Search for vulnerabilities
Vulnerability details: VCID-2ehx-y5dx-fkbf
Vulnerability ID VCID-2ehx-y5dx-fkbf
Aliases CVE-2022-46705
Summary webkitgtk: Visiting a malicious website may lead to address bar spoofing
Status Published
Exploitability 0.5
Weighted Severity 3.9
Risk 1.9
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
cvssv3 4.3 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46705.json
epss 0.00106 https://api.first.org/data/v1/epss?cve=CVE-2022-46705
epss 0.00106 https://api.first.org/data/v1/epss?cve=CVE-2022-46705
epss 0.00106 https://api.first.org/data/v1/epss?cve=CVE-2022-46705
epss 0.00106 https://api.first.org/data/v1/epss?cve=CVE-2022-46705
epss 0.00106 https://api.first.org/data/v1/epss?cve=CVE-2022-46705
epss 0.00106 https://api.first.org/data/v1/epss?cve=CVE-2022-46705
epss 0.00106 https://api.first.org/data/v1/epss?cve=CVE-2022-46705
epss 0.00106 https://api.first.org/data/v1/epss?cve=CVE-2022-46705
epss 0.00106 https://api.first.org/data/v1/epss?cve=CVE-2022-46705
epss 0.00106 https://api.first.org/data/v1/epss?cve=CVE-2022-46705
epss 0.00106 https://api.first.org/data/v1/epss?cve=CVE-2022-46705
epss 0.00106 https://api.first.org/data/v1/epss?cve=CVE-2022-46705
epss 0.00106 https://api.first.org/data/v1/epss?cve=CVE-2022-46705
epss 0.00106 https://api.first.org/data/v1/epss?cve=CVE-2022-46705
epss 0.00106 https://api.first.org/data/v1/epss?cve=CVE-2022-46705
epss 0.00173 https://api.first.org/data/v1/epss?cve=CVE-2022-46705
epss 0.00173 https://api.first.org/data/v1/epss?cve=CVE-2022-46705
epss 0.00173 https://api.first.org/data/v1/epss?cve=CVE-2022-46705
epss 0.00173 https://api.first.org/data/v1/epss?cve=CVE-2022-46705
cvssv3.1 4.3 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3.1 4.3 https://nvd.nist.gov/vuln/detail/CVE-2022-46705
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46705.json
https://api.first.org/data/v1/epss?cve=CVE-2022-46705
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32919
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42826
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46705
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46725
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23517
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23518
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
https://support.apple.com/kb/HT213676
2271444 https://bugzilla.redhat.com/show_bug.cgi?id=2271444
cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*
CVE-2022-46705 https://nvd.nist.gov/vuln/detail/CVE-2022-46705
RHSA-2023:6535 https://access.redhat.com/errata/RHSA-2023:6535
RHSA-2023:7055 https://access.redhat.com/errata/RHSA-2023:7055
RHSA-2025:10364 https://access.redhat.com/errata/RHSA-2025:10364
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46705.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2022-46705
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.29531
EPSS Score 0.00106
Published At Aug. 3, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2025-07-31T10:01:13.161110+00:00 RedHat Importer Import https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46705.json 37.0.0