
CVE-2012-1462
https://notcve.org/view.php?id=CVE-2012-1462
21 Mar 2012 — The ZIP file parser in AhnLab V3 Internet Security 2011.01.18.00, AVG Anti-Virus 10.0.0.1190, Quick Heal (aka Cat QuickHeal) 11.00, Emsisoft Anti-Malware 5.1.0.1, eSafe 7.0.17.0, Fortinet Antivirus 4.2.254.0, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Jiangmin Antivirus 13.0.900, Kaspersky Anti-Virus 7.0.0.125, Norman Antivirus 6.06.12, Sophos Anti-Virus 4.61.0, and AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11 allows remote attackers to bypass malware detection via a ZIP file cont... • http://www.ieee-security.org/TC/SP2012/program.html • CWE-264: Permissions, Privileges, and Access Controls •

CVE-2009-1784
https://notcve.org/view.php?id=CVE-2009-1784
22 May 2009 — The AVG parsing engine 8.5 323, as used in multiple AVG anti-virus products including Anti-Virus Network Edition, Internet Security Netzwerk Edition, Server Edition für Linux/FreeBSD, Anti-Virus SBS Edition, and others allows remote attackers to bypass malware detection via a crafted (1) RAR and (2) ZIP archive. El motor de análisis AVG 8.5 323, como se usa en varios productos antivirus AVG, incluida la Edición de red antivirus, la Edición de Internet Security Netzwerk, la Edición de servidor para Linux / F... • http://blog.zoller.lu/2009/04/avg-zip-evasion-bypass.html • CWE-20: Improper Input Validation •

CVE-2008-6662
https://notcve.org/view.php?id=CVE-2008-6662
07 Apr 2009 — AVG Anti-Virus for Linux 7.5.51, and possibly earlier, allows remote attackers to cause a denial of service (segmentation fault) or possibly execute arbitrary code via a malformed UPX compressed file, which triggers memory corruption. AVG Anti-Virus para Linux v7.5.51, y posiblemente anteriores, permite a atacantes remotos provocar una denegación de servicio (fallo de segmentación) o posiblemente ejecutar código de su elección a través de fichero UPX comprimidos mal formado, lo que lanza una corrupción de m... • http://marc.info/?l=bugtraq&m=122893196715523&w=2 • CWE-20: Improper Input Validation •

CVE-2008-5522
https://notcve.org/view.php?id=CVE-2008-5522
12 Dec 2008 — AVG Anti-Virus 8.0.0.161, when Internet Explorer 6 or 7 is used, allows remote attackers to bypass detection of malware in an HTML document by placing an MZ header (aka "EXE info") at the beginning, and modifying the filename to have (1) no extension, (2) a .txt extension, or (3) a .jpg extension, as demonstrated by a document containing a CVE-2006-5745 exploit. AVG Anti-Virus v8.0.0.161, cuando se utiliza Internet Explorer 6 o 7, permite a atacantes remotos eludir la detección de malware en un documento HT... • http://securityreason.com/securityalert/4723 • CWE-20: Improper Input Validation •

CVE-2008-5530
https://notcve.org/view.php?id=CVE-2008-5530
12 Dec 2008 — Ewido Security Suite 4.0, when Internet Explorer 6 or 7 is used, allows remote attackers to bypass detection of malware in an HTML document by placing an MZ header (aka "EXE info") at the beginning, and modifying the filename to have (1) no extension, (2) a .txt extension, or (3) a .jpg extension, as demonstrated by a document containing a CVE-2006-5745 exploit. Ewido Security Suite v4.0, cuando se utiliza Internet Explorer 6 o 7, permite a atacantes remotos eludir la detección de malware en un documento HT... • http://securityreason.com/securityalert/4723 • CWE-20: Improper Input Validation •

CVE-2006-6618
https://notcve.org/view.php?id=CVE-2006-6618
18 Dec 2006 — AntiHook 3.0.0.23 - Desktop relies on the Process Environment Block (PEB) to identify a process, which allows local users to bypass the product's controls on a process by spoofing the (1) ImagePathName, (2) CommandLine, and (3) WindowTitle fields in the PEB. AntiHook 3.0.0.23 - El escritorio depende del Process Environment Block (PEB) para la identificación de un proceso, el cual permite a usuarios locales evitar los controles del producto en el proceso mediante la simulación de los campos (1) ImagePathName... • http://www.matousec.com/downloads/windows-personal-firewall-analysis/ex-coat.zip •

CVE-2006-6619 – Multiple Vendor Firewall - HIPS Process Spoofing
https://notcve.org/view.php?id=CVE-2006-6619
18 Dec 2006 — AVG Anti-Virus plus Firewall 7.5.431 relies on the Process Environment Block (PEB) to identify a process, which allows local users to bypass the product's controls on a process by spoofing the (1) ImagePathName, (2) CommandLine, and (3) WindowTitle fields in the PEB. AVG Anti-Virus plus Firewall 7.5.431 depende del Process Environment Block (PEB) para la identificación de un proceso, el cual permite a usuarios locales evitar los controles del producto en el proceso mediante la simulación de los campos (1) I... • https://www.exploit-db.com/exploits/29287 •

CVE-2006-6620
https://notcve.org/view.php?id=CVE-2006-6620
18 Dec 2006 — Comodo Personal Firewall 2.3.6.81 relies on the Process Environment Block (PEB) to identify a process, which allows local users to bypass the product's controls on a process by spoofing the (1) ImagePathName, (2) CommandLine, and (3) WindowTitle fields in the PEB. Comodo Personal Firewall 2.3.6.81 depende del Process Environment Block (PEB) para la identificación de un proceso, el cual permite a usuarios locales evitar los controles del producto en el proceso mediante la simulación de los campos (1) ImagePa... • http://www.matousec.com/downloads/windows-personal-firewall-analysis/ex-coat.zip •

CVE-2006-6621
https://notcve.org/view.php?id=CVE-2006-6621
18 Dec 2006 — Filseclab Personal Firewall 3.0.0.8686 relies on the Process Environment Block (PEB) to identify a process, which allows local users to bypass the product's controls on a process by spoofing the (1) ImagePathName, (2) CommandLine, and (3) WindowTitle fields in the PEB. Filseclab Personal Firewall 3.0.0.8686 depende del Process Environment Block (PEB) para la identificación de un proceso, el cual permite a usuarios locales evitar los controles del producto en el proceso mediante la simulación de los campos (... • http://www.matousec.com/downloads/windows-personal-firewall-analysis/ex-coat.zip •

CVE-2006-6622
https://notcve.org/view.php?id=CVE-2006-6622
18 Dec 2006 — Soft4Ever Look 'n' Stop (LnS) 2.05p2 before 20061215 relies on the Process Environment Block (PEB) to identify a process, which allows local users to bypass the product's controls on a process by spoofing the (1) ImagePathName, (2) CommandLine, and (3) WindowTitle fields in the PEB. Soft4Ever Look 'n' Stop (LnS) 2.05p2 en versiones anteriores a 20061215 depende del Process Environment Block (PEB) para la identificación de un proceso, el cual permite a usuarios locales evitar los controles del producto en el... • http://www.matousec.com/downloads/windows-personal-firewall-analysis/ex-coat.zip •