Bludit uses predictable methods with MD5 hashing to generate sensitive tokens, allowing attackers to authenticate against the API
Reporter | Title | Published | Views | Family All 3 |
---|---|---|---|---|
![]() | CVE-2024-24554 Bludit - Insecure Token Generation | 24 Jun 202407:11 | ā | cvelist |
![]() | CVE-2024-24554 Bludit - Insecure Token Generation | 24 Jun 202407:11 | ā | vulnrichment |
![]() | CVE-2024-24554 | 24 Jun 202408:15 | ā | nvd |
[
{
"collectionURL": "https://www.bludit.com/",
"defaultStatus": "unaffected",
"packageName": "Bludit",
"platforms": [
"Linux",
"Windows",
"MacOS"
],
"product": "Bludit",
"repo": "https://github.com/bludit/bludit/",
"vendor": "Bludit",
"versions": [
{
"status": "affected",
"version": "2.0"
}
]
}
]
Source | Link |
---|---|
redguard | www.redguard.ch/blog/2024/06/20/security-advisory-bludit/ |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. ContactĀ us for a demo andĀ discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo