Sentry python library prior to 22.11.0 allows reuse of invite link, leading to unauthorized organization acces
Reporter | Title | Published | Views | Family All 12 |
---|---|---|---|---|
![]() | PYSEC-2022-43011 | 10 Dec 202201:15 | – | osv |
![]() | UBUNTU-CVE-2022-23485 | 10 Dec 202201:15 | – | osv |
![]() | GHSA-JV85-MQXJ-3F9J Sentry vulnerable to invite code reuse via cookie manipulation | 12 Dec 202221:27 | – | osv |
![]() | CVE-2022-23485 | 10 Dec 202201:15 | – | osv |
![]() | Design/Logic Flaw | 10 Dec 202201:15 | – | prion |
![]() | CVE-2022-23485 | 10 Dec 202201:15 | – | nvd |
![]() | Improper Access Control | 13 Dec 202208:37 | – | veracode |
![]() | CVE-2022-23485 | 22 May 202522:00 | – | redhatcve |
![]() | CVE-2022-23485 Invite code reuse via cookie manipulation in sentry | 10 Dec 202200:40 | – | vulnrichment |
![]() | Sentry vulnerable to invite code reuse via cookie manipulation | 12 Dec 202221:27 | – | github |
[
{
"vendor": "getsentry",
"product": "sentry",
"versions": [
{
"version": ">= 20.6.0, < 22.11.0",
"status": "affected"
}
]
}
]
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo