Skip to content
  • There are no suggestions because the search field is empty.

False Positive Security KB Article Template

Resolution

The vulnerabilities listed in the table below are in order by the date on which [Product Name] Engineering determined that the [Product Name] [Product Version] was not vulnerable.

Following this text, copy and paste the table consisting of all false positive CVEs. The table can have as many rows as needed to allocate for the number of CVE IDs that have been identified. However, the columns listed should be as followed: Embedded Component, CVE ID, Summary of Vulnerability, Reason Why Product is Not Vulnerable and Date Determined False Positive (see example below).
 
  • Column 1: Embedded Component
  • Column 2: CVE ID
  • Column 3: Summary of Vulnerability
  • Column 4: Reason why Product is not Vulnerable
  • Column 5: Date Determined False Positive

  • Column 1:
  • Column 2:
  • Column 3:
  • Column 4:
  • Column 5:


Internal Comments

Instructions for using this template can be found here:  https://community.rsa.com/docs/DOC-75294

Approval Reviewer Queue

Technical approval queue