https://dhavalkapil.com/blogs/Attacking-the-OAuth-Protocol

Analyzing the weaknesses of the OAuth 2.0 protocol