Types Of Exploits In Computer Security