{"id":"CVE-2020-7608","details":"yargs-parser could be tricked into adding or modifying properties of Object.prototype using a \"__proto__\" payload.","aliases":["GHSA-p9pc-299p-vxgp","SNYK-JS-YARGSPARSER-560381"],"modified":"2026-03-10T23:29:56.937645060Z","published":"2020-03-16T20:15:12.860Z","related":["ALSA-2021:0548","MGASA-2021-0170"],"references":[{"type":"WEB"},{"type":"FIX","url":"https://snyk.io/vuln/SNYK-JS-YARGSPARSER-560381"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/yargs/yargs-parser","events":[{"introduced":"0"},{"fixed":"eab6c039888bd5d51f33dda7a98808564acfa938"},{"introduced":"212814fe5219d0033abffac90aecc908f2f399ec"},{"fixed":"b96b989680be8259ed530876c1e6cb69608e19ef"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"5.0.1"},{"introduced":"16.0.0"},{"fixed":"18.1.1"}]}}],"versions":["v16.0.0","v16.1.0","v17.0.0","v17.0.1","v17.1.0","v18.0.0","v18.1.0"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"6.0.0"},{"fixed":"13.1.2"}]},{"events":[{"introduced":"14.0.0"},{"fixed":"15.0.1"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-7608.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"}]}