Логотип exploitDog
bind:CVE-2020-25824
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-25824

Количество 3

Количество 3

nvd логотип

CVE-2020-25824

больше 5 лет назад

Telegram Desktop through 2.4.3 does not require passcode entry upon pushing the Export key within the Export Telegram Data wizard. The threat model is a victim who has voluntarily opened Export Wizard but is then distracted. An attacker then approaches the unattended desktop and pushes the Export key. This attacker may consequently gain access to all chat conversation and media files.

CVSS3: 2.4
EPSS: Низкий
debian логотип

CVE-2020-25824

больше 5 лет назад

Telegram Desktop through 2.4.3 does not require passcode entry upon pu ...

CVSS3: 2.4
EPSS: Низкий
github логотип

GHSA-hq26-6p72-9jg4

больше 3 лет назад

Telegram Desktop through 2.4.3 does not require passcode entry upon pushing the Export key within the Export Telegram Data wizard. The threat model is a victim who has voluntarily opened Export Wizard but is then distracted. An attacker then approaches the unattended desktop and pushes the Export key. This attacker may consequently gain access to all chat conversation and media files.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2020-25824

Telegram Desktop through 2.4.3 does not require passcode entry upon pushing the Export key within the Export Telegram Data wizard. The threat model is a victim who has voluntarily opened Export Wizard but is then distracted. An attacker then approaches the unattended desktop and pushes the Export key. This attacker may consequently gain access to all chat conversation and media files.

CVSS3: 2.4
0%
Низкий
больше 5 лет назад
debian логотип
CVE-2020-25824

Telegram Desktop through 2.4.3 does not require passcode entry upon pu ...

CVSS3: 2.4
0%
Низкий
больше 5 лет назад
github логотип
GHSA-hq26-6p72-9jg4

Telegram Desktop through 2.4.3 does not require passcode entry upon pushing the Export key within the Export Telegram Data wizard. The threat model is a victim who has voluntarily opened Export Wizard but is then distracted. An attacker then approaches the unattended desktop and pushes the Export key. This attacker may consequently gain access to all chat conversation and media files.

0%
Низкий
больше 3 лет назад

Уязвимостей на страницу