Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
traffic_server Vendor: apache

About This Product

traffic_server is a software product developed by apache, a major technology provider with a global presence in enterprise and consumer markets. This product serves as critical infrastructure in many organizational deployments, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The significant number of reported vulnerabilities indicates this product has received substantial security scrutiny and community focus over time. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 80 known vulnerabilities affecting apache traffic_server. This includes 11 critical-severity issues and 55 high-severity issues that warrant immediate attention. Vulnerabilities in this product have been disclosed spanning from 2010 to 2025, indicating a sustained research interest and ongoing security attention. 14 medium-severity issues complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2010-2952 2010-09-13 2025-04-11 - 4.3 Likely
CVE-2012-0256 2012-03-26 2025-04-11 - 5.0 Likely
CVE-2014-3525 2014-08-22 2025-04-12 - 10.0 Likely
CVE-2014-10022 2015-01-13 2025-04-12 - 5.0 Likely
CVE-2016-5396 2017-04-17 2025-04-20 7.5 7.8 Likely
CVE-2017-5659 2017-04-17 2025-04-20 7.5 5.0 Likely
CVE-2015-5168 2017-09-13 2025-04-20 9.8 10.0 Likely
CVE-2015-5206 2017-09-13 2025-04-20 9.8 10.0 Likely
CVE-2014-3624 2017-10-30 2025-04-20 9.8 7.5 Likely
CVE-2015-3249 2017-10-30 2025-04-20 9.8 7.5 Likely
CVE-2017-5660 2018-02-27 2024-11-21 8.6 5.0 Likely
CVE-2017-7671 2018-02-27 2024-11-21 7.5 5.0 Likely
CVE-2018-1318 2018-08-29 2024-11-21 7.5 5.0 Likely
CVE-2018-8004 2018-08-29 2024-11-21 6.5 4.0 Likely
CVE-2018-8005 2018-08-29 2024-11-21 5.3 5.0 Likely
CVE-2018-8022 2018-08-29 2024-11-21 7.5 5.0 Likely
CVE-2018-8040 2018-08-29 2024-11-21 5.3 5.0 Likely
CVE-2018-11783 2019-03-07 2024-11-21 7.5 5.0 Likely
CVE-2019-9511 2019-08-13 2025-01-14 7.5 7.8 Likely
CVE-2019-9512 2019-08-13 2024-11-21 7.5 7.8 Likely
CVE-2019-9513 2019-08-13 2025-01-14 7.5 7.8 Likely
CVE-2019-9514 2019-08-13 2025-01-14 7.5 7.8 Likely
CVE-2019-9515 2019-08-13 2025-01-14 7.5 7.8 Likely
CVE-2019-9516 2019-08-13 2025-01-14 6.5 6.8 Likely
CVE-2019-9517 2019-08-13 2025-01-14 7.5 7.8 Likely
CVE-2019-9518 2019-08-13 2025-01-14 7.5 7.8 Likely
CVE-2019-10079 2019-10-22 2024-11-21 7.5 5.0 Likely
CVE-2019-17559 2020-03-23 2024-11-21 9.8 7.5 Likely
CVE-2019-17565 2020-03-23 2024-11-21 9.8 7.5 Likely
CVE-2020-1944 2020-03-23 2024-11-21 9.8 7.5 Likely
CVE-2020-9481 2020-04-27 2024-11-21 7.5 5.0 Likely
CVE-2020-9494 2020-06-24 2024-11-21 7.5 5.0 Likely
CVE-2020-17508 2021-01-11 2024-11-21 7.5 5.0 Likely
CVE-2020-17509 2021-01-11 2024-11-21 7.5 4.3 Likely
CVE-2021-27737 2021-05-14 2024-11-21 7.5 5.0 Likely
CVE-2021-27577 2021-06-29 2024-11-21 7.5 5.0 Likely
CVE-2021-32565 2021-06-29 2024-11-21 7.5 5.0 Likely
CVE-2021-32566 2021-06-30 2024-11-21 7.5 5.0 Likely
CVE-2021-32567 2021-06-30 2024-11-21 7.5 5.0 Likely
CVE-2021-35474 2021-06-30 2024-11-21 9.8 7.5 Likely
CVE-2021-37147 2021-11-03 2024-11-21 7.5 5.0 Likely
CVE-2021-37148 2021-11-03 2024-11-21 7.5 5.0 Likely
CVE-2021-37149 2021-11-03 2024-11-21 7.5 5.0 Likely
CVE-2021-38161 2021-11-03 2024-11-21 8.1 6.8 Likely
CVE-2021-41585 2021-11-03 2024-11-21 7.5 5.0 Likely
CVE-2021-43082 2021-11-03 2024-11-21 9.8 7.5 Likely
CVE-2021-44040 2022-03-23 2024-11-21 7.5 5.0 Likely
CVE-2021-44759 2022-03-23 2024-11-21 8.1 6.8 Likely
CVE-2021-37150 2022-08-10 2025-09-08 7.5 - -
CVE-2022-25763 2022-08-10 2025-10-20 7.5 - -
CVE-2022-28129 2022-08-10 2024-11-21 7.5 - -
CVE-2022-31778 2022-08-10 2024-11-21 7.5 - -
CVE-2022-31779 2022-08-10 2024-11-21 7.5 - -
CVE-2022-31780 2022-08-10 2024-11-21 7.5 - -
CVE-2022-32749 2022-12-19 2025-04-17 7.5 - -
CVE-2022-37392 2022-12-19 2025-04-17 5.3 - -
CVE-2022-40743 2022-12-19 2025-04-17 6.1 - -
CVE-2022-47184 2023-06-14 2025-02-13 7.5 - -
CVE-2023-30631 2023-06-14 2025-02-13 7.5 - -
CVE-2023-33933 2023-06-14 2025-02-13 7.5 - -
CVE-2022-47185 2023-08-09 2025-02-13 7.5 - -
CVE-2023-33934 2023-08-09 2025-02-13 9.1 - -
CVE-2023-44487 2023-10-10 2025-11-07 7.5 - -
CVE-2023-39456 2023-10-17 2025-06-12 7.5 - -
CVE-2023-41752 2023-10-17 2025-06-12 7.5 - -
CVE-2024-31309 2024-04-10 2025-11-04 7.5 - -
CVE-2023-38522 2024-07-26 2025-11-03 7.5 - -
CVE-2024-35161 2024-07-26 2025-11-03 7.5 - -
CVE-2024-35296 2024-07-26 2025-11-03 8.2 - -
CVE-2024-38479 2024-11-14 2025-11-03 7.5 - -
CVE-2024-50305 2024-11-14 2025-06-04 7.5 - -
CVE-2024-50306 2024-11-14 2025-11-03 9.1 - -
CVE-2018-9481 2024-11-20 2024-12-18 6.5 - -
CVE-2024-56202 2025-03-06 2025-04-29 4.3 - -
CVE-2024-38311 2025-03-06 2025-04-29 6.3 - -
CVE-2024-56195 2025-03-06 2025-04-29 6.3 - -
CVE-2024-56196 2025-03-06 2025-05-07 6.3 - -
CVE-2024-53868 2025-04-03 2025-04-29 7.5 - -
CVE-2025-31698 2025-06-19 2025-07-01 7.5 - -
CVE-2025-49763 2025-06-19 2025-07-01 7.5 - -

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for apache traffic_server by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.