Where does PRTG pull exploits & vulnerabilitys from?
Modified on 2025-06-10 16:52:32 +0200
Important: We no longer maintain this article. The information might be out of date.
Hello,
Where does PRTG pull exploits & vulnerabilitys from?
Is it Mitre accurate or other DB ?
Thank you
Article Comments
Hi,
could you please elaborate a little bit further which feature you are talking about?
Currently PRTG does not do exploit or direct vulnerability checking as part of a sensor functionality.
Disclaimer: The information in the Paessler Knowledge Base comes without warranty of any kind. Use at your own risk. Before applying any instructions please exercise proper system administrator housekeeping. You must make sure that a proper backup of all your data is available.
Intuitive to Use. Easy to manage. More than 500,000 users rely on Paessler PRTG every day. Find out how you can reduce cost, increase QoS and ease planning, as well.
This article was migrated from our old knowledge base (https://kb.paessler.com). While we tried to keep links working, you may end up in a dead end. If you do so, please report them with a ticket so we can fix it. Thanks! :)
Hi, could you please elaborate a little bit further which feature you are talking about? Currently PRTG does not do exploit or direct vulnerability checking as part of a sensor functionality.
On the other side of the spectrum, mitre is our CNA to report any vulnerabilities against PRTG https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=prtg
BR
Nov, 2022 - Permalink