cve-2016-8734
Vulnerability from cvelistv5
Published
2017-10-16 13:00
Modified
2024-09-16 20:01
Severity ?
EPSS score ?
Summary
Apache Subversion's mod_dontdothat module and HTTP clients 1.4.0 through 1.8.16, and 1.9.0 through 1.9.4 are vulnerable to a denial-of-service attack caused by exponential XML entity expansion. The attack can cause the targeted process to consume an excessive amount of CPU resources or memory.
References
▼ | URL | Tags | |
---|---|---|---|
security@apache.org | http://www.debian.org/security/2017/dsa-3932 | Third Party Advisory | |
security@apache.org | http://www.securityfocus.com/bid/94588 | Third Party Advisory, VDB Entry | |
security@apache.org | http://www.securitytracker.com/id/1037361 | Third Party Advisory, VDB Entry | |
security@apache.org | https://lists.apache.org/thread.html/7798f5cda1b2a3c70db4be77694b12dec8fcc1a441b00009d44f0e09%40%3Cannounce.apache.org%3E | ||
security@apache.org | https://subversion.apache.org/security/CVE-2016-8734-advisory.txt | Issue Tracking, Vendor Advisory | |
security@apache.org | https://www.oracle.com/security-alerts/cpuoct2020.html |
Impacted products
▼ | Vendor | Product |
---|---|---|
Apache Software Foundation | Apache Subversion |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T02:27:41.332Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "94588", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/94588" }, { "name": "[announce] 20161129 [SECURITY] Apache Subversion 1.9.5 released", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/7798f5cda1b2a3c70db4be77694b12dec8fcc1a441b00009d44f0e09%40%3Cannounce.apache.org%3E" }, { "name": "1037361", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1037361" }, { "name": "DSA-3932", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2017/dsa-3932" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://subversion.apache.org/security/CVE-2016-8734-advisory.txt" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Apache Subversion", "vendor": "Apache Software Foundation", "versions": [ { "status": "affected", "version": "1.4.0 to 1.8.16" }, { "status": "affected", "version": "1.9.0 to 1.9.4" } ] } ], "datePublic": "2017-10-13T00:00:00", "descriptions": [ { "lang": "en", "value": "Apache Subversion\u0027s mod_dontdothat module and HTTP clients 1.4.0 through 1.8.16, and 1.9.0 through 1.9.4 are vulnerable to a denial-of-service attack caused by exponential XML entity expansion. The attack can cause the targeted process to consume an excessive amount of CPU resources or memory." } ], "problemTypes": [ { "descriptions": [ { "description": "Denial of Service", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-10-20T21:14:51", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache" }, "references": [ { "name": "94588", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/94588" }, { "name": "[announce] 20161129 [SECURITY] Apache Subversion 1.9.5 released", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/7798f5cda1b2a3c70db4be77694b12dec8fcc1a441b00009d44f0e09%40%3Cannounce.apache.org%3E" }, { "name": "1037361", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1037361" }, { "name": "DSA-3932", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2017/dsa-3932" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://subversion.apache.org/security/CVE-2016-8734-advisory.txt" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@apache.org", "DATE_PUBLIC": "2017-10-13T00:00:00", "ID": "CVE-2016-8734", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Apache Subversion", "version": { "version_data": [ { "version_value": "1.4.0 to 1.8.16" }, { "version_value": "1.9.0 to 1.9.4" } ] } } ] }, "vendor_name": "Apache Software Foundation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Apache Subversion\u0027s mod_dontdothat module and HTTP clients 1.4.0 through 1.8.16, and 1.9.0 through 1.9.4 are vulnerable to a denial-of-service attack caused by exponential XML entity expansion. The attack can cause the targeted process to consume an excessive amount of CPU resources or memory." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial of Service" } ] } ] }, "references": { "reference_data": [ { "name": "94588", "refsource": "BID", "url": "http://www.securityfocus.com/bid/94588" }, { "name": "[announce] 20161129 [SECURITY] Apache Subversion 1.9.5 released", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/7798f5cda1b2a3c70db4be77694b12dec8fcc1a441b00009d44f0e09@%3Cannounce.apache.org%3E" }, { "name": "1037361", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1037361" }, { "name": "DSA-3932", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2017/dsa-3932" }, { "name": "https://www.oracle.com/security-alerts/cpuoct2020.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "name": "https://subversion.apache.org/security/CVE-2016-8734-advisory.txt", "refsource": "CONFIRM", "url": "https://subversion.apache.org/security/CVE-2016-8734-advisory.txt" } ] } } } }, "cveMetadata": { "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2016-8734", "datePublished": "2017-10-16T13:00:00Z", "dateReserved": "2016-10-18T00:00:00", "dateUpdated": "2024-09-16T20:01:52.257Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2016-8734\",\"sourceIdentifier\":\"security@apache.org\",\"published\":\"2017-10-16T13:29:00.220\",\"lastModified\":\"2023-11-07T02:36:28.627\",\"vulnStatus\":\"Modified\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"Apache Subversion\u0027s mod_dontdothat module and HTTP clients 1.4.0 through 1.8.16, and 1.9.0 through 1.9.4 are vulnerable to a denial-of-service attack caused by exponential XML entity expansion. The attack can cause the targeted process to consume an excessive amount of CPU resources or memory.\"},{\"lang\":\"es\",\"value\":\"El m\u00f3dulo mod_dontdothat y los clientes HTTP en su versi\u00f3n 1.4.0 hasta la 1.8.16 y 1.9.0 hasta la 1.9.4 de Apache Subversion son vulnerables a un ataque de denegaci\u00f3n de servicio (DoS) provocado por la expansi\u00f3n exponencial de la entidad XML. El ataque puede provocar que el proceso objetivo consuma una cantidad excesiva de recursos de la CPU o memoria.