Last updated 11 months ago
Was this helpful?
Let's provide the following input to check if the application is vulnerable.
<h1>Get Hacked</h1>
We have successfully exploited the vulnerability.