Last updated 9 months ago
Let's provide the following input to check if the application is vulnerable.
<h1>Get Hacked</h1>
We have successfully exploited the vulnerability.