Exploit

XSS
Trojan Horse
SQL Injection
Pretexting
Phising
Pattern Attack
Man in the Middle Attack
Correlation Attack
Computer Worm
Computer Virus
Baiting