Last updated 1 year ago
Was this helpful?
Let's provide the following input to check if the application is vulnerable.
<h1>Get Hacked</h1>
We have successfully exploited the vulnerability.