Subversion Source Code Management. WANdisco's Subversion binaries provide a complete, fully-tested version of Subversion based on the most recent stable release, including the latest fixes, and undergo the same rigorous quality assurance process that WANdisco uses for its enterprise products supporting the world's largest Subversion implementations. Step #1: Check the path of your previously installed SVN# Open the terminal app in your mac and write the following command and press enter. Which svn Step #2: Uninstall the SVN# The step #1 response I got was /usr/local/bin/svn which is the path where my present version of SVN was installed. All I needed to do was remove it.
Mac Svn Tool
Updated and based off http://jason.pureconcepts.net/2012/10/updating-svn-mac-os-x/
Svn For Mac Yosemite 2017
Note: To compile and install SVN 1.8 you need Xcode with the Command Line Tools installed. This has been tested with SVN 1.8.0 on Mac OSX 10.8 with XCode 4.6.3.
Download the SVN Source
cd ~/Downloads/
curl -o subversion-1.8.0.tar.gz http://archive.apache.org/dist/subversion/subversion-1.8.0.tar.gz
tar -xvf subversion-1.8.0.tar.gz
Build and Install SVN
The default SVN install on Mac OS X uses neon, however the new 1.8 version of SVN only supports serf.
First, create a symlink to your toolchain:

Svn For Mac Yosemite Download
sudo ln -s /Applications/Xcode.app/Contents/Developer/Toolchains/XcodeDefault.xctoolchain/ /Applications/Xcode.app/Contents/Developer/Toolchains/OSX10.8.xctoolchain
Then do:
cd ~/Downloads/subversion-1.8.0
sh get-deps.sh serf
cd serf/
./configure
make
sudo make install
cd ..
./configure --prefix=/usr/local --with-serf=/usr/local/serf
make
sudo make install
Almost done…
To use the SVN version you just installed, you need to update your PATH.
Add or edit the following line in your ~/.bash_profile:export PATH=/usr/local/bin:$PATH
Your system should now report using SVN 1.8.0svn --version
For the protection of our customers, Apple does not disclose, discuss, or confirm security issues until a full investigation has occurred and any necessary patches or releases are available. To learn more about Apple Product Security, see the Apple Product Security website.

For information about the Apple Product Security PGP Key, see How to use the Apple Product Security PGP Key.
Where possible, CVE IDs are used to reference the vulnerabilities for further information.
To learn about other Security Updates, see Apple Security Updates.

Svn Tortoise Mac
Xcode 7.0
DevTools
Available for: OS X Yosemite v10.10.4 or later
Impact: An attacker may be able to bypass access restrictions
Description: An API issue existed in the apache configuration. This issue was addressed by updating header files to use the latest version.
CVE-ID
CVE-2015-3185 : Branko Äibej of the Apache Software Foundation
IDE Xcode Server
Available for: OS X Yosemite v10.10.4 or later
Impact: An attacker may be able to access restricted parts of the filesystem
Description: A comparison issue existed in the node.js send module prior to version 0.8.4. This issue was addressed by upgrading to version 0.12.3.
CVE-ID
CVE-2014-6394 : Ilya Kantor
IDE Xcode Server
Available for: OS X Yosemite v10.10.4 or later
Impact: Multiple vulnerabilities in OpenSSL
Description: Multiple vulnerabilities existed in the node.js OpenSSL module prior to version 1.0.1j. These issues were addressed by updating openssl to version 1.0.1j.
CVE-ID
CVE-2014-3513
CVE-2014-3566
CVE-2014-3567
CVE-2014-3568
IDE Xcode Server
Available for: OS X Yosemite v10.10.4 or later
Impact: An attacker with a privileged network position may be able to inspect traffic to Xcode Server
Description: Connections to Xcode Server may have been made without encryption. This issue was addressed through improved network connection logic.
CVE-ID
CVE-2015-5910 : an anonymous researcher
IDE Xcode Server
Available for: OS X Yosemite v10.10.4 or later
Impact: Build notifications may be sent to unintended recipients
Description: An access issue existed in the handling of repository email lists. This issue was addressed through improved validation.
CVE-ID
CVE-2015-5909 : Daniel Tomlinson of Rocket Apps, David Gatwood of Anchorfree
subversion
Available for: OS X Yosemite v10.10.4 or later
Impact: Multiple vulnerabilities existed in svn versions prior to 1.7.19
Description: Multiple vulnerabilities existed in svn versions prior to 1.7.19. These issues were addressed by updating svn to version 1.7.20.
CVE-ID
CVE-2015-0248
CVE-2015-0251