Cockpit for: camunda-bpm-ee-wildfly10-7.5.0-alpha4-ee, False positive for AVG NeoSploit type 87

Was testing out the new camunda-bpm-ee-wildfly10-7.5.0-alpha4-ee.
Looks great!
It did though trigger a false positive in AVG detection for:
NeoSploit Exploit Kit (type 87)

Hi,

thanks for letting us know :slight_smile: Is there anything we can do to fix this?

Cheers
Sebastian

Stop implementing back doors, Mr. Frontend! :stuck_out_tongue_winking_eye:
Just kidding.

I’m guessing two options to fix:

  1. request that AVG fix their detection fingerprint for that exploit
  2. refactor your script (JS) so that it doesn’t match that pattern.

Of the little research I did on the exploit detection is that there’s many false positives. Since I completely scraped Adobe products from my computers… there’s not much of a risk. But, AVG still sqauks/complains about it.