metasploit-framework/data/exploits/capture/http/forms/zedge.net.txt

1 line
542 B
Plaintext
Executable File

<form action='' id='search' method='post' onsubmit='zSearch();return false;' accept-charset='utf-8'> <input class="field" type="text" id="txt_query" value="" onfocus="if(this.value=='Search Zedge now!') { this.value=''; $('txt_query').setStyle('color', '#000'); }" onblur="if(this.value=='') { this.value='Search Zedge now!'; $('txt_query').setStyle('color', '#ccc'); }" /><input name="submit" class="blackbutton" type="submit" value="" onclick="phone_ctype=$('lst_content_type').options[$('lst_content_type').selectedIndex].value;" /></form>