### [CVE-2019-10745](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10745) ![](https://img.shields.io/static/v1?label=Product&message=assign-deep&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Prototype%20Pollution&color=brighgreen) ### Description assign-deep is vulnerable to Prototype Pollution in versions before 0.4.8 and version 1.0.0. The function assign-deep could be tricked into adding or modifying properties of Object.prototype using either a constructor or a _proto_ payload. ### POC #### Reference - https://snyk.io/vuln/SNYK-JS-ASSIGNDEEP-450211 - https://snyk.io/vuln/SNYK-JS-ASSIGNDEEP-450211 #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/ossf-cve-benchmark/CVE-2019-10745