Why would publishing read-only HAProxy statistics page be considered a security vulnerability?

It seems that some HackerOne reports such as https://hackerone.com/reports/1884372 claim that having HAProxy statistics page visible to the world is a security vulnerability.
Since HAProxy default stats enable configuration is always read-… Continue reading Why would publishing read-only HAProxy statistics page be considered a security vulnerability?

What does the IMAP banner alone show regarding security (STARTTLS, hashing, information disclosure)?

I encountered an open TCP/143 IMAP port which responded with this banner:
* OK [CAPABILITY IMAP4rev1 SASL-IR LOGIN-REFERRALS ID ENABLE IDLE LITERAL+ STARTTLS AUTH=PLAIN AUTH=LOGIN AUTH=DIGEST-MD5 AUTH=CRAM-MD5] Dovecot ready.

From this I … Continue reading What does the IMAP banner alone show regarding security (STARTTLS, hashing, information disclosure)?

I have found my email online in a .txt file. What should be my next steps? [closed]

A few days ago someone tried to log into my bank account, the attempt was unsuccessful but it was quite concerning. I’ve spent the past weekend moving my most important accounts to alternate emails and setting up TFA everywhere. I plan to … Continue reading I have found my email online in a .txt file. What should be my next steps? [closed]

Is having hard-coded API keys such as the SafetyNet API key considered a vulnerability?

I have a scenario where the developers are using SafetyNet API to protect their Android apps. I observed that the SafetyNet API key has been hard-coded within the apk file. This is the first time I came across this behaviour.
Is this expos… Continue reading Is having hard-coded API keys such as the SafetyNet API key considered a vulnerability?

Would an attacker want the PII (personal information) of a deceased natural person?

One of my close relatives recently passed away. They had a large digital footprint, and their data was leaked and distributed on the internet. Unfortunately, the websites who store that information keep giving glib responses to requests fo… Continue reading Would an attacker want the PII (personal information) of a deceased natural person?

I gave my first name and alt email to someone I don’t know, will that reveal who I am?

So, I wanted to get this game (to try it as it had no demo), so I went to a website, did not click on anything except the link to the Google drive folder, and then stupidly requested access to a Google Drive folder using my alt Google acco… Continue reading I gave my first name and alt email to someone I don’t know, will that reveal who I am?