Skip to main content
Benoit Esnard's user avatar
Benoit Esnard's user avatar
Benoit Esnard's user avatar
Benoit Esnard
  • Member for 9 years, 2 months
  • Last seen this week
220 votes
Accepted

Can ads on a page read my password?

157 votes
Accepted

How to find out what programming language a website is built in?

154 votes
Accepted

Exploiting the delay when a festival ticket is scanned

87 votes
Accepted

Why is this certificate for Imgur only valid for one day?

83 votes
Accepted

What are the cons of stateless password generators?

61 votes
Accepted

What vulnerability is a math operation in an HTTP request trying to exploit?

61 votes
Accepted

Is it safe to check password against the HIBP Pwned Passwords API during account registration?

61 votes
Accepted

What's the point in hashing phone numbers?

52 votes
Accepted

How bad would a partial hash leak be, realistically?

44 votes
Accepted

Website seeing my Facebook data?

43 votes

Security of my homebrew hash algorithm

42 votes
Accepted

Accessing multiple sites via HTTPS produces different, unrelated content (Peugeot club via HTTPS)

40 votes
Accepted

Predicting Math.random() numbers?

38 votes
Accepted

Running code generated in realtime in JavaScript with eval()

36 votes

John the ripper password cracked or not?

28 votes

Am I experiencing a brute force attack?

26 votes

Can I simply search-replace < and >?

14 votes

How do you prevent sending cookie data over HTTP the first time?

13 votes

Blocking people from taking pictures of me with smartphone

12 votes

Do 2FA sites leak info by confirming a correct password guess?

11 votes
Accepted

Is this a phishing link?

11 votes

Why didn't OSes securely delete files right from the beginning? And why do they still not do this?

10 votes

Do XSS attempts leave any trace on the server?

10 votes

Global variables and information security

10 votes
Accepted

Should CVE be assigned to an application even if the vulnerability is in a vulnerable 3rd-party library?

9 votes
Accepted

Is CSP meant to be used with HTTPS (TLS) only?

9 votes

Is that a good idea? - Firefox/Chrome in-content encryption

9 votes
Accepted

How is SHA-1 insecure if it is not vulnerable to what MD5 is?

8 votes

When can you not use strcmp?

8 votes

Any non alert() based non malicious XSS payloads?