Home / Vulnerability Database / JavaScript : Easily guessed database name
JavaScript
JavaScript : Easily guessed database name
Classification
OWASP Top 10 2013
OWASP Top 10 2017
OWASP Top 10 2021
CWE
Overview
Database name is easy to guess. This may lead to data confidentiality violation.
One of the features of HTML5 is the storage data in a client-side SQL database. The main piece of information required for writing to and reading from the database is its name. Therefore, it is important that the name of the database is a unique string that differs from user to user. If the name of the database is easy to guess, unauthorized parties, such as other users, might be able to steal sensitive data or corrupt the database entries.
LOW
DerScanner Severity Score
Do you want to fix JavaScript : Easily guessed database name in your application?
See also
JavaScript
JavaScript : Null salt
JavaScript
JavaScript : Empty encryption key
JavaScript
