Search for vulnerabilities
Vulnerability details: VCID-mrps-nmg1-aaaa
Vulnerability ID VCID-mrps-nmg1-aaaa
Aliases CVE-2022-46705
Summary A spoofing issue existed in the handling of URLs. This issue was addressed with improved input validation. This issue is fixed in iOS 16.2 and iPadOS 16.2, macOS Ventura 13.1, Safari 16.2. Visiting a malicious website may lead to address bar spoofing.
Status Published
Exploitability 0.5
Weighted Severity 3.9
Risk 1.9
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
cvssv3 4.3 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46705.json
epss 0.00173 https://api.first.org/data/v1/epss?cve=CVE-2022-46705
epss 0.00173 https://api.first.org/data/v1/epss?cve=CVE-2022-46705
epss 0.00173 https://api.first.org/data/v1/epss?cve=CVE-2022-46705
epss 0.00173 https://api.first.org/data/v1/epss?cve=CVE-2022-46705
epss 0.00173 https://api.first.org/data/v1/epss?cve=CVE-2022-46705
epss 0.00173 https://api.first.org/data/v1/epss?cve=CVE-2022-46705
epss 0.00173 https://api.first.org/data/v1/epss?cve=CVE-2022-46705
epss 0.00173 https://api.first.org/data/v1/epss?cve=CVE-2022-46705
epss 0.00173 https://api.first.org/data/v1/epss?cve=CVE-2022-46705
epss 0.00173 https://api.first.org/data/v1/epss?cve=CVE-2022-46705
epss 0.00173 https://api.first.org/data/v1/epss?cve=CVE-2022-46705
epss 0.00173 https://api.first.org/data/v1/epss?cve=CVE-2022-46705
epss 0.00173 https://api.first.org/data/v1/epss?cve=CVE-2022-46705
epss 0.00173 https://api.first.org/data/v1/epss?cve=CVE-2022-46705
epss 0.00173 https://api.first.org/data/v1/epss?cve=CVE-2022-46705
epss 0.00173 https://api.first.org/data/v1/epss?cve=CVE-2022-46705
epss 0.00173 https://api.first.org/data/v1/epss?cve=CVE-2022-46705
epss 0.00173 https://api.first.org/data/v1/epss?cve=CVE-2022-46705
epss 0.00173 https://api.first.org/data/v1/epss?cve=CVE-2022-46705
epss 0.00173 https://api.first.org/data/v1/epss?cve=CVE-2022-46705
epss 0.00173 https://api.first.org/data/v1/epss?cve=CVE-2022-46705
epss 0.00173 https://api.first.org/data/v1/epss?cve=CVE-2022-46705
epss 0.00173 https://api.first.org/data/v1/epss?cve=CVE-2022-46705
epss 0.00173 https://api.first.org/data/v1/epss?cve=CVE-2022-46705
epss 0.00173 https://api.first.org/data/v1/epss?cve=CVE-2022-46705
epss 0.00173 https://api.first.org/data/v1/epss?cve=CVE-2022-46705
epss 0.00173 https://api.first.org/data/v1/epss?cve=CVE-2022-46705
epss 0.00173 https://api.first.org/data/v1/epss?cve=CVE-2022-46705
epss 0.00173 https://api.first.org/data/v1/epss?cve=CVE-2022-46705
epss 0.00173 https://api.first.org/data/v1/epss?cve=CVE-2022-46705
epss 0.00173 https://api.first.org/data/v1/epss?cve=CVE-2022-46705
epss 0.00173 https://api.first.org/data/v1/epss?cve=CVE-2022-46705
epss 0.00173 https://api.first.org/data/v1/epss?cve=CVE-2022-46705
epss 0.00173 https://api.first.org/data/v1/epss?cve=CVE-2022-46705
epss 0.00173 https://api.first.org/data/v1/epss?cve=CVE-2022-46705
epss 0.00173 https://api.first.org/data/v1/epss?cve=CVE-2022-46705
epss 0.00173 https://api.first.org/data/v1/epss?cve=CVE-2022-46705
epss 0.00173 https://api.first.org/data/v1/epss?cve=CVE-2022-46705
epss 0.00173 https://api.first.org/data/v1/epss?cve=CVE-2022-46705
epss 0.00173 https://api.first.org/data/v1/epss?cve=CVE-2022-46705
epss 0.00173 https://api.first.org/data/v1/epss?cve=CVE-2022-46705
epss 0.00173 https://api.first.org/data/v1/epss?cve=CVE-2022-46705
epss 0.00173 https://api.first.org/data/v1/epss?cve=CVE-2022-46705
epss 0.00173 https://api.first.org/data/v1/epss?cve=CVE-2022-46705
epss 0.00173 https://api.first.org/data/v1/epss?cve=CVE-2022-46705
epss 0.00173 https://api.first.org/data/v1/epss?cve=CVE-2022-46705
epss 0.00173 https://api.first.org/data/v1/epss?cve=CVE-2022-46705
