NotebookCHECK - Notebook Forum

English => News => Topic started by: Redaktion on April 15, 2024, 12:16:54

Title: Security vulnerability in Telegram Messenger's Windows application allowed code execution after clicking on video
Post by: Redaktion on April 15, 2024, 12:16:54
A simple spelling error in the source code of the Telegram Messenger Windows application let attackers bypass a security warning. This enabled the automatic execution of Python scripts after clicking on a link disguised as a video.

https://www.notebookcheck.net/Security-vulnerability-in-Telegram-Messenger-s-Windows-application-allowed-code-execution-after-clicking-on-video.827602.0.html
Title: Re: Security vulnerability in Telegram Messenger's Windows application allowed code execution after
Post by: indy on April 15, 2024, 16:44:32
I either encountered mentally handicapped people, scammers, or porn on Telegram, and thankfully none of that interests me anymore...so I wrote the service off. Sorry to the one distant friend who swears by it. Not worth keeping on my phone...