Sentry Vulnerabilities