Vulnerabilities (CVE)

Join the Common Vulnerabilities and Exposures (CVE) community and start to get notified about new vulnerabilities.

Filtered by vendor Telegram Subscribe
Total 33 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2018-3986 1 Telegram 1 Telegram 2023-02-03 2.1 LOW 5.5 MEDIUM
An exploitable information disclosure vulnerability exists in the "Secret Chats" functionality of the Telegram Android messaging application version 4.9.0. The "Secret Chats" functionality allows a user to delete all traces of a chat, either by using a time trigger or by direct request. There is a bug in this functionality that leaves behind photos taken and shared on the secret chats, even after the chats are deleted. These photos will be stored in the device and accessible to all applications installed on the Android device.
CVE-2021-30496 1 Telegram 1 Telegram 2023-02-02 3.5 LOW 5.7 MEDIUM
** DISPUTED ** The Telegram app 7.6.2 for iOS allows remote authenticated users to cause a denial of service (application crash) if the victim pastes an attacker-supplied message (e.g., in the Persian language) into a channel or group. The crash occurs in MtProtoKitFramework. NOTE: the vendor's perspective is that "this behavior can't be considered a vulnerability."
CVE-2022-43363 1 Telegram 1 Telegram 2022-12-08 N/A 6.1 MEDIUM
** DISPUTED ** Telegram Web 15.3.1 allows XSS via a certain payload derived from a Target Corporation website. NOTE: some third parties have been unable to discern any relationship between the Pastebin information and a possible XSS finding.
CVE-2021-27351 1 Telegram 1 Telegram 2022-05-23 5.0 MEDIUM 5.3 MEDIUM
The Terminate Session feature in the Telegram application through 7.2.1 for Android, and through 2.4.7 for Windows and UNIX, fails to invalidate a recently active session.
CVE-2019-16248 1 Telegram 1 Telegram 2021-10-18 2.1 LOW 5.5 MEDIUM
The "delete for" feature in Telegram before 5.11 on Android does not delete shared media files from the Telegram Images directory. In other words, there is a potentially misleading UI indication that a sender can remove a recipient's copy of a previously sent image (analogous to supported functionality in which a sender can remove a recipient's copy of a previously sent message).
CVE-2021-41861 1 Telegram 1 Telegram 2021-10-08 2.1 LOW 3.3 LOW
The Telegram application 7.5.0 through 7.8.0 for Android does not properly implement image self-destruction, a different vulnerability than CVE-2019-16248. After approximately two to four uses of the self-destruct feature, there is a misleading UI indication that an image was deleted (on both the sender and recipient sides). The images are still present in the /Storage/Emulated/0/Telegram/Telegram Image/ directory.
CVE-2021-40532 1 Telegram 1 Web K Alpha 2021-09-10 7.5 HIGH 9.8 CRITICAL
Telegram Web K Alpha before 0.7.2 mishandles the characters in a document extension.
CVE-2021-27204 2 Apple, Telegram 2 Macos, Telegram 2021-09-08 2.1 LOW 5.5 MEDIUM
Telegram before 7.4 (212543) Stable on macOS stores the local passcode in cleartext, leading to information disclosure.
CVE-2021-27205 2 Apple, Telegram 2 Macos, Telegram 2021-09-08 2.1 LOW 5.5 MEDIUM
Telegram before 7.4 (212543) Stable on macOS stores the local copy of self-destructed messages in a sandbox path, leading to sensitive information disclosure.
CVE-2021-37596 1 Telegram 1 Web K Alpha 2021-08-09 4.3 MEDIUM 6.1 MEDIUM
Telegram Web K Alpha 0.6.1 allows XSS via a document name.
CVE-2021-36769 1 Telegram 2 Telegram, Telegram Desktop 2021-07-29 5.0 MEDIUM 5.3 MEDIUM
A reordering issue exists in Telegram before 7.8.1 for Android, Telegram before 7.8.3 for iOS, and Telegram Desktop before 2.8.8. An attacker can cause the server to receive messages in a different order than they were sent a client.
