Telegram Desktop through 2.1.13 allows a spoofed file type to bypass the Dangerous File Type Execution protection mechanism, as demonstrated by use of the chat window with a filename that lacks an extension.
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-17448.json"