1 min readMay 24, 2019
All the steps of the flow are vulnerable if someone is able to listen to the requests made by the client application: man-in-the-middle, session fixation, CSRF and so on.
The client and the server should set up and use all the protection mechanisms to avoid those attacks.