{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T02:42:41.404","vulnerabilities":[{"cve":{"id":"CVE-2020-1899","sourceIdentifier":"cve-assign@fb.com","published":"2021-03-11T01:15:14.333","lastModified":"2024-11-21T05:11:34.420","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The unserialize() function supported a type code, \"S\", which was meant to be supported only for APC serialization. This type code allowed arbitrary memory addresses to be accessed as if they were static StringData objects. This issue affected HHVM prior to v4.32.3, between versions 4.33.0 and 4.56.0, 4.57.0, 4.58.0, 4.58.1, 4.59.0, 4.60.0, 4.61.0, 4.62.0."},{"lang":"es","value":"La función unserialize() admitía un código de tipo, \"S\", que estaba destinado a ser admitido solo para la serialización APC.&#xa0;Este código de tipo permitía acceder a direcciones de memoria arbitrarias como si fueran objetos StringData estáticos.&#xa0;Este problema afectó a HHVM versiones anteriores a v4.32.3, entre las versiones 4.33.0 y 4.56.0, 4.57.0, 4.58.0, 4.58.1, 4.59.0, 4.60.0, 4.61.0, 4.62.0"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"cve-assign@fb.com","type":"Secondary","description":[{"lang":"en","value":"CWE-822"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-119"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*","versionEndExcluding":"4.32.3","matchCriteriaId":"D2372F3F-5757-4097-BA67-61D7597F6D65"},{"vulnerable":true,"criteria":"cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*","versionStartIncluding":"4.33.0","versionEndExcluding":"4.56.1","matchCriteriaId":"E83916FC-54F0-4A1B-99AD-0B81774170EE"},{"vulnerable":true,"criteria":"cpe:2.3:a:facebook:hhvm:4.57.0:*:*:*:*:*:*:*","matchCriteriaId":"4F80C7A6-7FD9-4EAB-8533-F5C8ABF9F258"},{"vulnerable":true,"criteria":"cpe:2.3:a:facebook:hhvm:4.58.0:*:*:*:*:*:*:*","matchCriteriaId":"2006DF19-68B4-4139-AAAF-7F81B9742DA7"},{"vulnerable":true,"criteria":"cpe:2.3:a:facebook:hhvm:4.58.1:*:*:*:*:*:*:*","matchCriteriaId":"8A9D0CEF-7EC2-421B-A45D-48D9663DB60B"},{"vulnerable":true,"criteria":"cpe:2.3:a:facebook:hhvm:4.59.0:*:*:*:*:*:*:*","matchCriteriaId":"169B4C73-75D5-46FD-BADB-384ABFB9A6C9"},{"vulnerable":true,"criteria":"cpe:2.3:a:facebook:hhvm:4.60.0:*:*:*:*:*:*:*","matchCriteriaId":"A48FC296-D7B6-4B58-A386-9F5F5F6294AF"},{"vulnerable":true,"criteria":"cpe:2.3:a:facebook:hhvm:4.61.0:*:*:*:*:*:*:*","matchCriteriaId":"5F702D76-27C2-4798-BF3C-242906E8E697"},{"vulnerable":true,"criteria":"cpe:2.3:a:facebook:hhvm:4.62.0:*:*:*:*:*:*:*","matchCriteriaId":"AC078675-9A81-4B74-8818-0FFE9AF66296"}]}]}],"references":[{"url":"https://github.com/facebook/hhvm/commit/1107228a5128d3ca1c4add8ac1635d933cbbe2e9","source":"cve-assign@fb.com","tags":["Patch","Third Party Advisory"]},{"url":"https://hhvm.com/blog/2020/06/30/security-update.html","source":"cve-assign@fb.com","tags":["Vendor Advisory"]},{"url":"https://github.com/facebook/hhvm/commit/1107228a5128d3ca1c4add8ac1635d933cbbe2e9","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://hhvm.com/blog/2020/06/30/security-update.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}