Kestrel
tcp/443
Exposing Swagger/OpenAPI documentation is primarily a risk if your API has underlying security flaws, as it gives attackers a precise roadmap to find them.
Those detail every endpoint, parameter, and data model, making it easier to discover and exploit vulnerabilities like broken access control or injection points.
While a perfectly secure API mitigates the danger, protecting your documentation is a critical layer of defense that forces attackers to work without a map.
Severity: info
Fingerprint: 5733ddf49ff49cd1aad035497337c24f9d927200fa964ce7597a8512692ce68d
Public Swagger UI/API detected at path: /swagger/index.html - sample paths:
DELETE /api/chief-complaints/batch
DELETE /api/hot-wash/batch
DELETE /api/media
DELETE /api/responders/batch
GET /api/account-requests
GET /api/after-action-report-settings/incidentId/{incidentId}
GET /api/after-action-report-settings/{id}
GET /api/after-action-reports
GET /api/after-action-reports/document
GET /api/after-action-reports/{id}
GET /api/authentication/current-user
GET /api/authentication/organization-request
GET /api/badges/pdf
GET /api/badges/team-badge
GET /api/chief-complaints
GET /api/chief-complaints/{id}
GET /api/family-assistance
GET /api/family-assistance/{id}
GET /api/general-contacts
GET /api/general-contacts/{id}
GET /api/hot-wash
GET /api/hot-wash/{id}
GET /api/incidents
GET /api/incidents/{id}
GET /api/locations
GET /api/locations/{id}
GET /api/map
GET /api/map/statistics
GET /api/map/victims
GET /api/meal-tracking
GET /api/meal-tracking/statistics
GET /api/organization-roles
GET /api/organization-roles/{id}
GET /api/persons
GET /api/persons/{id}
GET /api/responder-time-logs
GET /api/responders
GET /api/responders/team
GET /api/responders/{id}
GET /api/status-map
GET /api/super-admin
GET /api/super-admin/{id}
GET /api/tenant-configurations/{TenantId}
GET /api/tenant-settings/{TenantId}/list
GET /api/tenants
GET /api/tenants/{Id}
GET /api/users
GET /api/users/{id}
POST /api/account-requests/batch
POST /api/after-action-report-settings
POST /api/authentication/login
POST /api/authentication/logout
POST /api/authentication/refresh-token
POST /api/authentication/request-reset
POST /api/authentication/reset
POST /api/meal-tracking/get-by-id
POST /api/media/upload
POST /api/persons/match
POST /api/persons/unmatch
POST /api/super-admin/reset-password
POST /api/tenant-configurations
POST /api/tenant-settings
POST /api/tenants/default-units
POST /api/tenants/status
POST /api/users/batch
POST /api/users/reset-password/batch
PUT /api/persons/connect
PUT /api/users/settings
Open service 40.90.241.107:443 · api-uat.emcplatforms.com
2026-01-09 13:50
HTTP/1.1 404 Not Found content-length: 0 date: Fri, 09 Jan 2026 13:51:00 GMT server: Kestrel request-context: appId=cid-v1:c12d5971-8ef4-434b-88b7-0c720c43bb99 connection: close
Open service 40.90.241.107:443 · api-uat.emcplatforms.com
2026-01-02 19:19
HTTP/1.1 404 Not Found content-length: 0 date: Fri, 02 Jan 2026 19:19:27 GMT server: Kestrel request-context: appId=cid-v1:c12d5971-8ef4-434b-88b7-0c720c43bb99 connection: close
Open service 40.90.241.107:443 · api-uat.emcplatforms.com
2025-12-23 04:57
HTTP/1.1 404 Not Found content-length: 0 date: Tue, 23 Dec 2025 04:57:56 GMT server: Kestrel request-context: appId=cid-v1:c12d5971-8ef4-434b-88b7-0c720c43bb99 connection: close
Open service 40.90.241.107:443 · api-uat.emcplatforms.com
2025-12-21 01:57
HTTP/1.1 404 Not Found content-length: 0 date: Sun, 21 Dec 2025 01:57:51 GMT server: Kestrel request-context: appId=cid-v1:c12d5971-8ef4-434b-88b7-0c720c43bb99 connection: close
Open service 40.90.241.107:443 · api-uat.emcplatforms.com
2025-12-19 04:49
HTTP/1.1 404 Not Found content-length: 0 date: Fri, 19 Dec 2025 04:49:13 GMT server: Kestrel request-context: appId=cid-v1:c12d5971-8ef4-434b-88b7-0c720c43bb99 connection: close