1
Apache Subversion 1.8.2
Apache Subversion 1.8.10
Apache Subversion 1.8.11
Apache Subversion 1.8.6
Apache Subversion 1.8.7
Opensuse Opensuse 13.1
Opensuse Opensuse 13.2
231
VMScore
CVE-2013-4505
The is_this_legal function in mod_dontdothat for Apache Subversion 1.4.0 up to and including 1.7.13 and 1.8.0 up to and including 1.8.4 allows remote malicious users to bypass intended access restrictions and possibly cause a denial of service (resource consumption) via a relativ...
Apache Mod Dontdothat -
Apache Subversion 1.8.1
Apache Subversion 1.4.0
Apache Subversion 1.5.0
Apache Subversion 1.5.1
Apache Subversion 1.5.8
Apache Subversion 1.6.0
Apache Subversion 1.6.16
Apache Subversion 1.6.17
Apache Subversion 1.6.3
Apache Subversion 1.6.4
Apache Subversion 1.7.1
Apache Subversion 1.7.10
Apache Subversion 1.4.5
Apache Subversion 1.4.6
Apache Subversion 1.5.6
Apache Subversion 1.5.7
Apache Subversion 1.6.14
Apache Subversion 1.6.15
Apache Subversion 1.6.21
Apache Subversion 1.6.23
Apache Subversion 1.6.9
356
VMScore
CVE-2014-3522
The Serf RA layer in Apache Subversion 1.4.0 up to and including 1.7.x prior to 1.7.18 and 1.8.x prior to 1.8.10 does not properly handle wildcards in the Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle malicious users to spoof se...
Apache Subversion 1.7.17
Apache Subversion 1.8.7
Apache Subversion 1.8.5
Apache Subversion 1.8.6
Apache Subversion 1.7.13
Apache Subversion 1.7.14
Apache Subversion 1.7.7
Apache Subversion 1.7.8
Apache Subversion 1.6.14
Apache Subversion 1.6.15
Apache Subversion 1.6.21
Apache Subversion 1.6.23
Apache Subversion 1.6.9
Apache Subversion 1.5.0
Apache Subversion 1.5.8
Apache Subversion 1.4.0
Apache Subversion 1.8.2
Apache Subversion 1.8.3
Apache Subversion 1.8.4
Apache Subversion 1.7.11
Apache Subversion 1.7.12
Apache Subversion 1.7.5
356
VMScore
CVE-2014-3504
The (1) serf_ssl_cert_issuer, (2) serf_ssl_cert_subject, and (3) serf_ssl_cert_certificate functions in Serf 0.2.0 up to and including 1.3.x prior to 1.3.7 does not properly handle a NUL byte in a domain name in the subject's Common Name (CN) field of an X.509 certificate, w...
Apache Subversion 1.6.10
Apache Subversion 1.6.19
Apache Subversion 1.8.2
Apache Subversion 1.4.5
Apache Subversion 1.7.3
Apache Subversion 1.6.20
Apache Subversion 1.7.17
Apache Subversion 1.8.0
Apache Subversion 1.4.2
Apache Subversion 1.6.2
Apache Subversion 1.7.1
Apache Subversion 1.7.11
Apache Subversion 1.7.16
Apache Subversion 1.6.18
Apache Subversion 1.6.16
Apache Subversion 1.5.5
Apache Subversion 1.7.4
Apache Subversion 1.6.21
Apache Subversion 1.6.5
Apache Subversion 1.7.6
Apache Subversion 1.5.3
Apache Subversion 1.4.0
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-3581
reflected XSS
CVE-2024-26925
CVE-2024-27956
LFI
CVE-2024-3607
CVE-2024-3107
CVE-2024-3295
SQL
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started