metasploit-framework/data/exploits/capture/http/forms/wwe.com.txt

1 line
802 B
Plaintext
Executable File

<form action='http://search.wwe.com/search' method='get'> <input name="q" class="search" type="text" /><input name="search" title="Search" class="submit" type="image" src="/styles/v4/images/buttons/searchbutton.gif" alt="Search" /><input name="site" type="hidden" value="" /><input name="client" type="hidden" value="" /><input name="proxystylesheet" type="hidden" value="" /><input name="output" type="hidden" value="" /></form><form name='RFORM' method='post'> <input name="POA_ID" type="radio" value="" /><input name="POA_ID" type="radio" value="" /><input name="POA_ID" type="radio" value="" /><input name="POA_ID" type="radio" value="" /><input name="SUBMIT" type="image" src="" id="pollsubmit" value="" height="20" alt="Vote!" onclick="javascript:submitForm(); return false;" width="58" /></form>