Where does PRTG pull exploits & vulnerabilitys from?
Modified on 2025-06-10 16:52:32 +0200
Attention: This article is a record of a conversation with the Paessler support team. The information in this conversation is not updated to preserve the historical record. As a result, some of the information or recommendations in this conversation might be out of date.
Important: We no longer maintain this article. The information might be out of date.
Hello,
Where does PRTG pull exploits & vulnerabilitys from?
Is it Mitre accurate or other DB ?
Thank you
Article Comments
Hi,
could you please elaborate a little bit further which feature you are talking about?
Currently PRTG does not do exploit or direct vulnerability checking as part of a sensor functionality.
On the other side of the spectrum, mitre is our CNA to report any vulnerabilities against PRTG
https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=prtg
BR
Nov, 2022 - Permalink
Disclaimer:
The information in the Paessler Knowledge Base comes without warranty of any kind. Use at your own risk. Before applying any instructions please exercise proper system administrator housekeeping. You must make sure that a proper backup of all your data is available.
Hi, could you please elaborate a little bit further which feature you are talking about? Currently PRTG does not do exploit or direct vulnerability checking as part of a sensor functionality.
On the other side of the spectrum, mitre is our CNA to report any vulnerabilities against PRTG https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=prtg
BR
Nov, 2022 - Permalink