{"api_version":"1","generated_at":"2026-04-23T15:10:18+00:00","cve":"CVE-2021-41122","urls":{"html":"https://cve.report/CVE-2021-41122","api":"https://cve.report/api/cve/CVE-2021-41122.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2021-41122","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2021-41122"},"summary":{"title":"CVE-2021-41122","description":"Vyper is a Pythonic Smart Contract Language for the EVM. In affected versions external functions did not properly validate the bounds of decimal arguments. The can lead to logic errors. This issue has been resolved in version 0.3.0.","state":"PUBLIC","assigner":"security-advisories@github.com","published_at":"2021-10-05 23:15:00","updated_at":"2023-08-02 16:22:00"},"problem_types":["CWE-682"],"metrics":[],"references":[{"url":"https://github.com/vyperlang/vyper/pull/2447","name":"https://github.com/vyperlang/vyper/pull/2447","refsource":"MISC","tags":[],"title":"rewrite internal calling convention by charles-cooper · Pull Request #2447 · vyperlang/vyper · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/vyperlang/vyper/security/advisories/GHSA-c7pr-343r-5c46","name":"https://github.com/vyperlang/vyper/security/advisories/GHSA-c7pr-343r-5c46","refsource":"CONFIRM","tags":[],"title":"missing clamps for decimal args in external functions · Advisory · vyperlang/vyper · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2021-41122","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-41122","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2021","cve_id":"41122","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"vyperlang","cpe5":"vyper","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"41122","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"vyper_project","cpe5":"vyper","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2021-41122","qid":"980492","title":"Python (pip) Security Update for vyper (GHSA-c7pr-343r-5c46)"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"security-advisories@github.com","ID":"CVE-2021-41122","STATE":"PUBLIC","TITLE":"Bounds check missing for decimal args in Vyper"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"vyper","version":{"version_data":[{"version_value":"< 0.3.0"}]}}]},"vendor_name":"vyperlang"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Vyper is a Pythonic Smart Contract Language for the EVM. In affected versions external functions did not properly validate the bounds of decimal arguments. The can lead to logic errors. This issue has been resolved in version 0.3.0."}]},"impact":{"cvss":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":4.3,"baseSeverity":"MEDIUM","confidentialityImpact":"NONE","integrityImpact":"LOW","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-682: Incorrect Calculation"}]}]},"references":{"reference_data":[{"name":"https://github.com/vyperlang/vyper/security/advisories/GHSA-c7pr-343r-5c46","refsource":"CONFIRM","url":"https://github.com/vyperlang/vyper/security/advisories/GHSA-c7pr-343r-5c46"},{"name":"https://github.com/vyperlang/vyper/pull/2447","refsource":"MISC","url":"https://github.com/vyperlang/vyper/pull/2447"}]},"source":{"advisory":"GHSA-c7pr-343r-5c46","discovery":"UNKNOWN"}},"nvd":{"publishedDate":"2021-10-05 23:15:00","lastModifiedDate":"2023-08-02 16:22:00","problem_types":["CWE-682"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE","baseScore":4.3,"baseSeverity":"MEDIUM"},"exploitabilityScore":2.8,"impactScore":1.4},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:N/I:P/A:N","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE","baseScore":4},"severity":"MEDIUM","exploitabilityScore":8,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:vyperlang:vyper:*:*:*:*:*:*:*:*","versionEndExcluding":"0.3.0","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2021","CveId":"41122","Ordinal":"216940","Title":"CVE-2021-41122","CVE":"CVE-2021-41122","Year":"2021"},"notes":[{"CveYear":"2021","CveId":"41122","Ordinal":"1","NoteData":"Vyper is a Pythonic Smart Contract Language for the EVM. In affected versions external functions did not properly validate the bounds of decimal arguments. The can lead to logic errors. This issue has been resolved in version 0.3.0.","Type":"Description","Title":null},{"CveYear":"2021","CveId":"41122","Ordinal":"2","NoteData":"2021-10-05","Type":"Other","Title":"Published"},{"CveYear":"2021","CveId":"41122","Ordinal":"3","NoteData":"2021-10-05","Type":"Other","Title":"Modified"}]}}}