Show filters
9 Total Results
Displaying 1-9 of 9
Sort by:
Attacker Value
Unknown
CVE-2021-36769
Disclosure Date: July 17, 2021 (last updated November 28, 2024)
A reordering issue exists in Telegram before 7.8.1 for Android, Telegram before 7.8.3 for iOS, and Telegram Desktop before 2.8.8. An attacker can cause the server to receive messages in a different order than they were sent a client.
0
Attacker Value
Unknown
CVE-2020-25824
Disclosure Date: October 14, 2020 (last updated February 22, 2025)
Telegram Desktop through 2.4.3 does not require passcode entry upon pushing the Export key within the Export Telegram Data wizard. The threat model is a victim who has voluntarily opened Export Wizard but is then distracted. An attacker then approaches the unattended desktop and pushes the Export key. This attacker may consequently gain access to all chat conversation and media files.
0
Attacker Value
Unknown
CVE-2020-17448
Disclosure Date: August 11, 2020 (last updated February 21, 2025)
Telegram Desktop through 2.1.13 allows a spoofed file type to bypass the Dangerous File Type Execution protection mechanism, as demonstrated by use of the chat window with a filename that lacks an extension.
0
Attacker Value
Unknown
CVE-2020-12474
Disclosure Date: May 01, 2020 (last updated November 27, 2024)
Telegram Desktop through 2.0.1, Telegram through 6.0.1 for Android, and Telegram through 6.0.1 for iOS allow an IDN Homograph attack via Punycode in a public URL or a group chat invitation URL.
0
Attacker Value
Unknown
CVE-2019-10044
Disclosure Date: March 25, 2019 (last updated November 27, 2024)
Telegram Desktop before 1.5.12 on Windows, and the Telegram applications for Android, iOS, and Linux, is vulnerable to an IDN homograph attack when displaying messages containing URLs. This occurs because the application produces a clickable link even if (for example) Latin and Cyrillic characters exist in the same domain name, and the available font has an identical representation of characters from different alphabets.
0
Attacker Value
Unknown
CVE-2018-17780
Disclosure Date: September 29, 2018 (last updated November 27, 2024)
Telegram Desktop (aka tdesktop) 1.3.14, and Telegram 3.3.0.0 WP8.1 on Windows, leaks end-user public and private IP addresses during a call because of an unsafe default behavior in which P2P connections are accepted from clients outside of the My Contacts list.
0
Attacker Value
Unknown
CVE-2018-17613
Disclosure Date: September 28, 2018 (last updated November 27, 2024)
Telegram Desktop (aka tdesktop) 1.3.16 alpha, when "Use proxy" is enabled, sends credentials and application data in cleartext over the SOCKS5 protocol.
0
Attacker Value
Unknown
CVE-2018-17231
Disclosure Date: September 19, 2018 (last updated November 08, 2023)
Telegram Desktop (aka tdesktop) 1.3.14 might allow attackers to cause a denial of service (assertion failure and application exit) via an "Edit color palette" search that triggers an "index out of range" condition. NOTE: this issue is disputed by multiple third parties because the described attack scenario does not cross a privilege boundary
0
Attacker Value
Unknown
CVE-2016-10351
Disclosure Date: May 01, 2017 (last updated November 26, 2024)
Telegram Desktop 0.10.19 uses 0755 permissions for $HOME/.TelegramDesktop, which allows local users to obtain sensitive authentication information via standard filesystem operations.
0