Vyperlang Security Vulnerabilities (CVEs)
Track 16 security vulnerabilities affecting Vyperlang products and software. Get instant email alerts when new CVEs are discovered, automated security monitoring, and patch guidance.
This vulnerability in Vyper's sqrt() builtin function causes incorrect square root calculations for decimal numbers, potentially returning rounded-up ...
Feb 21, 2025This vulnerability in Vyper smart contract language allows multiple evaluation of iterator expressions in for loops, enabling side-effect consumption ...
Feb 21, 2025This vulnerability in Vyper smart contract language allows out-of-bounds array access when using augmented assignment operators on dynamic arrays. Att...
Feb 21, 2025The Vyper compiler fails to check success flags when using EcRecover and Identity precompiles, allowing attackers to deliberately cause these calls to...
Jan 14, 2025Vyper smart contract compiler fails to properly validate array index types, allowing signed integers (including negative values) to be used as array i...
Feb 7, 2024This vulnerability in Vyper smart contract language allows attackers to bypass bounds checks for slice operations when non-literal arguments are used,...
Feb 1, 2024This vulnerability in Vyper smart contract language causes incorrect memory allocation for large arrays, potentially leading to memory corruption. It ...
Dec 13, 2023This vulnerability in Vyper smart contract language allows memory corruption when using specific builtin functions with complex expressions, potential...
Sep 18, 2023This vulnerability in Vyper smart contract language allows attackers to bypass type checking when calling internal functions with default arguments. T...
May 11, 2023This vulnerability in Vyper smart contract language allows out-of-bounds array access during dynamic array assignments, potentially causing data corru...
May 11, 2023CVE-2023-32058 is an integer overflow vulnerability in Vyper smart contract language where loop iterator variables can overflow their type bounds when...
May 11, 2023The Vyper compiler generates incorrect bytecode for contracts using raw_call with revert_on_failure=False and max_outsize=0, causing unpredictable boo...
Apr 24, 2023CVE-2022-29255 is a vulnerability in Vyper smart contract language where external contract calls without return values could cause the contract addres...
Jun 9, 2022This vulnerability in Vyper smart contract language allows integer overflow/underflow when using <iface>.returns_int128() in complex expressions, lead...
Apr 13, 2022CVE-2022-24788 is a buffer overrun vulnerability in Vyper smart contract language where importing functions from JSON interfaces that return bytes gen...
Apr 13, 2022CVE-2021-41121 is a memory corruption vulnerability in Vyper smart contract language that occurs when performing function calls inside literal structs...
Oct 6, 2021Why Monitor Vyperlang Security Vulnerabilities?
Real-time CVE tracking: Our automated system monitors 16+ known vulnerabilities affecting Vyperlang products and software packages. Stay ahead of emerging threats with instant email notifications when new security issues are discovered.
Automated security monitoring: Unlike manual CVE checking, FixTheCVE automatically scans your servers and detects vulnerable Vyperlang packages in under 60 seconds. No agents required - completely agentless scanning that works across Vyperlang deployments.
Free vulnerability database: Access detailed information about every Vyperlang CVE including CVSS scores, severity ratings, affected versions, and actionable patch guidance. Filter by critical, high, medium, or low severity to prioritize your security remediation efforts.
🚀 Get Started in 60 Seconds
- Register free account & add your servers
- Run one-time scan or schedule automatic monitoring (every 1-24 hours)
- Receive instant alerts when new Vyperlang CVEs affect your systems
- Access dashboard with severity breakdown & fix instructions