Register Login
  • SaaS Solutions
    • Vulnerability Intelligence
    • Vulnerability Management
  • Pricing
  • Vulnerabilities
  • Reports
  • Blog
  • Contact Us
  1. Main
  2. Vulnerability Database
  3. Slack Technologies, Inc.
  4. Slack for Mac
  5. 4.0.3

Known Vulnerabilities in Slack for Mac 4.0.3

Show more ↓
4.42.115
4.41.105
4.41.104
4.41.98
4.41.97
4.41.96
4.40.133
4.40.128
4.40.126
4.40.120
4.39.95
4.39.90
4.39.88
4.38.125
4.38.121
4.38.115
4.37.101
4.37.94
4.36.140
4.36.138
4.36.136
4.36.134
4.35.132
4.35.131
4.35.130
4.35.126
4.35.121
4.34.121
4.34.119
4.34.115
4.33.90
4.33.84
4.33.73
4.32.127
4.32.126
4.32.122
4.31.156
4.31.155
4.31.152
4.31.150
4.29.149
4.29.144
4.28.184
4.28.182
4.28.171
4.27.154
4.26.1
4.26.0
4.25.0
4.24.1
4.23.0
4.22.0
4.21.1
4.21.0
4.20.0
4.19.0
4.18.0
4.17.0
4.16.2
4.16.0
4.15.0
4.14.0
4.13.0
4.12.2
4.12.1
4.12.0
4.11.3
4.11.2
4.11.1
4.11.0
4.10.3
4.10.2
4.10.0
4.9.0
4.8.0
4.7.0
4.6.0
4.5.1
4.5.0
4.4.2
4.4.1
4.4.0
4.3.3
4.2.0
4.1.2
4.1.0
4.0.3
4.0.2
4.0.1
4.0.0
3.4.2
3.4.0
3.3.8
3.3.7
3.3.3
3.3.1
3.2.0
3.1.1
3.1.0
3.0.5
3.0.2
3.0.0
2.9.0
2.8.2
2.8.1
2.8.0
2.7.1
2.7.0
2.6.3



Remote code execution in Slack desktop application01 Sep, 2020
High Patched


Stay Connected

  • Twitter
  • Facebook
  • Linkedin
  • Official YouTube channel of Cybersecurity Help s.r.o.
  • RSS
Security Services
  • Actionable & Personalized Vulnerability Intelligence
  • On-Demand Security Consulting
  • Pricing
IT-Consulting
  • IT Infrastructure Outsourcing Services
  • Web Applications Support & Deployment
  • On-Demand Consulting
Partner Links
  • SSL/TLS Security Test by ImmuniWeb
  • Web Server Security Test by ImmuniWeb
Blog
  • Hackers abuse Shellter Elite after software leak, vendor confirms
  • Nippon Steel Solutions hit by cyberattack exploiting zero-day flaw
  • BERT ransomware group expands attacks across Asia and Europe
  • Alleged Silk Typhoon hacker arrested in Italy over US Covid-19 espionage case
  • Researchers caught embedding hidden AI prompts to sway research reviewers
  • Read all articles →
Contacts | Terms of use | Privacy Policy

© 2025 Cybersecurity Help s.r.o.