← Back to Glossary
OAuth Misconfiguration
Security weaknesses in OAuth implementations including open redirectors, insecure token storage, and improper scope validation.
Security weaknesses in OAuth implementations including open redirectors, insecure token storage, and improper scope validation.