Was testing out the new camunda-bpm-ee-wildfly10-7.5.0-alpha4-ee.
Looks great!
It did though trigger a false positive in AVG detection for:
NeoSploit Exploit Kit (type 87)
Hi,
thanks for letting us know Is there anything we can do to fix this?
Cheers
Sebastian
Stop implementing back doors, Mr. Frontend!
Just kidding.
I’m guessing two options to fix:
- request that AVG fix their detection fingerprint for that exploit
- refactor your script (JS) so that it doesn’t match that pattern.
Of the little research I did on the exploit detection is that there’s many false positives. Since I completely scraped Adobe products from my computers… there’s not much of a risk. But, AVG still sqauks/complains about it.