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:S/C:N/I:N/A:P\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\",\"baseScore\":4.0},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-400\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13109084-931E-4565-BEE5-794B83E6978D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4ED3EA46-88F7-438D-B8FC-D6C5E1C8984C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"726B9C10-ACD5-41C2-A552-FD0046A75966\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87D72A75-EDB9-4AD1-B6FC-8A918804DE0B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B55A7A26-C994-4956-BBE7-BF3A51971295\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.4.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB9E26AB-915A-477F-BA5C-10965A7098F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.4.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFD49A9B-16A7-4362-8D62-6EB5ECBE4296\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B0CB798-F4ED-44E5-9B15-B7009EAC6303\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC3F6E5C-CF55-4CEB-A5B6-D49E0234FF3F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2C1DD29-88D2-49DE-9B77-D925A4B9EB7E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"67130DAF-AE81-43D2-A208-58A53746A7E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.5.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB9F8426-38CB-46B4-B0D0-8D16B48DD53F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.5.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"90631FFA-9AB2-483D-B162-31A47428D280\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.5.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8BD5A981-3FDD-4E74-8EB2-5F324246FFF5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.5.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"88F4E8C9-671B-4DA3-9D0D-98539D8D4FE0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.5.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"341F900B-5179-4CB4-9F41-91B58B29C414\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F34F463-6350-4F48-B037-856DDBB1A4FE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2C813BA-B8F9-446B-A07F-B51F26815578\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3DF4080D-0D95-429E-88AA-1051A5520C01\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.6.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF50F098-A055-4B79-AC35-6BD6F32D70F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.6.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"540461D4-87F4-42AB-ADDC-C7A067FE2893\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.6.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E676744-C623-4894-8764-43588E56D2FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.6.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"669735D1-1C14-4CD7-AA7C-AD2CA63A1979\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.6.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4C568FD-54BC-4506-AF60-BFE7CE14D0F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.6.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5F71F24-D909-49D9-8B4F-FA757FDF1C25\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.6.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"034D1C36-B73E-443E-A6B4-44CC6E7BC043\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.6.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D373245-8384-45E4-BE2E-E0518BD7F84F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.6.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EED44413-D313-4588-9A4B-25F79D0925A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.6.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C193EB08-BBC2-43A2-B11A-9C7E2098862D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.6.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"022A5BCE-A1DC-48E2-829D-AD9261562095\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.6.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"155F83A1-A04A-48C0-A801-B38F129F310F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.6.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"302DC06D-5FB1-4EF9-B5E1-6407B88D65FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.6.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"27A15D05-29BA-4CCC-9348-A516E1E2C079\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.6.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2004B474-9869-445D-957D-20EF254FB461\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.6.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F91A5E0-0DD8-47DD-B52E-A15E8064945F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.6.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C34BE8D-6DFF-4E57-971C-8CCEF13E6500\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.6.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CDBC5BA-6A3C-4DB9-BE16-83A4EB85100C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.6.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF1B4950-4D56-47A2-BCE8-FB3714EA1B2C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.6.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3194C6CE-3E8A-4861-AED1-942824974AE0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D102460-B5D5-46C4-8021-7C3510A5FCF3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"92265E60-7BBF-4E8E-A438-4132D8FD57BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"346DE008-472F-47E1-8B96-F968C7D0A003\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C9BDB22-29E0-48A3-8765-FAC6A3442A35\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.7.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA5EB3A7-DE33-42CB-9B5E-646B9D4FFBFB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.7.