Spoofed Forms

Sep 11, 2009 Author: MYSQL Expert
A common method used by attackers is a spoofed form submission. There are variousways to spoof forms, the easiest of which is to simply copy a target form andexecute it from a different location.