False Positive Security KB Article Template
Resolution
The vulnerabilities listed in the table below are in order by the date on which [Product Name] Engineering determined that the [Product Name] [Product Version] was not vulnerable.Following this text, copy and paste the table consisting of all false positive CVEs. The table can have as many rows as needed to allocate for the number of CVE IDs that have been identified. However, the columns listed should be as followed: Embedded Component, CVE ID, Summary of Vulnerability, Reason Why Product is Not Vulnerable and Date Determined False Positive (see example below).
- Column 1: Embedded Component
- Column 2: CVE ID
- Column 3: Summary of Vulnerability
- Column 4: Reason why Product is not Vulnerable
- Column 5: Date Determined False Positive
- Column 1:
- Column 2:
- Column 3:
- Column 4:
- Column 5:
Internal Comments
Instructions for using this template can be found here: https://community.rsa.com/docs/DOC-75294Approval Reviewer Queue
Technical approval queue