Home / Vulnerability Database / JavaScript : Easily guessed database name
JavaScript

JavaScript : Easily guessed database name

Classification

Overview

Database name is easy to guess. This may lead to data confidentiality violation.

One of the features of HTML5 is the storage data in a client-side SQL database. The main piece of information required for writing to and reading from the database is its name. Therefore, it is important that the name of the database is a unique string that differs from user to user. If the name of the database is easy to guess, unauthorized parties, such as other users, might be able to steal sensitive data or corrupt the database entries.

LOW

DerScanner Severity Score

Do you want to fix JavaScript : Easily guessed database name in your application?

See also

JavaScript

JavaScript : Null salt

JavaScript

JavaScript : Empty encryption key

JavaScript

JavaScript : Unsafe Azure access control