Submit a ticketCall us

AnnouncementsTHWACKcamp 2018 is here

2018 is the seventh year for THWACKcamp™, and once again we’ll be live October 17 – 18 with packed session tracks covering everything from network monitoring and management, to change control, application management, storage, cloud and DevOps, security, automation, virtualization, mapping, logging, and more.

Register for online sessions.

Home > Success Center > Network Performance Monitor (NPM) > NPM - Knowledgebase Articles > SolarWinds product vulnerabilities

SolarWinds product vulnerabilities

Table of contents
Created by Zaquan Henry, last modified by MindTouch on Jun 23, 2016

Views: 1,151 Votes: 2 Revisions: 4

Overview

Although products go through extensive testing, there will always be a need to keep things up to date and patched to help minimize and eliminating chances of being vulnerable to penetration or otherwise.  

Environment

All SolarWinds products 

Detail

After our testing and release, we can only support the SolarWinds infrastructure and recommend you also keep all other interlacing or integrated program in the proper patched level and work with the vendor you find your vulnerability with if other than SolarWinds. 

 

But if you do have an audit run or find any type of vulnerability in our products, please create a ticket and include as much detail as you can about the vulnerability and your system. You can ensure that your ticket will be sent to our development team or archived if further development is needed.

 

You can find information on what vulnerabilities were fixed in your products latest service Release Notes, within the customer portal as well as in Thwack . 

 

If you have a version older than the latest, check the customer portal and see if a hot fix addresses your issue. If not, you can try upgrading if needed . 

 

Last modified

Tags

Classifications

Public