Safety vulnerability ID: 65700
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Vyper is a pythonic Smart Contract Language for the ethereum virtual machine. If an excessively large value is specified as the starting index for an array in `_abi_decode`, it can cause the read position to overflow. This results in the decoding of values outside the intended array bounds, potentially leading to exploitations in contracts that use arrays within `_abi_decode`. This vulnerability affects 0.3.10 and earlier versions. See CVE-2024-26149.
Latest version: 0.4.0
Vyper: the Pythonic Programming Language for the EVM
Vyper is a pythonic Smart Contract Language for the ethereum virtual machine. If an excessively large value is specified as the starting index for an array in `_abi_decode`, it can cause the read position to overflow. This results in the decoding of values outside the intended array bounds, potentially leading to exploitations in contracts that use arrays within `_abi_decode`. This vulnerability affects 0.3.10 and earlier versions. See CVE-2024-26149.
MISC:https://github.com/vyperlang/vyper/security/advisories/GHSA-9p8r-4xp4-gw5w: https://github.com/vyperlang/vyper/security/advisories/GHSA-9p8r-4xp4-gw5w
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application