<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>article False positive results for vulnerabilities in Troubleshooting</title>
    <link>https://community.dynatrace.com/t5/Troubleshooting/False-positive-results-for-vulnerabilities/ta-p/229343</link>
    <description>&lt;DIV class="lia-message-template-content-zone"&gt;
&lt;P class="sc-cwHptR exAGXd sc-dAbbOL erszSe sc-3b06fd1c-0 ivrEIu" data-testid="paragraph"&gt;A vulnerability might be identified incorrectly. Possible reasons for false positives include:&lt;/P&gt;
&lt;DIV class="sc-6646062a-0 ivCgmd"&gt;
&lt;UL class="sc-gFqAkR iImZDA"&gt;
&lt;LI class="sc-ikkxIA cKpUwy"&gt;The extracted information from the software component isn't correct and a wrong library was identified (for example, due to wrong information in the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;CODE class="sc-cwHptR dSjKiw sc-jEACwC bbjJsP" data-testid="code"&gt;pom.xml&lt;/CODE&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;file).&lt;/LI&gt;
&lt;LI class="sc-ikkxIA cKpUwy"&gt;
&lt;P class="sc-cwHptR exAGXd" data-testid="text"&gt;The identified version of the library has a version string (or a well-known identifier) that was incorrectly parsed or compared. If you see any false positive results, please open a support ticket to help us improve Application Security monitoring.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI class="sc-ikkxIA cKpUwy"&gt;A vulnerability in a certain library is only exploitable if used in combination with a particular runtime version, but the application with the library is run using a different runtime version. You can mute the vulnerability for the process groups where a different runtime version is used.&lt;/LI&gt;
&lt;LI data-stringify-indent="0" data-stringify-border="1"&gt;The application uses string caches which might lead to false-positive attacks and code-level vulnerabilities.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/DIV&gt;
&lt;P class="sc-cwHptR exAGXd sc-dAbbOL erszSe sc-3b06fd1c-0 ivrEIu" data-testid="paragraph"&gt;For more information on how to identify false positives, query the relevant process for information via API, and mute false positives, see&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A class="sc-eDPEul hkhbXm sc-2d500c67-0 sc-68987768-1 gPHVzu bsktS" href="https://dt-url.net/id0346x" target="_blank" rel="noopener noreferrer" data-testid="external-link"&gt;Reported vulnerability is considered as a false positive&lt;/A&gt;.&lt;/P&gt;
&lt;/DIV&gt;</description>
    <pubDate>Thu, 21 Mar 2024 19:20:00 GMT</pubDate>
    <dc:creator>TeoMoldovanu</dc:creator>
    <dc:date>2024-03-21T19:20:00Z</dc:date>
    <item>
      <title>False positive results for vulnerabilities</title>
      <link>https://community.dynatrace.com/t5/Troubleshooting/False-positive-results-for-vulnerabilities/ta-p/229343</link>
      <description>&lt;DIV class="lia-message-template-content-zone"&gt;
&lt;P class="sc-cwHptR exAGXd sc-dAbbOL erszSe sc-3b06fd1c-0 ivrEIu" data-testid="paragraph"&gt;A vulnerability might be identified incorrectly. Possible reasons for false positives include:&lt;/P&gt;
&lt;DIV class="sc-6646062a-0 ivCgmd"&gt;
&lt;UL class="sc-gFqAkR iImZDA"&gt;
&lt;LI class="sc-ikkxIA cKpUwy"&gt;The extracted information from the software component isn't correct and a wrong library was identified (for example, due to wrong information in the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;CODE class="sc-cwHptR dSjKiw sc-jEACwC bbjJsP" data-testid="code"&gt;pom.xml&lt;/CODE&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;file).&lt;/LI&gt;
&lt;LI class="sc-ikkxIA cKpUwy"&gt;
&lt;P class="sc-cwHptR exAGXd" data-testid="text"&gt;The identified version of the library has a version string (or a well-known identifier) that was incorrectly parsed or compared. If you see any false positive results, please open a support ticket to help us improve Application Security monitoring.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI class="sc-ikkxIA cKpUwy"&gt;A vulnerability in a certain library is only exploitable if used in combination with a particular runtime version, but the application with the library is run using a different runtime version. You can mute the vulnerability for the process groups where a different runtime version is used.&lt;/LI&gt;
&lt;LI data-stringify-indent="0" data-stringify-border="1"&gt;The application uses string caches which might lead to false-positive attacks and code-level vulnerabilities.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/DIV&gt;
&lt;P class="sc-cwHptR exAGXd sc-dAbbOL erszSe sc-3b06fd1c-0 ivrEIu" data-testid="paragraph"&gt;For more information on how to identify false positives, query the relevant process for information via API, and mute false positives, see&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A class="sc-eDPEul hkhbXm sc-2d500c67-0 sc-68987768-1 gPHVzu bsktS" href="https://dt-url.net/id0346x" target="_blank" rel="noopener noreferrer" data-testid="external-link"&gt;Reported vulnerability is considered as a false positive&lt;/A&gt;.&lt;/P&gt;
&lt;/DIV&gt;</description>
      <pubDate>Thu, 21 Mar 2024 19:20:00 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Troubleshooting/False-positive-results-for-vulnerabilities/ta-p/229343</guid>
      <dc:creator>TeoMoldovanu</dc:creator>
      <dc:date>2024-03-21T19:20:00Z</dc:date>
    </item>
  </channel>
</rss>

