U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2022-22984

Change History

Initial Analysis by NIST 12/02/2022 1:59:23 PM

Action Type Old Value New Value
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:snyk:snyk_cli:*:*:*:*:*:*:*:* versions up to (excluding) 1.1064.0
     *cpe:2.3:a:snyk:snyk_cocoapods_cli:*:*:*:*:*:snyk:*:* versions up to (excluding) 2.5.3
     *cpe:2.3:a:snyk:snyk_docker_cli:*:*:*:*:*:snyk:*:* versions up to (excluding) 5.6.5
     *cpe:2.3:a:snyk:snyk_gradle_cli:*:*:*:*:*:snyk:*:* versions up to (excluding) 3.24.5
     *cpe:2.3:a:snyk:snyk_hex_cli:*:*:*:*:*:snyk:*:* versions up to (excluding) 1.1.6
     *cpe:2.3:a:snyk:snyk_maven_cli:*:*:*:*:*:snyk:*:* versions up to (excluding) 2.31.3
     *cpe:2.3:a:snyk:snyk_python_cli:*:*:*:*:*:snyk:*:* versions up to (excluding) 1.24.2
     *cpe:2.3:a:snyk:snyk_sbt_cli:*:*:*:*:*:snyk:*:* versions up to (excluding) 2.16.2
Added CVSS V3.1

								
							
							
						
NIST AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
Added CWE

								
							
							
						
NIST CWE-77
Changed Reference Type
https://github.com/snyk/cli/commit/80d97a93326406e09776156daf72e3caa03ae25a No Types Assigned
https://github.com/snyk/cli/commit/80d97a93326406e09776156daf72e3caa03ae25a Patch, Third Party Advisory
Changed Reference Type
https://github.com/snyk/snyk-cocoapods-plugin/commit/c73e049c5200772babde61c40aab57296bf91381 No Types Assigned
https://github.com/snyk/snyk-cocoapods-plugin/commit/c73e049c5200772babde61c40aab57296bf91381 Patch, Third Party Advisory
Changed Reference Type
https://github.com/snyk/snyk-docker-plugin/commit/d730d7630691a61587b120bb11daaaf4b58a8357 No Types Assigned
https://github.com/snyk/snyk-docker-plugin/commit/d730d7630691a61587b120bb11daaaf4b58a8357 Patch, Third Party Advisory
Changed Reference Type
https://github.com/snyk/snyk-gradle-plugin/commit/bb1c1c72a75e97723a76b14d2d73f70744ed5009 No Types Assigned
https://github.com/snyk/snyk-gradle-plugin/commit/bb1c1c72a75e97723a76b14d2d73f70744ed5009 Patch, Third Party Advisory
Changed Reference Type
https://github.com/snyk/snyk-hex-plugin/commit/e8dd2a330b40d7fc0ab47e34413e80a0146d7ac3 No Types Assigned
https://github.com/snyk/snyk-hex-plugin/commit/e8dd2a330b40d7fc0ab47e34413e80a0146d7ac3 Patch, Third Party Advisory
Changed Reference Type
https://github.com/snyk/snyk-mvn-plugin/commit/02cda9ba1ea36b00ead3f6ec2de0f97397ebec50 No Types Assigned
https://github.com/snyk/snyk-mvn-plugin/commit/02cda9ba1ea36b00ead3f6ec2de0f97397ebec50 Patch, Third Party Advisory
Changed Reference Type
https://github.com/snyk/snyk-python-plugin/commit/8591abdd9236108ac3e30c70c09238d6bb6aabf4 No Types Assigned
https://github.com/snyk/snyk-python-plugin/commit/8591abdd9236108ac3e30c70c09238d6bb6aabf4 Patch, Third Party Advisory
Changed Reference Type
https://github.com/snyk/snyk-sbt-plugin/commit/99c09eb12c9f8f2b237aea9627aab1ae3cab6437 No Types Assigned
https://github.com/snyk/snyk-sbt-plugin/commit/99c09eb12c9f8f2b237aea9627aab1ae3cab6437 Patch, Third Party Advisory
Changed Reference Type
https://security.snyk.io/vuln/SNYK-JS-SNYK-3038622 No Types Assigned
https://security.snyk.io/vuln/SNYK-JS-SNYK-3038622 Exploit, Patch, Vendor Advisory
Changed Reference Type
https://security.snyk.io/vuln/SNYK-JS-SNYKDOCKERPLUGIN-3039679 No Types Assigned
https://security.snyk.io/vuln/SNYK-JS-SNYKDOCKERPLUGIN-3039679 Exploit, Patch, Vendor Advisory
Changed Reference Type
https://security.snyk.io/vuln/SNYK-JS-SNYKGRADLEPLUGIN-3038624 No Types Assigned
https://security.snyk.io/vuln/SNYK-JS-SNYKGRADLEPLUGIN-3038624 Exploit, Patch, Vendor Advisory
Changed Reference Type
https://security.snyk.io/vuln/SNYK-JS-SNYKMVNPLUGIN-3038623 No Types Assigned
https://security.snyk.io/vuln/SNYK-JS-SNYKMVNPLUGIN-3038623 Exploit, Patch, Vendor Advisory
Changed Reference Type
https://security.snyk.io/vuln/SNYK-JS-SNYKPYTHONPLUGIN-3039677 No Types Assigned
https://security.snyk.io/vuln/SNYK-JS-SNYKPYTHONPLUGIN-3039677 Exploit, Patch, Vendor Advisory
Changed Reference Type
https://security.snyk.io/vuln/SNYK-JS-SNYKSBTPLUGIN-3038626 No Types Assigned
https://security.snyk.io/vuln/SNYK-JS-SNYKSBTPLUGIN-3038626 Exploit, Patch, Vendor Advisory
Changed Reference Type
https://security.snyk.io/vuln/SNYK-JS-SNYKSNYKCOCOAPODSPLUGIN-3038625 No Types Assigned
https://security.snyk.io/vuln/SNYK-JS-SNYKSNYKCOCOAPODSPLUGIN-3038625 Exploit, Patch, Vendor Advisory
Changed Reference Type
https://security.snyk.io/vuln/SNYK-JS-SNYKSNYKHEXPLUGIN-3039680 No Types Assigned
https://security.snyk.io/vuln/SNYK-JS-SNYKSNYKHEXPLUGIN-3039680 Exploit, Patch, Vendor Advisory
Changed Reference Type
https://www.imperva.com/blog/how-scanning-your-projects-for-security-issues-can-lead-to-remote-code-execution/ No Types Assigned
https://www.imperva.com/blog/how-scanning-your-projects-for-security-issues-can-lead-to-remote-code-execution/ Exploit, Third Party Advisory