Types Of Vulnerabilities In Network Security