The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Computer vulnerabilities of F-PROT AV

F-PROT Antivirus: bypassing via ELF, RAR, TAR, ZIP
An attacker can create an archive or a program containing a virus, which is not detected by F-PROT Antivirus...
BID-52585, BID-52588, BID-52591, BID-52608, BID-52610, BID-52612, BID-52614, BID-52615, BID-52623, BID-52629, CVE-2012-1420, CVE-2012-1423, CVE-2012-1426, CVE-2012-1431, CVE-2012-1443, CVE-2012-1456, CVE-2012-1457, CVE-2012-1459, CVE-2012-1460, CVE-2012-1463, VIGILANCE-VUL-11468
Avast, F-Prot: virus not detected on NTFS
An attacker which can upload a virus on a NTFS partition can change its permissions, so it is still executable, but it is not detected by the antivirus...
BID-50569, VIGILANCE-VUL-11128
Several products: several vulnerabilities
Several vulnerabilities were announced in numerous products...
BID-36242, BID-36243, BID-36248, BID-36250, BID-36252, BID-36253, BID-36254, BID-36257, BID-36258, BID-36263, BID-36267, BID-36285, BID-36286, BID-36813, BID-36818, BID-36819, BID-37640, CERTA-2009-AVI-384, CERTA-2009-AVI-424, CVE-2009-3087, CVE-2009-3094, CVE-2009-3095, CVE-2009-3098, CVE-2009-3099, CVE-2009-3111, CVE-2009-3344, CVE-2009-3345, CVE-2009-3346, CVE-2009-3569, CVE-2009-3570, CVE-2009-3571, CVE-2009-3878, CVE-2009-4481-REJECT, CVE-2009-4484, VIGILANCE-VUL-9000
F-PROT Antivirus: bypassing via ARJ LHA RAR
An attacker can create a ARJ/LHA/RAR archive containing a virus which is not detected by F-PROT products...
BID-35427, TZO-34-2009, VIGILANCE-VUL-8807
F-PROT Antivirus: bypassing via TAR
An attacker can create a TAR archive containing a virus which is not detected by F-PROT products...
BID-35355, TZO-33-2009, VIGILANCE-VUL-8794
F-PROT Antivirus: bypassing via CAB
An attacker can create a CAB archive containing a virus which is not detected by F-PROT...
BID-34896, CVE-2009-1783, TZO-21-2009, VIGILANCE-VUL-8705
F-Prot AV: denial of service via ELF
An attacker can create a malicious ELF binary in order to create a denial of service and possibly to execute code in F-Prot AV...
BID-32753, CVE-2008-5747, IVIZ-08-016, VIGILANCE-VUL-8318
F-PROT: denial of service via zip
An attacker can send a corrupted zip file to a victim, this will generate a denial of service...
F-PROT: several denials of service
An attacker can create malformed files in order to stop F-PROT...
BID-30253, BID-30258, CVE-2008-3243, CVE-2008-3244, n.runs-SA-2008.002, VIGILANCE-VUL-7953
Antivirus: bypassing via base64
An attacker can use base64 data containing unexpected characters in order to bypass some antivirus...
BID-21461, CVE-2006-6406, CVE-2006-6407, CVE-2006-6408, CVE-2006-6409, DSA-1238-1, MDKSA-2006:230, SUSE-SA:2006:078, VIGILANCE-VUL-6374
Our database contains other pages. You can request a free trial to read them.

Display information about F-PROT AV: