types of vulnerability attacks