Types Of Exploit In Cyber Security