Exploits using runtime changes
Application crashes
Irrelevant activities/intents exported
Android backup vulnerability
Exploits reproducible only on rooted/jailbroken devices
Lack of obfuscation
Denial of service attacks
Phishing attacks
Social engineering attacks
Reflected file download
Software version disclosure
Issues requiring direct physical access
Issues requiring exceedingly unlikely user interaction
Flaws affecting out-of-date browsers and plugins
CSV injection
Email enumeration
Cross-site Request Forgery (CSRF) with minimal security implications (Logout CSRF, etc.)
Missing cookie flags on non-authentication cookies
CSP Weaknesses
Email Spoofing
Broken links or unclaimed social media accounts (unless chained with an impactful exploit)