Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
sentry sentry vulnerabilities and exploits
(subscribe to this query)
3.7
CVSSv3
CVE-2022-23485
Sentry is an error tracking and performance monitoring platform. In versions of the sentry python library before 22.11.0 an attacker with a known valid invite link could manipulate a cookie to allow the same invite link to be reused on multiple accounts when joining an organizati...
Sentry Sentry
6.5
CVSSv3
CVE-2023-36826
Sentry is an error tracking and performance monitoring platform. Starting in version 8.21.0 and prior to version 23.5.2, an authenticated user can download a debug or artifact bundle from arbitrary organizations and projects with a known bundle ID. The user does not need to be a ...
Sentry Sentry
5.3
CVSSv3
CVE-2024-24829
Sentry is an error tracking and performance monitoring platform. Sentry’s integration platform provides a way for external services to interact with Sentry. One of such integrations, the Phabricator integration (maintained by Sentry) with version <=24.1.1 contains a cons...
Sentry Sentry
6.8
CVSSv3
CVE-2023-39531
Sentry is an error tracking and performance monitoring platform. Starting in version 10.0.0 and prior to version 23.7.2, an attacker with sufficient client-side exploits could retrieve a valid access token for another user during the OAuth token exchange due to incorrect credenti...
Sentry Sentry
8.1
CVSSv3
CVE-2023-39349
Sentry is an error tracking and performance monitoring platform. Starting in version 22.1.0 and prior to version 23.7.2, an attacker with access to a token with few or no scopes can query `/api/0/api-tokens/` for a list of all tokens created by a user, including tokens with great...
Sentry Sentry
NA
CVE-2008-1321
The FxIAList service in ASG-Sentry Network Manager 7.0.0 and previous versions does require authentication, which allows remote malicious users to cause a denial of service (service termination) via the exit command to TCP port 6162, or have other impacts via other commands.