epss 0.00173 https://api.first.org/data/v1/epss?cve=CVE-2022-46705
epss 0.00173 https://api.first.org/data/v1/epss?cve=CVE-2022-46705
epss 0.00173 https://api.first.org/data/v1/epss?cve=CVE-2022-46705
epss 0.00173 https://api.first.org/data/v1/epss?cve=CVE-2022-46705
epss 0.00173 https://api.first.org/data/v1/epss?cve=CVE-2022-46705
epss 0.00173 https://api.first.org/data/v1/epss?cve=CVE-2022-46705
epss 0.00173 https://api.first.org/data/v1/epss?cve=CVE-2022-46705
epss 0.00173 https://api.first.org/data/v1/epss?cve=CVE-2022-46705
epss 0.00173 https://api.first.org/data/v1/epss?cve=CVE-2022-46705
epss 0.00173 https://api.first.org/data/v1/epss?cve=CVE-2022-46705
epss 0.00173 https://api.first.org/data/v1/epss?cve=CVE-2022-46705
epss 0.00173 https://api.first.org/data/v1/epss?cve=CVE-2022-46705
epss 0.00178 https://api.first.org/data/v1/epss?cve=CVE-2022-46705
epss 0.00178 https://api.first.org/data/v1/epss?cve=CVE-2022-46705
epss 0.00178 https://api.first.org/data/v1/epss?cve=CVE-2022-46705
epss 0.00245 https://api.first.org/data/v1/epss?cve=CVE-2022-46705
epss 0.00245 https://api.first.org/data/v1/epss?cve=CVE-2022-46705
epss 0.00245 https://api.first.org/data/v1/epss?cve=CVE-2022-46705
epss 0.00245 https://api.first.org/data/v1/epss?cve=CVE-2022-46705
epss 0.00303 https://api.first.org/data/v1/epss?cve=CVE-2022-46705
epss 0.00303 https://api.first.org/data/v1/epss?cve=CVE-2022-46705
epss 0.00303 https://api.first.org/data/v1/epss?cve=CVE-2022-46705
epss 0.00303 https://api.first.org/data/v1/epss?cve=CVE-2022-46705
epss 0.00303 https://api.first.org/data/v1/epss?cve=CVE-2022-46705
epss 0.00303 https://api.first.org/data/v1/epss?cve=CVE-2022-46705
epss 0.00303 https://api.first.org/data/v1/epss?cve=CVE-2022-46705
epss 0.00303 https://api.first.org/data/v1/epss?cve=CVE-2022-46705
epss 0.00303 https://api.first.org/data/v1/epss?cve=CVE-2022-46705
epss 0.00303 https://api.first.org/data/v1/epss?cve=CVE-2022-46705
epss 0.00303 https://api.first.org/data/v1/epss?cve=CVE-2022-46705
epss 0.00675 https://api.first.org/data/v1/epss?cve=CVE-2022-46705
cvssv3.1 4.3 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3 4.3 https://nvd.nist.gov/vuln/detail/CVE-2022-46705
cvssv3.1 4.3 https://nvd.nist.gov/vuln/detail/CVE-2022-46705
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46705.json
https://api.first.org/data/v1/epss?cve=CVE-2022-46705
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32919
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42826
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46705
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46725
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23517
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23518
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
https://support.apple.com/en-us/HT213530
https://support.apple.com/en-us/HT213532
https://support.apple.com/en-us/HT213537
https://support.apple.com/kb/HT213531
https://support.apple.com/kb/HT213535
https://support.apple.com/kb/HT213536
https://support.apple.com/kb/HT213676
http://www.openwall.com/lists/oss-security/2023/11/15/1
2271444 https://bugzilla.redhat.com/show_bug.cgi?id=2271444
cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*
CVE-2022-46705 https://nvd.nist.gov/vuln/detail/CVE-2022-46705
RHSA-2023:6535 https://access.redhat.com/errata/RHSA-2023:6535
RHSA-2023:7055 https://access.redhat.com/errata/RHSA-2023:7055
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46705.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2022-46705
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2022-46705
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.35423
EPSS Score 0.00173
Published At March 28, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
There are no relevant records.