📦 Sentry
by Sentry
🔍 What is Sentry?
Description coming soon...
🛡️ Security Overview
Click on a severity to filter vulnerabilities
⚠️ Known Vulnerabilities
This critical vulnerability in Sentry's SAML SSO implementation allows attackers to take over any user account by exploiting misconfigured multi-organization instances. Self-hosted Sentry deployments ...
This CVE describes an OAuth authorization flaw in Sentry where attackers with malicious OAuth applications can exploit a race condition to maintain persistent access to user accounts. By generating mu...
This vulnerability allows authenticated Sentry users to mute alert rules from organizations and projects they don't belong to or have permissions for. It affects self-hosted Sentry installations betwe...
This CVE describes a cross-site scripting (XSS) vulnerability in Sentry's self-hosted versions where unsanitized HTML payloads from Integration platform integrations can be stored and rendered on the ...
This vulnerability allows authenticated Sentry users to download debug or artifact bundles from any organization or project without proper authorization, even if they are not members. It affects self-...
This vulnerability allows authenticated users in self-hosted Sentry deployments to delete issue alert notifications belonging to other users if they know the alert ID. It affects self-hosted Sentry in...