Published on
This first part of the OAuth series introduces how OAuth works and two initial client exploits using XSS and CSRF.
OAuth Implementation Vulnerabilities: Part 1
Published on