### [CVE-2019-10750](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10750) ![](https://img.shields.io/static/v1?label=Product&message=deeply&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Prototype%20Pollution&color=brighgreen) ### Description deeply is vulnerable to Prototype Pollution in versions before 3.1.0. The function assign-deep could be tricked into adding or modifying properties of Object.prototype using using a _proto_ payload. ### POC #### Reference - https://snyk.io/vuln/SNYK-JS-DEEPLY-451026 - https://snyk.io/vuln/SNYK-JS-DEEPLY-451026 #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/ossf-cve-benchmark/CVE-2019-10750