Zippkin Unauthenticated Access Scanner
There is an unauthenticated access vulnerability in Zippkin.
Short Info
Level
High
Single Scan
Single Scan
Can be used by
Asset Owner
Estimated Time
5 seconds
Time Interval
2 months 4 weeks
Scan only one
URL
Toolbox
-
The technical impact is attackers acting as users or administrators, or users using privileged functions, or creating, accessing, updating or deleting every record. The business impact depends on the protection needs of the application and data.