Details of the exploits for most of these products have been redacted by the organisation which mentioned that it had redacted more than 70,000 details, including names and IP addresses.
Among the companies listed are Comodo, Avast, F-Secure, Zemana Antilogger, Zone Alarm, Trend Micro, Symantec, Rising, Panda Security, Norton, Malwarebytes Anti-Malware, EMET (Enhanced Mitigation Experience Toolkit), Microsoft Security Essentials, McAfee, Kaspersky, GDATA, ESET, ClamAV, Bitdefender, Avira, and AVG.
For F-Secure, these notes about exploits have been retained: "...F-Secure has generally been a lower tier product that causes us minimal difficulty. The only annoyance we have observed is that F-Secure has an apparent entropy-based heuristic that flags Trojaned applications or other binaries containing encrypted/compressed payloads.
For AVG, it lists the products supplied by the company and adds one way to defeat it: "AVG Fake Installer Trick: AVG catches a payload dropped to disk and launched via link file well after execution (process hollowing).
And for Avira, this is retained: "Avira has historically been a popular product among CT targets, but is typically easy to evade. Similar to F-Secure, Avira has an apparent entropy-based heuristic that flags binaries containing encrypted/compressed payloads, but there are two known defeats."
There are links to entropy defeats for both Avira and F-Secure.