📦 Vyper
by Vyperlang
🔍 What is Vyper?
Description coming soon...
🛡️ Security Overview
Click on a severity to filter vulnerabilities
⚠️ Known Vulnerabilities
This vulnerability in Vyper smart contract language allows out-of-bounds array access when using augmented assignment operators on dynamic arrays. Attackers could potentially write to arbitrary memory...
Vyper smart contract compiler fails to properly validate array index types, allowing signed integers (including negative values) to be used as array indexes. This can lead to unpredictable contract be...
This vulnerability in Vyper smart contract language allows attackers to bypass bounds checks for slice operations when non-literal arguments are used, enabling out-of-bounds memory access and array co...
This vulnerability in Vyper's sqrt() builtin function causes incorrect square root calculations for decimal numbers, potentially returning rounded-up results instead of accurate values. Smart contract...
This vulnerability in Vyper smart contract language allows multiple evaluation of iterator expressions in for loops, enabling side-effect consumption where reads in iterators can interleave with write...
The Vyper compiler fails to check success flags when using EcRecover and Identity precompiles, allowing attackers to deliberately cause these calls to fail while letting execution continue with incorr...
This vulnerability in Vyper smart contract language causes incorrect memory allocation for large arrays, potentially leading to memory corruption. It affects Ethereum smart contracts written in Vyper ...
This vulnerability in Vyper smart contract language allows memory corruption when using specific builtin functions with complex expressions, potentially leading to incorrect contract execution or depl...
This vulnerability in Vyper smart contract language allows attackers to bypass type checking when calling internal functions with default arguments. The bug causes default arguments to be applied inco...
This vulnerability in Vyper smart contract language allows out-of-bounds array access during dynamic array assignments, potentially causing data corruption across call frames. It affects Ethereum smar...
CVE-2023-32058 is an integer overflow vulnerability in Vyper smart contract language where loop iterator variables can overflow their type bounds when assigned from specific loop patterns. This affect...
The Vyper compiler generates incorrect bytecode for contracts using raw_call with revert_on_failure=False and max_outsize=0, causing unpredictable boolean return values. This affects all smart contrac...
CVE-2022-29255 is a vulnerability in Vyper smart contract language where external contract calls without return values could cause the contract address to be evaluated twice, potentially leading to in...
This vulnerability in Vyper smart contract language allows integer overflow/underflow when using <iface>.returns_int128() in complex expressions, leading to incorrect integer interpretation and potent...
CVE-2022-24788 is a buffer overrun vulnerability in Vyper smart contract language where importing functions from JSON interfaces that return bytes generates insecure bytecode without proper length val...
CVE-2021-41121 is a memory corruption vulnerability in Vyper smart contract language that occurs when performing function calls inside literal structs. This allows attackers to potentially execute arb...