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F63AB9E5-FD99-40A8-B24F-623BDDBCA427\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.7.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0CEA6C3E-C41B-4EF9-84E1-72BC6B72D1C6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.7.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0B873C1-E7D6-4E55-A5A7-85000B686071\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.7.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87D2E8DD-4225-476A-AF17-7621C9A28391\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.7.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"40D913E2-0FBD-4F6C-8A21-43A0681237BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.7.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B869CEB-7637-48C3-8A4C-171CFB766B97\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.7.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"75CF5BC1-7071-48A3-86A9-C843485CAED5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.7.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9EB23250-EBD2-4A5F-BF5E-1DAE1A64EF0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.7.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"200DB058-C9F0-4983-AF99-EBB8FC2E7875\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.7.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57697AAD-5264-4C05-89E4-0228DEF2E9DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.7.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24295270-DCBF-4FF3-88F7-E9A30B6388E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.7.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"22E754F2-5D3D-437E-BB15-693D2EB58DA3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.7.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF4232D2-1F70-4A06-BD11-A0DFE6CE0744\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.7.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3256F8C-2CA8-43B5-96E5-794113FF531B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.7.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"593F15F7-E610-458B-B094-BF6AC53B719A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.7.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F5C25F7-0A02-4974-8144-839955C373C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC0E7811-3B60-46E7-943C-E0E7ED00FB01\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A57A3347-6C48-4803-AB4E-A4BC0E6BFA41\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"50D26799-D038-470A-A468-58DBDB64A7E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.8.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3769BD6-B104-4F74-B8C4-89398A8894FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.8.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9757DD5E-42A6-44B8-9692-49690F60C8D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.8.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7B5A014-D4EE-4244-AABA-0873492F7295\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.8.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD9F8C2A-A94E-4D99-839B-47AAE8754191\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.8.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"69D29A9E-DB23-4D86-B4A3-3C4F663416AD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.8.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D86AEE89-9F8E-43A5-A888-F421B10DB2C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.8.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D335628F-EC07-43BE-9B29-3365A6F64D71\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.8.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4EF7D71-3AAF-4112-831A-3538C5B82594\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.8.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"89835508-F72F-4D8A-8E4A-5CFAA5F90C24\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.8.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79A64E1B-2E80-4A95-AA46-3CF66268EB9C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.8.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A83933C-D270-4B9A-8D18-AC7302A5B86F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.8.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8645A28-11C4-4217-88FA-14122E740AE6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.8.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C07A431-98B5-4D52-B7DA-0A6FBF956D6E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.8.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BBF63977-9D8E-4550-8A2E-187F435C059B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"892FF423-1848-4E69-8C4C-E1972B656196\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.9.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9ACF37C7-8752-4A8F-B7E3-2E813C4A0DF0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.9.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74200C33-9505-48EB-964D-6CA28C7F6DB8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.9.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"09FBAFE7-986D-4B24-8122-FDCC380331C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:subversion:1.9.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"32B6148E-3E5F-4DCB-BD8E-45B3D56CB18C\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"}]}]}],\"references\":[{\"url\":\"http://www.debian.org/security/2017/dsa-3932\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/94588\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1037361\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://lists.apache.org/thread.html/7798f5cda1b2a3c70db4be77694b12dec8fcc1a441b00009d44f0e09%40%3Cannounce.apache.org%3E\",\"source\":\"security@apache.org\"},{\"url\":\"https://subversion.apache.org/security/CVE-2016-8734-advisory.txt\",\"source\":\"security@apache.org\",\"tags\":[\"Issue Tracking\",\"Vendor Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpuoct2020.html\",\"source\":\"security@apache.org\"}]}}" } }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.