<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://vulnerability.circl.lu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Mon, 11 May 2026 23:54:40 +0000</lastBuildDate>
    <item>
      <title>b988901a-f918-48bc-8939-1dd08a754d17</title>
      <link>https://vulnerability.circl.lu/sighting/b988901a-f918-48bc-8939-1dd08a754d17/export</link>
      <description>{"uuid": "b988901a-f918-48bc-8939-1dd08a754d17", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-43366", "type": "seen", "source": "https://t.me/cvedetector/3291", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-43366 - Zkvyper Vyper Compiler Turing-Incompleteness Loop Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-43366 \nPublished : Aug. 15, 2024, 9:15 p.m. | 36\u00a0minutes ago \nDescription : zkvyper is a Vyper compiler. Starting in version 1.3.12 and prior to version 1.5.3, since LLL IR has no Turing-incompletness restrictions, it is compiled to a loop with a much more late exit condition. It leads to a loss of funds or other unwanted behavior if the loop body contains it. However, more real-life use cases like iterating over an array are not affected. No contracts were affected by this issue, which was fixed in version 1.5.3. Upgrading and redeploying affected contracts is the only way to avoid the vulnerability. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-16T00:20:23.000000Z"}</description>
      <content:encoded>{"uuid": "b988901a-f918-48bc-8939-1dd08a754d17", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-43366", "type": "seen", "source": "https://t.me/cvedetector/3291", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-43366 - Zkvyper Vyper Compiler Turing-Incompleteness Loop Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-43366 \nPublished : Aug. 15, 2024, 9:15 p.m. | 36\u00a0minutes ago \nDescription : zkvyper is a Vyper compiler. Starting in version 1.3.12 and prior to version 1.5.3, since LLL IR has no Turing-incompletness restrictions, it is compiled to a loop with a much more late exit condition. It leads to a loss of funds or other unwanted behavior if the loop body contains it. However, more real-life use cases like iterating over an array are not affected. No contracts were affected by this issue, which was fixed in version 1.5.3. Upgrading and redeploying affected contracts is the only way to avoid the vulnerability. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-16T00:20:23.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://vulnerability.circl.lu/sighting/b988901a-f918-48bc-8939-1dd08a754d17/export</guid>
      <pubDate>Fri, 16 Aug 2024 00:20:23 +0000</pubDate>
    </item>
  </channel>
</rss>
