Most API vulnerabilities are fast, remote, and easy to exploit. Attackers take full advantage of these attributes.