Filtered by vendor Telegram
Subscribe
Total
35 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2021-27204 | 2 Apple, Telegram | 2 Macos, Telegram | 2023-12-10 | 2.1 LOW | 5.5 MEDIUM |
Telegram before 7.4 (212543) Stable on macOS stores the local passcode in cleartext, leading to information disclosure. | |||||
CVE-2020-25824 | 1 Telegram | 1 Telegram Desktop | 2023-12-10 | 2.1 LOW | 2.4 LOW |
Telegram Desktop through 2.4.3 does not require passcode entry upon pushing the Export key within the Export Telegram Data wizard. The threat model is a victim who has voluntarily opened Export Wizard but is then distracted. An attacker then approaches the unattended desktop and pushes the Export key. This attacker may consequently gain access to all chat conversation and media files. | |||||
CVE-2021-27351 | 1 Telegram | 1 Telegram | 2023-12-10 | 5.0 MEDIUM | 5.3 MEDIUM |
The Terminate Session feature in the Telegram application through 7.2.1 for Android, and through 2.4.7 for Windows and UNIX, fails to invalidate a recently active session. | |||||
CVE-2021-27205 | 2 Apple, Telegram | 2 Macos, Telegram | 2023-12-10 | 2.1 LOW | 5.5 MEDIUM |
Telegram before 7.4 (212543) Stable on macOS stores the local copy of self-destructed messages in a sandbox path, leading to sensitive information disclosure. | |||||
CVE-2020-10570 | 1 Telegram | 1 Telegram | 2023-12-10 | 3.6 LOW | 6.1 MEDIUM |
The Telegram application through 5.12 for Android, when Show Popup is enabled, might allow physically proximate attackers to bypass intended restrictions on message reading and message replying. This might be interpreted as a bypass of the passcode feature. | |||||
CVE-2020-17448 | 1 Telegram | 1 Telegram Desktop | 2023-12-10 | 6.8 MEDIUM | 7.8 HIGH |
Telegram Desktop through 2.1.13 allows a spoofed file type to bypass the Dangerous File Type Execution protection mechanism, as demonstrated by use of the chat window with a filename that lacks an extension. | |||||
CVE-2020-12474 | 1 Telegram | 2 Telegram, Telegram Desktop | 2023-12-10 | 4.3 MEDIUM | 6.5 MEDIUM |
Telegram Desktop through 2.0.1, Telegram through 6.0.1 for Android, and Telegram through 6.0.1 for iOS allow an IDN Homograph attack via Punycode in a public URL or a group chat invitation URL. | |||||
CVE-2019-16248 | 1 Telegram | 1 Telegram | 2023-12-10 | 2.1 LOW | 5.5 MEDIUM |
The "delete for" feature in Telegram before 5.11 on Android does not delete shared media files from the Telegram Images directory. In other words, there is a potentially misleading UI indication that a sender can remove a recipient's copy of a previously sent image (analogous to supported functionality in which a sender can remove a recipient's copy of a previously sent message). | |||||
CVE-2019-15514 | 1 Telegram | 1 Telegram | 2023-12-10 | 5.0 MEDIUM | 5.3 MEDIUM |
The Privacy > Phone Number feature in the Telegram app 5.10 for Android and iOS provides an incorrect indication that the access level is Nobody, because attackers can find these numbers via the Group Info feature, e.g., by adding a significant fraction of a region's assigned phone numbers. | |||||
CVE-2019-10044 | 2 Microsoft, Telegram | 3 Windows, Telegram, Telegram Desktop | 2023-12-10 | 6.8 MEDIUM | 8.8 HIGH |
Telegram Desktop before 1.5.12 on Windows, and the Telegram applications for Android, iOS, and Linux, is vulnerable to an IDN homograph attack when displaying messages containing URLs. This occurs because the application produces a clickable link even if (for example) Latin and Cyrillic characters exist in the same domain name, and the available font has an identical representation of characters from different alphabets. | |||||
CVE-2018-17780 | 1 Telegram | 2 Telegram Desktop, Telegram Messenger | 2023-12-10 | 4.0 MEDIUM | 6.5 MEDIUM |
Telegram Desktop (aka tdesktop) 1.3.14, and Telegram 3.3.0.0 WP8.1 on Windows, leaks end-user public and private IP addresses during a call because of an unsafe default behavior in which P2P connections are accepted from clients outside of the My Contacts list. | |||||
CVE-2018-3986 | 1 Telegram | 1 Telegram | 2023-12-10 | 2.1 LOW | 5.5 MEDIUM |
An exploitable information disclosure vulnerability exists in the "Secret Chats" functionality of the Telegram Android messaging application version 4.9.0. The "Secret Chats" functionality allows a user to delete all traces of a chat, either by using a time trigger or by direct request. There is a bug in this functionality that leaves behind photos taken and shared on the secret chats, even after the chats are deleted. These photos will be stored in the device and accessible to all applications installed on the Android device. | |||||
CVE-2018-17613 | 1 Telegram | 1 Telegram Desktop | 2023-12-10 | 5.0 MEDIUM | 9.8 CRITICAL |
Telegram Desktop (aka tdesktop) 1.3.16 alpha, when "Use proxy" is enabled, sends credentials and application data in cleartext over the SOCKS5 protocol. | |||||
CVE-2017-17715 | 1 Telegram | 1 Telegram Messenger | 2023-12-10 | 6.8 MEDIUM | 8.8 HIGH |
The saveFile method in MediaController.java in the Telegram Messenger application before 2017-12-08 for Android allows directory traversal via a pathname obtained in a file-transfer request from a remote peer, as demonstrated by writing to tgnet.dat or tgnet.dat.bak. | |||||
CVE-2014-8688 | 1 Telegram | 1 Messenger | 2023-12-10 | 5.0 MEDIUM | 7.5 HIGH |
An issue was discovered in Telegram Messenger 2.6 for iOS and 1.8.2 for Android. Secret chat messages are available in cleartext in process memory and a .db file. |