Telegram

Telegram Desktop

9 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.02%
  • Veröffentlicht 15.01.2026 23:25:43
  • Zuletzt bearbeitet 30.01.2026 00:56:05

Telegram Desktop 2.9.2 contains a denial of service vulnerability that allows attackers to crash the application by sending an oversized message payload. Attackers can generate a 9 million byte buffer and paste it into the messaging interface to trig...

  • EPSS 0.29%
  • Veröffentlicht 17.07.2021 00:15:07
  • Zuletzt bearbeitet 21.11.2024 06:14:03

A reordering issue exists in Telegram before 7.8.1 for Android, Telegram before 7.8.3 for iOS, and Telegram Desktop before 2.8.8. An attacker can cause the server to receive messages in a different order than they were sent a client.

  • EPSS 0.18%
  • Veröffentlicht 14.10.2020 15:15:17
  • Zuletzt bearbeitet 21.11.2024 05:18:50

Telegram Desktop through 2.4.3 does not require passcode entry upon pushing the Export key within the Export Telegram Data wizard. The threat model is a victim who has voluntarily opened Export Wizard but is then distracted. An attacker then approach...

  • EPSS 0.22%
  • Veröffentlicht 11.08.2020 17:15:12
  • Zuletzt bearbeitet 21.11.2024 05:08:08

Telegram Desktop through 2.1.13 allows a spoofed file type to bypass the Dangerous File Type Execution protection mechanism, as demonstrated by use of the chat window with a filename that lacks an extension.

  • EPSS 0.96%
  • Veröffentlicht 01.05.2020 14:15:11
  • Zuletzt bearbeitet 21.11.2024 04:59:46

Telegram Desktop through 2.0.1, Telegram through 6.0.1 for Android, and Telegram through 6.0.1 for iOS allow an IDN Homograph attack via Punycode in a public URL or a group chat invitation URL.

Exploit
  • EPSS 0.76%
  • Veröffentlicht 25.03.2019 20:29:00
  • Zuletzt bearbeitet 21.11.2024 04:18:16

Telegram Desktop before 1.5.12 on Windows, and the Telegram applications for Android, iOS, and Linux, is vulnerable to an IDN homograph attack when displaying messages containing URLs. This occurs because the application produces a clickable link eve...

Exploit
  • EPSS 0.37%
  • Veröffentlicht 29.09.2018 19:29:00
  • Zuletzt bearbeitet 21.11.2024 03:54:57

Telegram Desktop (aka tdesktop) 1.3.14, and Telegram 3.3.0.0 WP8.1 on Windows, leaks end-user public and private IP addresses during a call because of an unsafe default behavior in which P2P connections are accepted from clients outside of the My Con...

  • EPSS 0.31%
  • Veröffentlicht 28.09.2018 10:29:15
  • Zuletzt bearbeitet 21.11.2024 03:54:42

Telegram Desktop (aka tdesktop) 1.3.16 alpha, when "Use proxy" is enabled, sends credentials and application data in cleartext over the SOCKS5 protocol.

Exploit
  • EPSS 0.33%
  • Veröffentlicht 19.09.2018 22:29:00
  • Zuletzt bearbeitet 21.11.2024 03:54:07

Telegram Desktop (aka tdesktop) 1.3.14 might allow attackers to cause a denial of service (assertion failure and application exit) via an "Edit color palette" search that triggers an "index out of range" condition. NOTE: this issue is disputed by mul...