1 - The top Linux/UNIX threat continues to be the Internet's most popular DNS server software, BIND (Berkeley Internet Name Domain). Buffer overruns and cache poisoning are common attack vectors…
2 - Next on the list is the generic Linux/UNIX Web server, which includes Apache and other servers…
3 - The third-rated vulnerability is the password (and other authentication methods)…
4 - Fourth are version-control systems, specifically the most popular, Concurrent Versions System (CVS) and Subversion…
5 - Email services are the fifth most common attack vectors. Sendmail is still the most widely used mail transport agent (MTA) on Linux/UNIX, and it has a number of vulnerabilities. Qmail, Courier, Exim and Postfix are newer alternatives with their own vulnerabilities…
6 - It should come as no surprise that a remote network management tool poses considerable risks to networks, and SNMP, which is usually enabled by default, comes in as the sixth most commonly exploited weakness…
7 - Multiple vulnerabilities in the OpenSSL encryption tool library makes this number seven on the list…
8 - Enterprise NIS and NSF Servers that haven't been configured properly are the next biggest threat…
9 - Databases are designed to be accessed but vulnerabilities can sometimes let remote attackers exploit the open nature of these applications to piggy-back their way into a network…
10 - Kernel vulnerabilities round out the list at the tenth position.