{"id":"CVE-2022-40960","details":"Concurrent use of the URL parser with non-UTF-8 data was not thread-safe. This could lead to a use-after-free causing a potentially exploitable crash. This vulnerability affects Firefox ESR \u003c 102.3, Thunderbird \u003c 102.3, and Firefox \u003c 105.","modified":"2026-03-15T22:45:30.264511Z","published":"2022-12-22T20:15:39.513Z","related":["ALSA-2022:6700","ALSA-2022:6702","ALSA-2022:6708","ALSA-2022:6717","MGASA-2022-0344","MGASA-2022-0347","SUSE-SU-2022:3396-1","SUSE-SU-2022:3440-1","SUSE-SU-2022:3441-1","SUSE-SU-2022:3800-1","openSUSE-SU-2024:12358-1","openSUSE-SU-2024:12398-1","openSUSE-SU-2024:12425-1","openSUSE-SU-2024:14572-1"],"references":[{"type":"ADVISORY","url":"https://www.mozilla.org/security/advisories/mfsa2022-40/"},{"type":"ADVISORY","url":"https://www.mozilla.org/security/advisories/mfsa2022-41/"},{"type":"ADVISORY","url":"https://www.mozilla.org/security/advisories/mfsa2022-42/"},{"type":"REPORT","url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1787633"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"105.0"}]},{"events":[{"introduced":"0"},{"fixed":"102.3"}]},{"events":[{"introduced":"0"},{"fixed":"102.3"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-40960.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}]}