CVE-2026-27197
- EPSS 0.05%
- Veröffentlicht 21.02.2026 04:35:14
- Zuletzt bearbeitet 23.02.2026 20:45:01
Sentry is a developer-first error tracking and performance monitoring tool. Versions 21.12.0 through 26.1.0 have a critical vulnerability in its SAML SSO implementation which allows an attacker to take over any user account by using a malicious SAML...
CVE-2025-53099
- EPSS 0.09%
- Veröffentlicht 01.07.2025 14:53:16
- Zuletzt bearbeitet 15.09.2025 18:03:33
Sentry is a developer-first error tracking and performance monitoring tool. Prior to version 25.5.0, an attacker with a malicious OAuth application registered with Sentry can take advantage of a race condition and improper handling of authorization c...
CVE-2025-53073
- EPSS 0.03%
- Veröffentlicht 24.06.2025 00:00:00
- Zuletzt bearbeitet 26.06.2025 18:58:14
In Sentry 25.1.0 through 25.5.1, an authenticated attacker can access a project's issue endpoint and perform unauthorized actions (such as adding a comment) without being a member of the project's team. A seven-digit issue ID must be known (it is not...
CVE-2024-53253
- EPSS 0.21%
- Veröffentlicht 22.11.2024 20:15:09
- Zuletzt bearbeitet 15.09.2025 18:03:56
Sentry is an error tracking and performance monitoring platform. Version 24.11.0, and only version 24.11.0, is vulnerable to a scenario where a specific error message generated by the Sentry platform could include a plaintext Client ID and Client Sec...
CVE-2024-45605
- EPSS 0.41%
- Veröffentlicht 17.09.2024 20:15:05
- Zuletzt bearbeitet 26.09.2024 19:14:00
Sentry is a developer-first error tracking and performance monitoring platform. An authenticated user delete the user issue alert notifications for arbitrary users given a know alert ID. A patch was issued to ensure authorization checks are properly ...
CVE-2024-45606
- EPSS 0.34%
- Veröffentlicht 17.09.2024 20:15:05
- Zuletzt bearbeitet 26.09.2024 19:16:40
Sentry is a developer-first error tracking and performance monitoring platform. An authenticated user can mute alert rules from arbitrary organizations and projects with a know rule ID. The user does not need to be a member of the organization or hav...
CVE-2024-41656
- EPSS 3.13%
- Veröffentlicht 23.07.2024 22:15:08
- Zuletzt bearbeitet 15.09.2025 18:04:19
Sentry is an error tracking and performance monitoring platform. Starting in version 10.0.0 and prior to version 24.7.1, an unsanitized payload sent by an Integration platform integration allows storing arbitrary HTML tags on the Sentry side with the...
CVE-2024-32474
- EPSS 0.73%
- Veröffentlicht 18.04.2024 20:15:17
- Zuletzt bearbeitet 15.09.2025 16:53:23
Sentry is an error tracking and performance monitoring platform. Prior to 24.4.1, when authenticating as a superuser to Sentry with a username and password, the password is leaked as cleartext in logs under the _event_: `auth-index.validate_superuser...
CVE-2024-24829
- EPSS 0.1%
- Veröffentlicht 09.02.2024 00:15:09
- Zuletzt bearbeitet 21.11.2024 08:59:48
Sentry is an error tracking and performance monitoring platform. Sentry’s integration platform provides a way for external services to interact with Sentry. One of such integrations, the Phabricator integration (maintained by Sentry) with version <=2...
CVE-2023-39531
- EPSS 0.12%
- Veröffentlicht 09.08.2023 17:15:09
- Zuletzt bearbeitet 21.11.2024 08:15:36
Sentry is an error tracking and performance monitoring platform. Starting in version 10.0.0 and prior to version 23.7.2, an attacker with sufficient client-side exploits could retrieve a valid access token for another user during the OAuth token exch...