This module exploits a vulnerability in Avast Internet Security driver (aswFW.sys). The IOCTL handler in the aswFW.sys device driver allows local users to overwrite memory via malformed parameters.
This module triggers a remote vulnerability that allows an attacker to send a NULL UDP message to an affected system, causing an infinit loop in the avahi-daemon service.
This module sends HTTP requests with specially crafted headers making Apache server consume a lot of resources. This attack prevents the victim server from accepting connections from legitimate clients and probably would make the server non-operational. The performance of this exploit depends on the contents of the path parameter. It works better when the requested path points to a static html page, and it's size is not too small.
The mod_isapi module unloads ISAPI modules before the request processing is complete, potentially leaving orphaned callback pointers behind. This can be exploited by sending a specially crafted request followed by a reset packet.