IP spoofing, which occurs when a remote host sends out packets that pretend to come from another trusted host.
IP source routing, which occurs when a host can pretend that an IP packet comes from another trusted host.
DNS spoofing, which occurs when an attacker forges name server records.
Interception of clear text passwords and other data by intermediate hosts.
Manipulation of data by attackers in control of intermediate hosts.