Versions
8.0.0 to 8.0.7
9.2.3
6.0.0 to 6.2.3
6.0.0 to 6.2.2
9.1.0
9.2.2
8.1.9
7.0.0 to 7.1.10
7.0.0 and prior
8.0.0 to 9.1.2
7.0.0 to 9.1.0
8.0.0 to 8.1.0
9.1.3
8.1.11
7.0.0
9.2.0
6.2.2
9.2.1
8.0.0 to 8.0.8
All versions prior to version 6.2.1
Apache Traffic Server 6.0.0 to 6.0.3, 7.0.0 to 7.1.5, 8.0.0 to 8.0.1
6.0.0 to 6.2.0
8.0.0 to 8.1.2 and 9.0.0 to 9.0.1
9.0.0
10.0.0
9.2.5
7.0.0 to 7.1.3
8.0.0 to 8.1.3 and 9.0.0 to 9.1.1
8.0.0 to 8.1.2 and 9.0.0 to 9.1.0
5.2.0 to 5.3.2
0
8.1.10
6.2.0 and prior
8.1.8
8.0.0 to 9.0.2
9.2.4
8.0.0
Apache Traffic Server 7.0.0 to 7.1.12, 8.0.0 to 8.1.1, 9.0.0 to 9.0.1
10.0.1
Recent CVEs
CVE-2024-50306
Unchecked return value can allow Apache Traffic Server to retain privileges on startup. This issue affects Apache Traffic Server: from 9.2.0 through 9.2.5, from 10.0.0 through 10.0.1. Users are recommended to upgrade to version 9.2.6 or 10.0.2, which fixes the issue.
CVE-2024-50305
Valid Host header field can cause Apache Traffic Server to crash on some platforms. This issue affects Apache Traffic Server: from 9.2.0 through 9.2.5. Users are recommended to upgrade to version 9.2.6, which fixes the issue, or 10.0.2, which does not have the issue.
CVE-2024-38479
Improper Input Validation vulnerability in Apache Traffic Server. This issue affects Apache Traffic Server: from 8.0.0 through 8.1.11, from 9.0.0 through 9.2.5. Users are recommended to upgrade to version 9.2.6, which fixes the issue, or 10.0.2, which does not have the issue.
CVE-2023-30631
Improper Input Validation vulnerability in Apache Software Foundation Apache Traffic Server. The configuration option proxy.config.http.push_method_enabled didn't function. However, by default the PUSH method is blocked in the ip_allow configuration file.This issue affects Apache Traffic Server: from 8.0.0 through 9.2.0. 8.x users should upgrade to 8.1.7 or later versions 9.x users should upgrade to 9.2.1 or later versions
CVE-2023-33933
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache Software Foundation Apache Traffic Server.This issue affects Apache Traffic Server: from 8.0.0 through 9.2.0. 8.x users should upgrade to 8.1.7 or later versions 9.x users should upgrade to 9.2.1 or later versions
CVE-2022-47184
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache Software Foundation Apache Traffic Server.This issue affects Apache Traffic Server: 8.0.0 to 9.2.0.