If we analyze in depth the Local Storage APIs, we uncover that attacker can exploit the APIs conception in the browser to retrieve and to modify user informations . Among these attacks, we find the following that harm the confidentiality and availability of data: