Show filters
55 Total Results
Displaying 31-40 of 55
Sort by:
Attacker Value
Unknown
CVE-2023-30837
Disclosure Date: May 08, 2023 (last updated October 08, 2023)
Vyper is a pythonic smart contract language for the EVM. The storage allocator does not guard against allocation overflows in versions prior to 0.3.8. An attacker can overwrite the owner variable. This issue was fixed in version 0.3.8.
0
Attacker Value
Unknown
CVE-2023-30629
Disclosure Date: April 24, 2023 (last updated October 08, 2023)
Vyper is a Pythonic Smart Contract Language for the ethereum virtual machine. In versions 0.3.1 through 0.3.7, the Vyper compiler generates the wrong bytecode. Any contract that uses the `raw_call` with `revert_on_failure=False` and `max_outsize=0` receives the wrong response from `raw_call`. Depending on the memory garbage, the result can be either `True` or `False`. A patch is available and, as of time of publication, anticipated to be part of Vyper 0.3.8. As a workaround, one may always put `max_outsize>0`.
0
Attacker Value
Unknown
CVE-2022-37026
Disclosure Date: September 21, 2022 (last updated October 08, 2023)
In Erlang/OTP before 23.3.4.15, 24.x before 24.3.4.2, and 25.x before 25.0.2, there is a Client Authentication Bypass in certain client-certification situations for SSL, TLS, and DTLS.
0
Attacker Value
Unknown
CVE-2022-29255
Disclosure Date: June 09, 2022 (last updated October 07, 2023)
Vyper is a Pythonic Smart Contract Language for the ethereum virtual machine. In versions prior to 0.3.4 when a calling an external contract with no return value, the contract address (including side effects) could be evaluated twice. This may result in incorrect outcomes for contracts. This issue has been addressed in v0.3.4.
0
Attacker Value
Unknown
CVE-2022-24845
Disclosure Date: April 13, 2022 (last updated October 07, 2023)
Vyper is a pythonic Smart Contract Language for the ethereum virtual machine. In affected versions, the return of `<iface>.returns_int128()` is not validated to fall within the bounds of `int128`. This issue can result in a misinterpretation of the integer value and lead to incorrect behavior. As of v0.3.0, `<iface>.returns_int128()` is validated in simple expressions, but not complex expressions. Users are advised to upgrade. There is no known workaround for this issue.
0
Attacker Value
Unknown
CVE-2022-24788
Disclosure Date: April 13, 2022 (last updated October 07, 2023)
Vyper is a pythonic Smart Contract Language for the ethereum virtual machine. Versions of vyper prior to 0.3.2 suffer from a potential buffer overrun. Importing a function from a JSON interface which returns `bytes` generates bytecode which does not clamp bytes length, potentially resulting in a buffer overrun. Users are advised to upgrade. There are no known workarounds for this issue.
0
Attacker Value
Unknown
CVE-2022-24787
Disclosure Date: April 04, 2022 (last updated October 07, 2023)
Vyper is a Pythonic Smart Contract Language for the Ethereum Virtual Machine. In version 0.3.1 and prior, bytestrings can have dirty bytes in them, resulting in the word-for-word comparisons giving incorrect results. Even without dirty nonzero bytes, two bytestrings can compare to equal if one ends with `"\x00"` because there is no comparison of the length. A patch is available and expected to be part of the 0.3.2 release. There are currently no known workarounds.
0
Attacker Value
Unknown
CVE-2021-41121
Disclosure Date: October 06, 2021 (last updated November 28, 2024)
Vyper is a Pythonic Smart Contract Language for the EVM. In affected versions when performing a function call inside a literal struct, there is a memory corruption issue that occurs because of an incorrect pointer to the the top of the stack. This issue has been resolved in version 0.3.0.
0
Attacker Value
Unknown
CVE-2021-41122
Disclosure Date: October 05, 2021 (last updated November 28, 2024)
Vyper is a Pythonic Smart Contract Language for the EVM. In affected versions external functions did not properly validate the bounds of decimal arguments. The can lead to logic errors. This issue has been resolved in version 0.3.0.
0
Attacker Value
Unknown
CVE-2021-29221
Disclosure Date: April 09, 2021 (last updated February 22, 2025)
A local privilege escalation vulnerability was discovered in Erlang/OTP prior to version 23.2.3. By adding files to an existing installation's directory, a local attacker could hijack accounts of other users running Erlang programs or possibly coerce a service running with "erlsrv.exe" to execute arbitrary code as Local System. This can occur only under specific conditions on Windows with unsafe filesystem permissions.
0