logo
Vulnerability feed
CONTRIBUTE

Vulnerability

warn

CVE-2024-24564

Reference to the description:

https://nvd.nist.gov/vuln/detail/CVE-2024-24564

Description:
Vyper is a pythonic Smart Contract Language for the ethereum virtual machine. When using the built-in `extract32(b, start)`, if the `start` index provided has for side effect to update `b`, the byte array to extract `32` bytes from, it could be that some dirty memory is read and returned by `extract32`. This vulnerability is fixed in 0.4.0.
Last updated date:
01/16/2025
Type:
exploit
Confidence:
HIGH
Date of publishing:
01/16/2025
Reference url to background

https://github.com/vyperlang/vyper/security/advisories/GHSA-4hwq-4cpm-8vmx

Vulnerability FeedContributorsAboutBlog

@inTheWild

©2025

Privacy Policy