Here is the list of attacks
1 Brute force
2 Man-in-the-middle (countermeasures digital signature and mutual authentication)
3 Replay attack
4 Meet in the Middle
5 Smurf
6 Fraggle
7 ATM
8 RFID attacks ( Eavesdroppining/Skimming, Traffic Analysis, Spoofing & DDoS)
9 Buffer overflow (countermeasure Input Validation)
10 XSS
11 CSRF
12 Dictionary attacks
13 Spoofing/Masquerading
14 Rainbow tables
15 Social engineering attacks
16 Birthday attack
17 Eavesdropping /Skimming attack
18 Dumpster diving
19 SQL injection
20 Keyboard attack
21 Laboratory attack
22 piggybacking
23 tailgating
24 emanation attacks
25 object reuse vulnerable for RAM scraping attacks
26 Aggregation and Inference (countermeasures DB views/Polyinstantiation/perturbation)
27 Known Plaintext/Chosen Ciphertext/Chosen plaintext attack/Ciphertext only
28 Covert channel /Storage and timing
29 frequency analysis attacks
30 ping of death
31 Teardrop
32 phising /Spear phishing
33 cybersquatting
34 pharming attack
35 bluejacking/bluesnarfing/bluebuggin
36 side channel attacks
37 SYN flood/Ping flood/ICMP flood
38 Phreaking
39 Vishing
40 Session Hijacking(IP spoofing)/ Sniffing/Fragmentation attack
41 war driving
42 Land attacks
43 TOC/TOU
44 Salami
45 Data diddling
46 Scavenging
47 Spamming
48 Watering hole attack
49 ARP Poisoning
50 Blachole attack
51 Traffic Analysis