{"id":"CVE-2020-7608","details":"yargs-parser could be tricked into adding or modifying properties of Object.prototype using a \"__proto__\" payload.","aliases":["GHSA-p9pc-299p-vxgp","SNYK-JS-YARGSPARSER-560381"],"modified":"2026-05-15T12:03:23.790805410Z","published":"2020-03-16T20:15:12.860Z","related":["ALSA-2021:0548"],"database_specific":{"unresolved_ranges":[{"source":"CPE_FIELD","vendor_product":"yargs:yargs-parser","cpes":["cpe:2.3:a:yargs:yargs-parser:*:*:*:*:*:node.js:*:*"],"extracted_events":[{"introduced":"6.0.0"},{"fixed":"13.1.2"},{"introduced":"14.0.0"},{"fixed":"15.0.1"}]}]},"references":[{"type":"FIX","url":"https://snyk.io/vuln/SNYK-JS-YARGSPARSER-560381"}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"}]}