{"id":"CVE-2021-41121","details":"Vyper is a Pythonic Smart Contract Language for the EVM. In affected versions when performing a function call inside a literal struct, there is a memory corruption issue that occurs because of an incorrect pointer to the the top of the stack. This issue has been resolved in version 0.3.0.","aliases":["GHSA-xv8x-pr4h-73jv","PYSEC-2021-365"],"modified":"2026-04-12T02:00:39.300537Z","published":"2021-10-06T18:15:10.897Z","related":["GHSA-xv8x-pr4h-73jv"],"references":[{"type":"ADVISORY","url":"https://github.com/vyperlang/vyper/security/advisories/GHSA-xv8x-pr4h-73jv"},{"type":"FIX","url":"https://github.com/vyperlang/vyper/pull/2447"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/vyperlang/vyper","events":[{"introduced":"0"},{"fixed":"8a23febbb2d523f3701f9a7d0aaf361c104a2a37"}],"database_specific":{"extracted_events":[{"introduced":"0"},{"fixed":"0.3.0"}],"cpe":"cpe:2.3:a:vyperlang:vyper:*:*:*:*:*:*:*:*","source":"CPE_FIELD"}}],"versions":["0.2.1","v0.0.4","v0.1.0-beta.1","v0.1.0-beta.10","v0.1.0-beta.11","v0.1.0-beta.12","v0.1.0-beta.13","v0.1.0-beta.14","v0.1.0-beta.15","v0.1.0-beta.16","v0.1.0-beta.17","v0.1.0-beta.2","v0.1.0-beta.3","v0.1.0-beta.5","v0.1.0-beta.6","v0.1.0-beta.7","v0.1.0-beta.8","v0.1.0-beta.9","v0.2.0","v0.2.1","v0.2.10","v0.2.11","v0.2.12","v0.2.13","v0.2.14","v0.2.15","v0.2.16","v0.2.2","v0.2.3","v0.2.4","v0.2.5","v0.2.6","v0.2.7","v0.2.8","v0.2.9"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-41121.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}