“…Over the past few years there has been plenty of research in these fields of web application security, their types and vulnerabilities [ [6], [8]. There are various sub types of SQLi and XSS [7]. In this paper we present an assessment and analysis of User-input based SQLi technique implemented on the web applications of .bd domain.…”