Good Evening,

What are the most current exploited threats in Linux/UNIX systems?

1 - The top Linux/UNIX threat continues to be the Internet's most popular DNS server software, BIND (Berkeley Internet Name Domain). Buffer overruns and cache poisoning are common attack vectors…

2 - Next on the list is the generic Linux/UNIX Web server, which includes Apache and other servers…

3 - The third-rated vulnerability is the password (and other authentication methods)…

4 - Fourth are version-control systems, specifically the most popular, Concurrent Versions System (CVS) and Subversion…

5 - Email services are the fifth most common attack vectors. Sendmail is still the most widely used mail transport agent (MTA) on Linux/UNIX, and it has a number of vulnerabilities. Qmail, Courier, Exim and Postfix are newer alternatives with their own vulnerabilities…

6 - It should come as no surprise that a remote network management tool poses considerable risks to networks, and SNMP, which is usually enabled by default, comes in as the sixth most commonly exploited weakness…

7 - Multiple vulnerabilities in the OpenSSL encryption tool library makes this number seven on the list…

8 - Enterprise NIS and NSF Servers that haven't been configured properly are the next biggest threat…

9 - Databases are designed to be accessed but vulnerabilities can sometimes let remote attackers exploit the open nature of these applications to piggy-back their way into a network…

10 - Kernel vulnerabilities round out the list at the tenth position.
For brevity, I listed only the problems. The article provides some viable solutions to those issues. Click Here:

SANS keeps the list current, so it might be a good idea to bookmark the url and check it every so often. Additionally, the list for both Win & Linux/Unix can be found Here:

Cheers