This issue works by passing in a basic XSS payload to a vulnerable GET parameter that is reflected in the output without sanitization.
確定! 回上一頁