Telegram 4.6.0 for Android

CPE Details

Telegram 4.6.0 for Android
4.6.0
2019-05-31
11h30 +00:00
2019-05-31
11h30 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:telegram:telegram:4.6.0:*:*:*:*:android:*:*

Informations

Vendor

telegram

Product

telegram

Version

4.6.0

Target Software

android

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2021-36769 2021-07-16 21h03 +00:00 A reordering issue exists in Telegram before 7.8.1 for Android, Telegram before 7.8.3 for iOS, and Telegram Desktop before 2.8.8. An attacker can cause the server to receive messages in a different order than they were sent a client.
5.3
Moyen
CVE-2021-31315 2021-05-18 17h45 +00:00 Telegram Android <7.1.0 (2090), Telegram iOS <7.1, and Telegram macOS <7.1 are affected by a Stack Based Overflow in the blit function of their custom fork of the rlottie library. A remote attacker might be able to access Telegram's stack memory out-of-bounds on a victim device via a malicious animated sticker.
5.5
Moyen
CVE-2021-31317 2021-05-18 17h44 +00:00 Telegram Android <7.1.0 (2090), Telegram iOS <7.1, and Telegram macOS <7.1 are affected by a Type Confusion in the VDasher constructor of their custom fork of the rlottie library. A remote attacker might be able to access Telegram's heap memory out-of-bounds on a victim device via a malicious animated sticker.
5.5
Moyen
CVE-2021-31318 2021-05-18 17h44 +00:00 Telegram Android <7.1.0 (2090), Telegram iOS <7.1, and Telegram macOS <7.1 are affected by a Type Confusion in the LOTCompLayerItem::LOTCompLayerItem function of their custom fork of the rlottie library. A remote attacker might be able to access heap memory out-of-bounds on a victim device via a malicious animated sticker.
5.5
Moyen
CVE-2021-31319 2021-05-18 17h44 +00:00 Telegram Android <7.1.0 (2090), Telegram iOS <7.1, and Telegram macOS <7.1 are affected by an Integer Overflow in the LOTGradient::populate function of their custom fork of the rlottie library. A remote attacker might be able to access heap memory out-of-bounds on a victim device via a malicious animated sticker.
5.5
Moyen
CVE-2021-31320 2021-05-18 17h44 +00:00 Telegram Android <7.1.0 (2090), Telegram iOS <7.1, and Telegram macOS <7.1 are affected by a Heap Buffer Overflow in the VGradientCache::generateGradientColorTable function of their custom fork of the rlottie library. A remote attacker might be able to overwrite heap memory out-of-bounds on a victim device via a malicious animated sticker.
7.1
Haute
CVE-2021-31321 2021-05-18 17h43 +00:00 Telegram Android <7.1.0 (2090), Telegram iOS <7.1, and Telegram macOS <7.1 are affected by a Stack Based Overflow in the gray_split_cubic function of their custom fork of the rlottie library. A remote attacker might be able to overwrite Telegram's stack memory out-of-bounds on a victim device via a malicious animated sticker.
7.1
Haute
CVE-2021-31322 2021-05-18 17h43 +00:00 Telegram Android <7.1.0 (2090), Telegram iOS <7.1, and Telegram macOS <7.1 are affected by a Heap Buffer Overflow in the LOTGradient::populate function of their custom fork of the rlottie library. A remote attacker might be able to access heap memory out-of-bounds on a victim device via a malicious animated sticker.
5.5
Moyen
CVE-2021-31323 2021-05-18 17h43 +00:00 Telegram Android <7.1.0 (2090), Telegram iOS <7.1, and Telegram macOS <7.1 are affected by a Heap Buffer Overflow in the LottieParserImpl::parseDashProperty function of their custom fork of the rlottie library. A remote attacker might be able to access heap memory out-of-bounds on a victim device via a malicious animated sticker.
5.5
Moyen
CVE-2021-27351 2021-02-19 17h57 +00:00 The Terminate Session feature in the Telegram application through 7.2.1 for Android, and through 2.4.7 for Windows and UNIX, fails to invalidate a recently active session.
5.3
Moyen
CVE-2021-27204 2021-02-12 06h48 +00:00 Telegram before 7.4 (212543) Stable on macOS stores the local passcode in cleartext, leading to information disclosure.
5.5
Moyen
CVE-2021-27205 2021-02-12 06h48 +00:00 Telegram before 7.4 (212543) Stable on macOS stores the local copy of self-destructed messages in a sandbox path, leading to sensitive information disclosure.
5.5
Moyen
CVE-2020-12474 2020-05-01 11h45 +00:00 Telegram Desktop through 2.0.1, Telegram through 6.0.1 for Android, and Telegram through 6.0.1 for iOS allow an IDN Homograph attack via Punycode in a public URL or a group chat invitation URL.
6.5
Moyen
CVE-2020-10570 2020-03-24 12h56 +00:00 The Telegram application through 5.12 for Android, when Show Popup is enabled, might allow physically proximate attackers to bypass intended restrictions on message reading and message replying. This might be interpreted as a bypass of the passcode feature.
6.1
Moyen
CVE-2019-16248 2019-09-11 20h19 +00:00 The "delete for" feature in Telegram before 5.11 on Android does not delete shared media files from the Telegram Images directory. In other words, there is a potentially misleading UI indication that a sender can remove a recipient's copy of a previously sent image (analogous to supported functionality in which a sender can remove a recipient's copy of a previously sent message).
5.5
Moyen
CVE-2019-10044 2019-03-25 18h29 +00:00 Telegram Desktop before 1.5.12 on Windows, and the Telegram applications for Android, iOS, and Linux, is vulnerable to an IDN homograph attack when displaying messages containing URLs. This occurs because the application produces a clickable link even if (for example) Latin and Cyrillic characters exist in the same domain name, and the available font has an identical representation of characters from different alphabets.
8.8
Haute