CVE-2020-25824 1 Telegram 1 Telegram Desktop 2021-07-21 2.1 LOW 2.4 LOW
Telegram Desktop through 2.4.3 does not require passcode entry upon pushing the Export key within the Export Telegram Data wizard. The threat model is a victim who has voluntarily opened Export Wizard but is then distracted. An attacker then approaches the unattended desktop and pushes the Export key. This attacker may consequently gain access to all chat conversation and media files.
CVE-2019-10044 2 Microsoft, Telegram 3 Windows, Telegram, Telegram Desktop 2021-07-21 6.8 MEDIUM 8.8 HIGH
Telegram Desktop before 1.5.12 on Windows, and the Telegram applications for Android, iOS, and Linux, is vulnerable to an IDN homograph attack when displaying messages containing URLs. This occurs because the application produces a clickable link even if (for example) Latin and Cyrillic characters exist in the same domain name, and the available font has an identical representation of characters from different alphabets.
CVE-2019-15514 1 Telegram 1 Telegram 2021-07-21 5.0 MEDIUM 5.3 MEDIUM
The Privacy > Phone Number feature in the Telegram app 5.10 for Android and iOS provides an incorrect indication that the access level is Nobody, because attackers can find these numbers via the Group Info feature, e.g., by adding a significant fraction of a region's assigned phone numbers.
CVE-2020-10570 1 Telegram 1 Telegram 2021-07-21 3.6 LOW 6.1 MEDIUM
The Telegram application through 5.12 for Android, when Show Popup is enabled, might allow physically proximate attackers to bypass intended restrictions on message reading and message replying. This might be interpreted as a bypass of the passcode feature.
CVE-2020-12474 1 Telegram 2 Telegram, Telegram Desktop 2021-07-21 4.3 MEDIUM 6.5 MEDIUM
Telegram Desktop through 2.0.1, Telegram through 6.0.1 for Android, and Telegram through 6.0.1 for iOS allow an IDN Homograph attack via Punycode in a public URL or a group chat invitation URL.
CVE-2021-31323 1 Telegram 1 Telegram 2021-05-25 4.3 MEDIUM 5.5 MEDIUM
Telegram Android <7.1.0 (2090), Telegram iOS <7.1, and Telegram macOS <7.1 are affected by a Heap Buffer Overflow in the LottieParserImpl::parseDashProperty function of their custom fork of the rlottie library. A remote attacker might be able to access heap memory out-of-bounds on a victim device via a malicious animated sticker.
CVE-2021-31320 1 Telegram 1 Telegram 2021-05-25 5.8 MEDIUM 7.1 HIGH
Telegram Android <7.1.0 (2090), Telegram iOS <7.1, and Telegram macOS <7.1 are affected by a Heap Buffer Overflow in the VGradientCache::generateGradientColorTable function of their custom fork of the rlottie library. A remote attacker might be able to overwrite heap memory out-of-bounds on a victim device via a malicious animated sticker.
CVE-2021-31322 1 Telegram 1 Telegram 2021-05-25 4.3 MEDIUM 5.5 MEDIUM
Telegram Android <7.1.0 (2090), Telegram iOS <7.1, and Telegram macOS <7.1 are affected by a Heap Buffer Overflow in the LOTGradient::populate function of their custom fork of the rlottie library. A remote attacker might be able to access heap memory out-of-bounds on a victim device via a malicious animated sticker.
CVE-2021-31319 1 Telegram 1 Telegram 2021-05-25 4.3 MEDIUM 5.5 MEDIUM
Telegram Android <7.1.0 (2090), Telegram iOS <7.1, and Telegram macOS <7.1 are affected by an Integer Overflow in the LOTGradient::populate function of their custom fork of the rlottie library. A remote attacker might be able to access heap memory out-of-bounds on a victim device via a malicious animated sticker.