Let's provide the following input to check if the application is vulnerable.
<h1>Get Hacked</h1>
We have successfully exploited the vulnerability.
Last updated 1 year ago