Without copying and pasting list possible attacks that Spring Security prevents and explain how it prevents them

Without copying and pasting list possible attacks that Spring Security prevents and explain how it prevents them