Apache with mod_ssl versions prior to 2.8.7 OpenSSL remote buffer overflow exploit. This is an updated version of the OpenFuckV2.c exploit from 2003.
61caddb7b61eed5bf12185ca0177a1e8d83a3c2ce567523a31283432ad23ca33
This is a whitepaper discussing using Apache with mod_proxy and Dotdefender to protect IIS installs. Written in Azerbaijani.
d05d7429ea70363cecca14474d2edcf047db67733e981e02c510f7d4967caf65
Remote exploit for Apache + OpenSSL v0.9.6d and below. This exploit is based upon the openssl-too-open exploit by Solar Eclipse and offers more than 130 targets including various flavors of Linux. Updates: More targets have been added and this version of the exploit also attempts to download the ptrace exploit, compile, and execute it in an attempt to gain root privileges.
a47755378b773f335a74bb7a4b40dcd8af408322961e6a3c7e5252d068998e50
Cert Advisory CA-2002-27 - Linux systems running Apache with mod_ssl accessing SSLv2-enabled OpenSSL 0.9.6d or earlier on Intel x86 architectures are being automatically exploited by a worm which takes advantage of VU#102795 in OpenSSL. The worm scans for vulnerable systems on port 80, then sends exploit code over port 443. The worm also functions as a ddos network which communicates over TCP port 2002. Infected systems can be identified by the presence of /tmp/.bugtraq.c. Fix available here.
eab54007a6d2d6de6fd9dbc5ac0556c2d08bc495727db543468bf1eeac50eabb