Snooping Attacks

Man-in-the-Middle (MITM) Attacks

Replay Attacks

Cross-Site Scripting (XSS) Attacks

SQL Injection Attacks

Denial of Service (DoS) Attacks

Distributed Denial of Service (DDoS) Attacks