Without Copying And Pasting List Possible Attacks That Spring Security Prevents

Without copying and pasting list possible attacks that Spring Security prevents and explain how it prevents them