RSS   Podatności dla 'Telegram desktop'   RSS

2020-08-11
 
CVE-2020-17448

CWE-863
 

 
Telegram Desktop through 2.1.13 allows a spoofed file type to bypass the Dangerous File Type Execution protection mechanism, as demonstrated by use of the chat window with a filename that lacks an extension.

 
2020-05-01
 
CVE-2020-12474

CWE-20
 

 
Telegram Desktop through 2.0.1, Telegram through 6.0.1 for Android, and Telegram through 6.0.1 for iOS allow an IDN Homograph attack via Punycode in a public URL or a group chat invitation URL.

 
2019-03-25
 
CVE-2019-10044

 

 
Telegram Desktop before 1.5.12 on Windows, and the Telegram applications for Android, iOS, and Linux, is vulnerable to an IDN homograph attack when displaying messages containing URLs. This occurs because the application produces a clickable link even if (for example) Latin and Cyrillic characters exist in the same domain name, and the available font has an identical representation of characters from different alphabets.

 
2018-09-29
 
CVE-2018-17780

CWE-200
 

 
Telegram Desktop (aka tdesktop) 1.3.14, and Telegram 3.3.0.0 WP8.1 on Windows, leaks end-user public and private IP addresses during a call because of an unsafe default behavior in which P2P connections are accepted from clients outside of the My Contacts list.

 
2018-09-28
 
CVE-2018-17613

CWE-522
 

 
Telegram Desktop (aka tdesktop) 1.3.16 alpha, when "Use proxy" is enabled, sends credentials and application data in cleartext over the SOCKS5 protocol.

 
2018-09-19
 
CVE-2018-17231

CWE-617
 

 
** DISPUTED ** Telegram Desktop (aka tdesktop) 1.3.14 might allow attackers to cause a denial of service (assertion failure and application exit) via an "Edit color palette" search that triggers an "index out of range" condition. NOTE: this issue is disputed by multiple third parties because the described attack scenario does not cross a privilege boundary.

 

 >>> Vendor: Telegram 6 Produkty
Messenger
Telegram desktop
Telegram
Telegram messenger
WEB
Web k alpha


Copyright 2024, cxsecurity.com

 

Back to Top