{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T10:19:51.201","vulnerabilities":[{"cve":{"id":"CVE-2024-23655","sourceIdentifier":"security-advisories@github.com","published":"2024-01-25T20:15:40.913","lastModified":"2024-11-21T08:58:06.093","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Tuta is an encrypted email service. Starting in version 3.118.12 and prior to version 3.119.10, an attacker is able to send a manipulated email so that the user can no longer use the app to get access to received emails. By sending a manipulated email, an attacker could put the app into an unusable state. In this case, a user can no longer access received e-mails. Since the vulnerability affects not only the app, but also the web application, a user in this case has no way to access received emails. This issue was tested with iOS and the web app, but it is possible all clients are affected. Version 3.119.10 fixes this issue."},{"lang":"es","value":"Tuta es un servicio de correo electrónico cifrado. A partir de la versión 3.118.12 y antes de la versión 3.119.10, un atacante puede enviar un correo electrónico manipulado para que el usuario ya no pueda utilizar la aplicación para acceder a los correos electrónicos recibidos. Al enviar un correo electrónico manipulado, un atacante podría dejar la aplicación en un estado inutilizable. En este caso, un usuario ya no puede acceder a los correos electrónicos recibidos. Dado que la vulnerabilidad afecta no sólo a la aplicación, sino también a la aplicación web, en este caso un usuario no tiene forma de acceder a los correos electrónicos recibidos. Este problema se probó con iOS y la aplicación web, pero es posible que todos los clientes se vean afectados. La versión 3.119.10 soluciona este problema."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"LOW"},"exploitabilityScore":3.9,"impactScore":1.4}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-20"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:tuta:tutanota:*:*:*:*:*:*:*:*","versionStartIncluding":"3.118.12","versionEndExcluding":"3.119.10","matchCriteriaId":"1E6FEDEF-997F-497D-A060-318512F2EFFE"}]}]}],"references":[{"url":"https://github.com/tutao/tutanota/releases/tag/tutanota-release-3.119.10","source":"security-advisories@github.com","tags":["Release Notes"]},{"url":"https://github.com/tutao/tutanota/security/advisories/GHSA-5h47-g927-629g","source":"security-advisories@github.com","tags":["Exploit","Vendor Advisory"]},{"url":"https://github.com/tutao/tutanota/releases/tag/tutanota-release-3.119.10","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Release Notes"]},{"url":"https://github.com/tutao/tutanota/security/advisories/GHSA-5h47-g927-629g","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Vendor Advisory"]}]}}]}