Vulnerabilities used for direct root compromise

Four that are currently most common Other possibilities details at http://sunsolve.sun.com/pub-cgi/secBulletin.pl