Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 30 Jan 2026 01:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:telegram:telegram_desktop:2.9.2:*:*:*:*:*:*:* |
Fri, 16 Jan 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 16 Jan 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Telegram
Telegram telegram Telegram telegram Desktop Telegram Desktop Telegram Desktop telegram Desktop |
|
| Vendors & Products |
Telegram
Telegram telegram Telegram telegram Desktop Telegram Desktop Telegram Desktop telegram Desktop |
Thu, 15 Jan 2026 23:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Telegram Desktop 2.9.2 contains a denial of service vulnerability that allows attackers to crash the application by sending an oversized message payload. Attackers can generate a 9 million byte buffer and paste it into the messaging interface to trigger an application crash. | |
| Title | Telegram Desktop 2.9.2 - Denial of Service (PoC) | |
| Weaknesses | CWE-770 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-03-05T01:28:35.818Z
Reserved: 2026-01-14T14:39:44.738Z
Link: CVE-2021-47793
Updated: 2026-01-16T15:52:45.929Z
Status : Analyzed
Published: 2026-01-16T00:16:23.207
Modified: 2026-01-30T00:56:05.853
Link: CVE-2021-47793
No data.
OpenCVE Enrichment
Updated: 2026-01-16T13:42:31Z