You have recently run a vulnerability scan on your system. T…

You have recently run a vulnerability scan on your system. The scanner tells you that there is a compromise that you need to fix. Upon further inspection, you find that the vulnerability that was flagged does not actually exist on your system. What can best explain what happened?