Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2024-23655
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Attacker can prevent users from accessing received emails
Source: NVD (National Vulnerability Database)
Vulnerability Description
Tuta is an encrypted email service. Starting in version 3.118.12 and prior to version 3.119.10, an attacker is able to send a manipulated email so that the user can no longer use the app to get access to received emails. By sending a manipulated email, an attacker could put the app into an unusable state. In this case, a user can no longer access received e-mails. Since the vulnerability affects not only the app, but also the web application, a user in this case has no way to access received emails. This issue was tested with iOS and the web app, but it is possible all clients are affected. Version 3.119.10 fixes this issue.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
输入验证不恰当
Source: NVD (National Vulnerability Database)
Vulnerability Title
Tutanota 输入验证错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Tutanota是Tuta公司的一项非常注重安全和隐私的电子邮件服务,可加密所有设备上的电子邮件、联系人和日历条目。 Tutanota 3.118.12 到 3.119.10版本存在输入验证错误漏洞,该漏洞源于攻击者能够发送被操纵的电子邮件,使用户无法再使用该应用程序来访问收到的电子邮件。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
tutaotutanota >= 3.118.12, < 3.119.10 -
II. Public POCs for CVE-2024-23655
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2024-23655
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2024-23655

No comments yet


Leave a comment