📦 Vyper

by Vyperlang

🔍 What is Vyper?

Description coming soon...

🛡️ Security Overview

Click on a severity to filter vulnerabilities

⚠️ Known Vulnerabilities

CVE-2025-27105

CRITICAL CVSS 9.1 Feb 21, 2025

This vulnerability in Vyper smart contract language allows out-of-bounds array access when using augmented assignment operators on dynamic arrays. Attackers could potentially write to arbitrary memory...

CVE-2024-24563

CRITICAL CVSS 9.8 Feb 7, 2024

Vyper smart contract compiler fails to properly validate array index types, allowing signed integers (including negative values) to be used as array indexes. This can lead to unpredictable contract be...

CVE-2024-24561

CRITICAL CVSS 9.8 Feb 1, 2024

This vulnerability in Vyper smart contract language allows attackers to bypass bounds checks for slice operations when non-literal arguments are used, enabling out-of-bounds memory access and array co...

CVE-2025-26622

HIGH CVSS 7.5 Feb 21, 2025

This vulnerability in Vyper's sqrt() builtin function causes incorrect square root calculations for decimal numbers, potentially returning rounded-up results instead of accurate values. Smart contract...

CVE-2025-27104

HIGH CVSS 7.5 Feb 21, 2025

This vulnerability in Vyper smart contract language allows multiple evaluation of iterator expressions in for loops, enabling side-effect consumption where reads in iterators can interleave with write...

CVE-2025-21607

HIGH CVSS 7.5 Jan 14, 2025

The Vyper compiler fails to check success flags when using EcRecover and Identity precompiles, allowing attackers to deliberately cause these calls to fail while letting execution continue with incorr...

CVE-2023-46247

HIGH CVSS 7.5 Dec 13, 2023

This vulnerability in Vyper smart contract language causes incorrect memory allocation for large arrays, potentially leading to memory corruption. It affects Ethereum smart contracts written in Vyper ...

CVE-2023-42443

HIGH CVSS 8.1 Sep 18, 2023

This vulnerability in Vyper smart contract language allows memory corruption when using specific builtin functions with complex expressions, potentially leading to incorrect contract execution or depl...

CVE-2023-32059

HIGH CVSS 7.5 May 11, 2023

This vulnerability in Vyper smart contract language allows attackers to bypass type checking when calling internal functions with default arguments. The bug causes default arguments to be applied inco...

CVE-2023-31146

HIGH CVSS 7.5 May 11, 2023

This vulnerability in Vyper smart contract language allows out-of-bounds array access during dynamic array assignments, potentially causing data corruption across call frames. It affects Ethereum smar...

CVE-2023-32058

HIGH CVSS 7.5 May 11, 2023

CVE-2023-32058 is an integer overflow vulnerability in Vyper smart contract language where loop iterator variables can overflow their type bounds when assigned from specific loop patterns. This affect...

CVE-2023-30629

HIGH CVSS 7.5 Apr 24, 2023

The Vyper compiler generates incorrect bytecode for contracts using raw_call with revert_on_failure=False and max_outsize=0, causing unpredictable boolean return values. This affects all smart contrac...

CVE-2022-29255

HIGH CVSS 8.2 Jun 9, 2022

CVE-2022-29255 is a vulnerability in Vyper smart contract language where external contract calls without return values could cause the contract address to be evaluated twice, potentially leading to in...

CVE-2022-24845

HIGH CVSS 8.8 Apr 13, 2022

This vulnerability in Vyper smart contract language allows integer overflow/underflow when using <iface>.returns_int128() in complex expressions, leading to incorrect integer interpretation and potent...

CVE-2022-24788

HIGH CVSS 7.1 Apr 13, 2022

CVE-2022-24788 is a buffer overrun vulnerability in Vyper smart contract language where importing functions from JSON interfaces that return bytes generates insecure bytecode without proper length val...

CVE-2021-41121

HIGH CVSS 7.5 Oct 6, 2021

CVE-2021-41121 is a memory corruption vulnerability in Vyper smart contract language that occurs when performing function calls inside literal structs. This allows attackers to potentially execute arb...